SB2016100604 - Multiple vulnerabilities in Adobe Acrobat and Reader



SB2016100604 - Multiple vulnerabilities in Adobe Acrobat and Reader

Published: October 6, 2016

Security Bulletin ID SB2016100604
Severity
High
Patch available
YES
Number of vulnerabilities 72
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 72 secuirty vulnerabilities.


1) Arbitrary code execution (CVE-ID: CVE-2016-6993)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

2) Arbitrary code execution (CVE-ID: CVE-2016-6994)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to heap buffer overflow. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

3) Arbitrary code execution (CVE-ID: CVE-2016-6999)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to integer overflow. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

4) Arbitrary code execution (CVE-ID: CVE-2016-6958)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to access control error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

5) Arbitrary code execution (CVE-ID: CVE-2016-6957)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to access control error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions on Javascript API execution and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

6) Arbitrary code execution (CVE-ID: CVE-2016-7019)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

7) Arbitrary code execution (CVE-ID: CVE-2016-7018)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

8) Arbitrary code execution (CVE-ID: CVE-2016-7017)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

9) Arbitrary code execution (CVE-ID: CVE-2016-7016)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

10) Arbitrary code execution (CVE-ID: CVE-2016-7015)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

11) Arbitrary code execution (CVE-ID: CVE-2016-7014)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

12) Arbitrary code execution (CVE-ID: CVE-2016-7013)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

13) Arbitrary code execution (CVE-ID: CVE-2016-7012)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

14) Arbitrary code execution (CVE-ID: CVE-2016-7010)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

15) Arbitrary code execution (CVE-ID: CVE-2016-7011)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

16) Arbitrary code execution (CVE-ID: CVE-2016-7009)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

17) Arbitrary code execution (CVE-ID: CVE-2016-7008)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

18) Arbitrary code execution (CVE-ID: CVE-2016-7007)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

19) Arbitrary code execution (CVE-ID: CVE-2016-7006)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitation of the vulnerability leads to arbitrary code execution on the vulnerable system.

20) Arbitrary code execution (CVE-ID: CVE-2016-7005)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

21) Arbitrary code execution (CVE-ID: CVE-2016-7004)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

22) Arbitrary code execution (CVE-ID: CVE-2016-7003)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

23) Arbitrary code execution (CVE-ID: CVE-2016-7002)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

24) Arbitrary code execution (CVE-ID: CVE-2016-7001)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

25) Arbitrary code execution (CVE-ID: CVE-2016-7000)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

26) Arbitrary code execution (CVE-ID: CVE-2016-6998)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

27) Arbitrary code execution (CVE-ID: CVE-2016-6997)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

28) Arbitrary code execution (CVE-ID: CVE-2016-6996)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

29) Arbitrary code execution (CVE-ID: CVE-2016-6995)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

30) Arbitrary code execution (CVE-ID: CVE-2016-6978)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

31) Arbitrary code execution (CVE-ID: CVE-2016-6977)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

32) Arbitrary code execution (CVE-ID: CVE-2016-6976)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

33) Arbitrary code execution (CVE-ID: CVE-2016-6975)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

34) Arbitrary code execution (CVE-ID: CVE-2016-6974)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

35) Arbitrary code execution (CVE-ID: CVE-2016-6973)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

36) Arbitrary code execution (CVE-ID: CVE-2016-6972)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

37) Arbitrary code execution (CVE-ID: CVE-2016-6971)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

38) Arbitrary code execution (CVE-ID: CVE-2016-6970)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

39) Arbitrary code execution (CVE-ID: CVE-2016-6966)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

40) Arbitrary code execution (CVE-ID: CVE-2016-6960)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to insufficient input validation. By tricking the victim to download a specially crafted .pdf file that may cause a read past the end of an allocated object, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

41) Arbitrary code execution (CVE-ID: CVE-2016-6959)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

42) Arbitrary code execution (CVE-ID: CVE-2016-6956)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

43) Arbitrary code execution (CVE-ID: CVE-2016-6955)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

44) Arbitrary code execution (CVE-ID: CVE-2016-6954)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

45) Arbitrary code execution (CVE-ID: CVE-2016-6951)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

46) Arbitrary code execution (CVE-ID: CVE-2016-6950)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

47) Arbitrary code execution (CVE-ID: CVE-2016-6948)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

48) Arbitrary code execution (CVE-ID: CVE-2016-6947)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

49) Arbitrary code execution (CVE-ID: CVE-2016-6943)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

50) Arbitrary code execution (CVE-ID: CVE-2016-6942)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

51) Arbitrary code execution (CVE-ID: CVE-2016-6941)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

52) Arbitrary code execution (CVE-ID: CVE-2016-6940)

The vulnerability allows a remote unauthenticated user to execute arbitrary code on the target system.
The weakness is due to memory corruption error. By tricking the victim to download a specially crafted .pdf file, attackers can bypass security restrictions and to execute arbitrary code.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

53) Arbitrary code execution (CVE-ID: CVE-2016-6939)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to heap buffer overflow. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

54) Arbitrary code execution (CVE-ID: CVE-2016-6979)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

55) Arbitrary code execution (CVE-ID: CVE-2016-6969)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

56) Arbitrary code execution (CVE-ID: CVE-2016-6971)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

57) Arbitrary code execution (CVE-ID: CVE-2016-6968)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

58) Arbitrary code execution (CVE-ID: CVE-2016-6967)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

59) Arbitrary code execution (CVE-ID: CVE-2016-6966)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

60) Arbitrary code execution (CVE-ID: CVE-2016-6965)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

61) Arbitrary code execution (CVE-ID: CVE-2016-6964)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error within the AXSLE library. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

62) Arbitrary code execution (CVE-ID: CVE-2016-6963)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error within the AXSLE library. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

63) Arbitrary code execution (CVE-ID: CVE-2016-6962)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

64) Arbitrary code execution (CVE-ID: CVE-2016-6961)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

65) Arbitrary code execution (CVE-ID: CVE-2016-6953)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

66) Arbitrary code execution (CVE-ID: CVE-2016-6952)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

67) Arbitrary code execution (CVE-ID: CVE-2016-6949)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

68) Arbitrary code execution (CVE-ID: CVE-2016-6946)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

69) Arbitrary code execution (CVE-ID: CVE-2016-6945)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

70) Arbitrary code execution (CVE-ID: CVE-2016-6944)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

71) Arbitrary code execution (CVE-ID: CVE-2016-1091)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

72) Arbitrary code execution (CVE-ID: CVE-2016-1089)

The vulnerability allows a remote unauthenticated user to cause arbitrary code execution on the target system.
The weakness is due to use-after-free memory error. By tricking the victim to download a specially crafted file attackers can bypass security restrictions and trigger an arbitrary code to be executed.
Successful exploitatin of the vulnerability leads to arbitrary code execution on the vulnerable system.

Remediation

Install update from vendor's website.