All Vulnerabilities

Adobe Flash Player Memory Corruption Vulnerability (CVE-2016-4273)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Flash Player is prone to a memory corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6988)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6979)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6971)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an use after free vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial of service condition.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6969)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6968)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6967)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6965)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6964)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat And Reader Use After Free Vulnerability (CVE-2016-6963)
 Severity:    
 Date Published:  20 Oct 2016
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.