SB2016100604 - Multiple vulnerabilities in Adobe Acrobat and Reader
Published: October 6, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 72 secuirty vulnerabilities.
1) Arbitrary code execution (CVE-ID: CVE-2016-6993)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
2) Arbitrary code execution (CVE-ID: CVE-2016-6994)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to heap buffer overflow. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
3) Arbitrary code execution (CVE-ID: CVE-2016-6999)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to integer overflow. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
4) Arbitrary code execution (CVE-ID: CVE-2016-6958)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to access control error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
5) Arbitrary code execution (CVE-ID: CVE-2016-6957)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to access control error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions on Javascript API execution and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
6) Arbitrary code execution (CVE-ID: CVE-2016-7019)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
7) Arbitrary code execution (CVE-ID: CVE-2016-7018)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
8) Arbitrary code execution (CVE-ID: CVE-2016-7017)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
9) Arbitrary code execution (CVE-ID: CVE-2016-7016)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
10) Arbitrary code execution (CVE-ID: CVE-2016-7015)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
11) Arbitrary code execution (CVE-ID: CVE-2016-7014)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
12) Arbitrary code execution (CVE-ID: CVE-2016-7013)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
13) Arbitrary code execution (CVE-ID: CVE-2016-7012)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
14) Arbitrary code execution (CVE-ID: CVE-2016-7010)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
15) Arbitrary code execution (CVE-ID: CVE-2016-7011)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
16) Arbitrary code execution (CVE-ID: CVE-2016-7009)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
17) Arbitrary code execution (CVE-ID: CVE-2016-7008)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
18) Arbitrary code execution (CVE-ID: CVE-2016-7007)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
19) Arbitrary code execution (CVE-ID: CVE-2016-7006)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitation of the vulnerability leads to arbitrary code execution on the vulnerable system.
20) Arbitrary code execution (CVE-ID: CVE-2016-7005)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
21) Arbitrary code execution (CVE-ID: CVE-2016-7004)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
22) Arbitrary code execution (CVE-ID: CVE-2016-7003)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
23) Arbitrary code execution (CVE-ID: CVE-2016-7002)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
24) Arbitrary code execution (CVE-ID: CVE-2016-7001)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
25) Arbitrary code execution (CVE-ID: CVE-2016-7000)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
26) Arbitrary code execution (CVE-ID: CVE-2016-6998)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
27) Arbitrary code execution (CVE-ID: CVE-2016-6997)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
28) Arbitrary code execution (CVE-ID: CVE-2016-6996)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
29) Arbitrary code execution (CVE-ID: CVE-2016-6995)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
30) Arbitrary code execution (CVE-ID: CVE-2016-6978)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
31) Arbitrary code execution (CVE-ID: CVE-2016-6977)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
32) Arbitrary code execution (CVE-ID: CVE-2016-6976)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
33) Arbitrary code execution (CVE-ID: CVE-2016-6975)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
34) Arbitrary code execution (CVE-ID: CVE-2016-6974)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
35) Arbitrary code execution (CVE-ID: CVE-2016-6973)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
36) Arbitrary code execution (CVE-ID: CVE-2016-6972)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
37) Arbitrary code execution (CVE-ID: CVE-2016-6971)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
38) Arbitrary code execution (CVE-ID: CVE-2016-6970)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
39) Arbitrary code execution (CVE-ID: CVE-2016-6966)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
40) Arbitrary code execution (CVE-ID: CVE-2016-6960)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to insufficient input validation. By tricking the victim to download a specially crafted .pdf file that may cause a read past the end of an allocated object, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
41) Arbitrary code execution (CVE-ID: CVE-2016-6959)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
42) Arbitrary code execution (CVE-ID: CVE-2016-6956)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
43) Arbitrary code execution (CVE-ID: CVE-2016-6955)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
44) Arbitrary code execution (CVE-ID: CVE-2016-6954)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
45) Arbitrary code execution (CVE-ID: CVE-2016-6951)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
46) Arbitrary code execution (CVE-ID: CVE-2016-6950)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
47) Arbitrary code execution (CVE-ID: CVE-2016-6948)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
48) Arbitrary code execution (CVE-ID: CVE-2016-6947)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
49) Arbitrary code execution (CVE-ID: CVE-2016-6943)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
50) Arbitrary code execution (CVE-ID: CVE-2016-6942)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
51) Arbitrary code execution (CVE-ID: CVE-2016-6941)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
52) Arbitrary code execution (CVE-ID: CVE-2016-6940)
The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
53) Arbitrary code execution (CVE-ID: CVE-2016-6939)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to heap buffer overflow. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
54) Arbitrary code execution (CVE-ID: CVE-2016-6979)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
55) Arbitrary code execution (CVE-ID: CVE-2016-6969)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
56) Arbitrary code execution (CVE-ID: CVE-2016-6971)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
57) Arbitrary code execution (CVE-ID: CVE-2016-6968)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
58) Arbitrary code execution (CVE-ID: CVE-2016-6967)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
59) Arbitrary code execution (CVE-ID: CVE-2016-6966)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
60) Arbitrary code execution (CVE-ID: CVE-2016-6965)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
61) Arbitrary code execution (CVE-ID: CVE-2016-6964)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error within the AXSLE library. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
62) Arbitrary code execution (CVE-ID: CVE-2016-6963)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error within the AXSLE library. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
63) Arbitrary code execution (CVE-ID: CVE-2016-6962)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
64) Arbitrary code execution (CVE-ID: CVE-2016-6961)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
65) Arbitrary code execution (CVE-ID: CVE-2016-6953)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
66) Arbitrary code execution (CVE-ID: CVE-2016-6952)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
67) Arbitrary code execution (CVE-ID: CVE-2016-6949)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
68) Arbitrary code execution (CVE-ID: CVE-2016-6946)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
69) Arbitrary code execution (CVE-ID: CVE-2016-6945)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
70) Arbitrary code execution (CVE-ID: CVE-2016-6944)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
71) Arbitrary code execution (CVE-ID: CVE-2016-1091)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
72) Arbitrary code execution (CVE-ID: CVE-2016-1089)
The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.
Remediation
Install update from vendor's website.