Beschreibung
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions or execute arbitrary code.
Below is a complete list of vulnerabilities
- Type confusion vulnerability can be exploited to execute arbitrary code;
- An unknown vulnerability can be exploited to bypass security restrictions;
- Multiple use-after-free vulnerabilities could be exploited to execute arbitrary code.
Technical details
Vulnerability (2) can lead to writing some data to the file system with user permissions.
Ursprüngliche Informationshinweise
Ausnutzung
CVE Liste
- CVE-2015-7656 critical
- CVE-2015-7655 critical
- CVE-2015-8043 critical
- CVE-2015-8044 critical
- CVE-2015-7663 critical
- CVE-2015-7652 critical
- CVE-2015-7661 critical
- CVE-2015-7662 critical
- CVE-2015-7659 critical
- CVE-2015-7651 critical
- CVE-2015-7654 critical
- CVE-2015-7653 critical
- CVE-2015-8046 critical
- CVE-2015-7657 critical
- CVE-2015-8042 critical
- CVE-2015-7660 critical
- CVE-2015-7658 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!