Описание
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, cause denial of service, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An unknown vulnerability can be exploited remotely via an unknown vectors;
- An unknown vulnerability can be exploited remotely via vectors related to memory address randomization, permissions and same-origin-policy;
- Stack overflow, integer overflow, memory corruption, use-after-free and memory leak vulnerabilities can be exploited remotely via an unknown vectors.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2015-3108 critical
- CVE-2015-3096 high
- CVE-2015-3099 critical
- CVE-2015-3098 critical
- CVE-2015-3100 critical
- CVE-2015-3101 warning
- CVE-2015-3097 critical
- CVE-2015-3103 critical
- CVE-2015-3104 critical
- CVE-2015-3105 critical
- CVE-2015-3106 critical
- CVE-2015-3107 critical
- CVE-2015-3102 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!