Описание
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions or execute arbitrary code.
Below is a complete list of vulnerabilities
- Type confusion vulnerability can be exploited to execute arbitrary code;
- An unknown vulnerability can be exploited to bypass security restrictions;
- Multiple use-after-free vulnerabilities could be exploited to execute arbitrary code.
Technical details
Vulnerability (2) can lead to writing some data to the file system with user permissions.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2015-7656 critical
- CVE-2015-7655 critical
- CVE-2015-8043 critical
- CVE-2015-8044 critical
- CVE-2015-7663 critical
- CVE-2015-7652 critical
- CVE-2015-7661 critical
- CVE-2015-7662 critical
- CVE-2015-7659 critical
- CVE-2015-7651 critical
- CVE-2015-7654 critical
- CVE-2015-7653 critical
- CVE-2015-8046 critical
- CVE-2015-7657 critical
- CVE-2015-8042 critical
- CVE-2015-7660 critical
- CVE-2015-7658 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!