Description
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to cause denial of service or execute arbitrary code.
Below is a complete list of vulnerabilities
- Type confusion, use-after-free, multiple overflows and memory corruption could be exploited remotely via an unknown vectors to cause denial of service or execute arbitrary code;
- Lack of restrictions introduced at previous version can be exploited remotely via an unknown vectors to cause denial of service or execute arbitrary code.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2015-5124 critical
- CVE-2015-5544 critical
- CVE-2015-5545 critical
- CVE-2015-5540 critical
- CVE-2015-5541 critical
- CVE-2015-5548 critical
- CVE-2015-5549 critical
- CVE-2015-5546 critical
- CVE-2015-5547 critical
- CVE-2015-5539 critical
- CVE-2015-5561 critical
- CVE-2015-5565 critical
- CVE-2015-5564 critical
- CVE-2015-5563 critical
- CVE-2015-5562 critical
- CVE-2015-5555 critical
- CVE-2015-5566 critical
- CVE-2015-5125 critical
- CVE-2015-5127 critical
- CVE-2015-5129 critical
- CVE-2015-5560 critical
- CVE-2015-5130 critical
- CVE-2015-5131 critical
- CVE-2015-5551 critical
- CVE-2015-5550 critical
- CVE-2015-5557 critical
- CVE-2015-5556 critical
- CVE-2015-5559 critical
- CVE-2015-5558 critical
- CVE-2015-5553 critical
- CVE-2015-5552 critical
- CVE-2015-5134 critical
- CVE-2015-5554 critical
- CVE-2015-5133 critical
- CVE-2015-5132 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!