Description
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions or execute arbitrary code.
Below is a complete list of vulnerabilities
- Type confusion vulnerability can be exploited to execute arbitrary code;
- An unknown vulnerability can be exploited to bypass security restrictions;
- Multiple use-after-free vulnerabilities could be exploited to execute arbitrary code.
Technical details
Vulnerability (2) can lead to writing some data to the file system with user permissions.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2015-7656 critical
- CVE-2015-7655 critical
- CVE-2015-8043 critical
- CVE-2015-8044 critical
- CVE-2015-7663 critical
- CVE-2015-7652 critical
- CVE-2015-7661 critical
- CVE-2015-7662 critical
- CVE-2015-7659 critical
- CVE-2015-7651 critical
- CVE-2015-7654 critical
- CVE-2015-7653 critical
- CVE-2015-8046 critical
- CVE-2015-7657 critical
- CVE-2015-8042 critical
- CVE-2015-7660 critical
- CVE-2015-7658 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!