Detect date
?
|
11/10/2015 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions or execute arbitrary code. Below is a complete list of vulnerabilities
Technical details Vulnerability (2) can lead to writing some data to the file system with user permissions. |
Affected products
|
Adobe Flash Player versions earlier than 19.0.0.245 |
Solution
|
Update to the latest version |
Original advisories
|
|
Impacts
?
|
ACE [?] OSI [?] SB [?] |
Related products
|
Adobe Flash Player ActiveX Adobe AIR Adobe Flash Player NPAPI Adobe Flash Player PPAPI |
CVE-IDS
?
|
CVE-2015-76569.3Critical
CVE-2015-76559.3Critical CVE-2015-76529.3Critical CVE-2015-76619.3Critical CVE-2015-76627.8Critical CVE-2015-76599.3Critical CVE-2015-76519.3Critical CVE-2015-76549.3Critical CVE-2015-76539.3Critical CVE-2015-76579.3Critical CVE-2015-80429.3Critical CVE-2015-76609.3Critical CVE-2015-76589.3Critical |
Exploitation
|
Public exploits exist for this vulnerability. Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Find out the statistics of the vulnerabilities spreading in your region |