Описание
Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions or cause a denial of service.
Below is a complete list of vulnerabilities
- Integer overflow, use-after-free, buffer overflow and multiple memory corruption vulnerabilities can be exploited remotely to execute arbitrary code;
- An unknown vulnerability at Javascript API can be exploited remotely to bypass security restrictions.
- Memory corruption vulnerability can be exploited remotely to cause denial of service.
Первичный источник обнаружения
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
- Adobe-Reader-XI
- Adobe-Acrobat-XI
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-Reader-DC-Classic
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-DC-Classic
Список CVE
- CVE-2016-4255 high
- CVE-2016-4254 critical
- CVE-2016-4252 critical
- CVE-2016-4251 critical
- CVE-2016-4250 critical
- CVE-2016-4202 high
- CVE-2016-4203 critical
- CVE-2016-4204 critical
- CVE-2016-4205 critical
- CVE-2016-4206 critical
- CVE-2016-4207 critical
- CVE-2016-4209 critical
- CVE-2016-4210 critical
- CVE-2016-4191 critical
- CVE-2016-4192 critical
- CVE-2016-4193 critical
- CVE-2016-4194 critical
- CVE-2016-4195 high
- CVE-2016-4196 high
- CVE-2016-4197 high
- CVE-2016-4198 high
- CVE-2016-4199 high
- CVE-2016-4200 high
- CVE-2016-4201 critical
- CVE-2016-4265 critical
- CVE-2016-4266 critical
- CVE-2016-4267 critical
- CVE-2016-4268 critical
- CVE-2016-4269 critical
- CVE-2016-4270 critical
- CVE-2016-4208 critical
- CVE-2016-6938 critical
- CVE-2016-6937 critical
- CVE-2016-4211 critical
- CVE-2016-4212 critical
- CVE-2016-4213 critical
- CVE-2016-4214 critical
- CVE-2016-4215 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!