Description
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An unknown vulnerability can be exploited remotely via an unknown vectors;
- An unknown vulnerability can be exploited remotely via vectors related to memory address randomization, permissions and same-origin-policy;
- Stack overflow, integer overflow, memory corruption, use-after-free and memory leak vulnerabilities can be exploited remotely via an unknown vectors.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2015-3108 critical
- CVE-2015-3096 high
- CVE-2015-3099 critical
- CVE-2015-3098 critical
- CVE-2015-3100 critical
- CVE-2015-3101 warning
- CVE-2015-3097 critical
- CVE-2015-3103 critical
- CVE-2015-3104 critical
- CVE-2015-3105 critical
- CVE-2015-3106 critical
- CVE-2015-3107 critical
- CVE-2015-3102 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!