All Vulnerabilities
Microsoft PDF Library Remote Code Execution Vulnerability (CVE-2016-3374)
Severity:
Date Published:  20 Oct 2016
A remote code execution vulnerability exists in Microsoft Windows PDF library. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6966)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6959)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6956)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6955)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service states.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6954)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6951)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6950)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6948)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Memory Corruption Vulnerability (CVE-2016-6947)
Severity:
Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.