Описание
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Use-after-free, buffer overflow, memory leak and corruption vulnerabilities can be exploited remotely via an unknown vectors;
- An unknown vulnerability can be exploited remotely via vectors related to Javascript API;
- Improper null-pointer dereference can be exploited remotely via an unknown vectors;
- Improper XML handling can be exploited remotely via an unknown vectors.
NB: At this moment Adobe just reserved CVE numbers for this vulnerabilities. Information can be changed soon.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2014-8452 critical
- CVE-2015-3071 critical
- CVE-2015-3070 critical
- CVE-2015-3069 critical
- CVE-2015-3068 critical
- CVE-2015-3056 critical
- CVE-2015-3057 critical
- CVE-2015-3052 critical
- CVE-2015-3053 critical
- CVE-2015-3054 critical
- CVE-2015-3055 critical
- CVE-2015-3048 critical
- CVE-2015-3049 critical
- CVE-2015-3050 critical
- CVE-2015-3051 critical
- CVE-2015-3074 critical
- CVE-2015-3075 critical
- CVE-2015-3076 critical
- CVE-2015-3072 critical
- CVE-2015-3073 critical
- CVE-2015-3047 critical
- CVE-2015-3046 critical
- CVE-2014-9161 critical
- CVE-2014-9160 critical
- CVE-2015-3067 critical
- CVE-2015-3066 critical
- CVE-2015-3065 critical
- CVE-2015-3064 critical
- CVE-2015-3063 critical
- CVE-2015-3062 critical
- CVE-2015-3061 critical
- CVE-2015-3060 critical
- CVE-2015-3059 critical
- CVE-2015-3058 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!