Описание
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to write local files, bypass security restrictions, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Memory corruption, heap overflow, integer overflow, type confusion, use after free and memory leak can be exploited remotely via an unknown vectors;
- Race condition can be exploited remotely via vectors related to Internet Explorer;
- Unknown vulnerabilities can be exploited remotely via an unknown vectors.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2015-3044 critical
- CVE-2015-3089 critical
- CVE-2015-3088 critical
- CVE-2015-3084 critical
- CVE-2015-3086 critical
- CVE-2015-3091 critical
- CVE-2015-3078 critical
- CVE-2015-3079 critical
- CVE-2015-3080 critical
- CVE-2015-3081 warning
- CVE-2015-3092 critical
- CVE-2015-3090 critical
- CVE-2015-3087 critical
- CVE-2015-3077 critical
- CVE-2015-3085 high
- CVE-2015-3083 high
- CVE-2015-3082 high
- CVE-2015-3093 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!