Beschreibung
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions or cause a denial of service.
Below is a complete list of vulnerabilities
- Integer overflow, use-after-free, buffer overflow and multiple memory corruption vulnerabilities can be exploited remotely to execute arbitrary code;
- An unknown vulnerability at Javascript API can be exploited remotely to bypass security restrictions.
- Memory corruption vulnerability can be exploited remotely to cause denial of service.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2016-4255 critical
- CVE-2016-4254 critical
- CVE-2016-4252 critical
- CVE-2016-4251 critical
- CVE-2016-4250 critical
- CVE-2016-4202 critical
- CVE-2016-4203 critical
- CVE-2016-4204 critical
- CVE-2016-4205 critical
- CVE-2016-4206 critical
- CVE-2016-4207 critical
- CVE-2016-4209 critical
- CVE-2016-4210 critical
- CVE-2016-4191 critical
- CVE-2016-4192 critical
- CVE-2016-4193 critical
- CVE-2016-4194 critical
- CVE-2016-4195 critical
- CVE-2016-4196 critical
- CVE-2016-4197 critical
- CVE-2016-4198 critical
- CVE-2016-4199 critical
- CVE-2016-4200 critical
- CVE-2016-4201 critical
- CVE-2016-4265 critical
- CVE-2016-4266 critical
- CVE-2016-4267 critical
- CVE-2016-4268 critical
- CVE-2016-4269 critical
- CVE-2016-4270 critical
- CVE-2016-4208 critical
- CVE-2016-6938 critical
- CVE-2016-6937 critical
- CVE-2016-4211 critical
- CVE-2016-4212 critical
- CVE-2016-4213 critical
- CVE-2016-4214 critical
- CVE-2016-4215 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!