Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cosig vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2017-2930
Adobe Flash Player versions 24.0.0.186 and previous versions have an exploitable memory corruption vulnerability due to a concurrency error when manipulating a display list. Successful exploitation could lead to arbitrary code execution.
Adobe Flash Player
2 EDB exploits
9.8
CVSSv3
CVE-2016-4203
Adobe Reader and Acrobat prior to 11.0.17, Acrobat and Acrobat Reader DC Classic prior to 15.006.30198, and Acrobat and Acrobat Reader DC Continuous prior to 15.017.20050 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corr...
Adobe Acrobat Reader Dc
Adobe Acrobat Dc
Adobe Acrobat
Adobe Reader
1 EDB exploit
9.8
CVSSv3
CVE-2016-4207
Adobe Reader and Acrobat prior to 11.0.17, Acrobat and Acrobat Reader DC Classic prior to 15.006.30198, and Acrobat and Acrobat Reader DC Continuous prior to 15.017.20050 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corr...
Adobe Acrobat Dc
Adobe Reader
Adobe Acrobat
Adobe Acrobat Reader Dc
1 EDB exploit
8.8
CVSSv3
CVE-2016-4273
Adobe Flash Player prior to 18.0.0.382 and 19.x up to and including 23.x prior to 23.0.0.185 on Windows and OS X and prior to 11.2.202.637 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a differe...
Adobe Flash Player
Adobe Flash Player Desktop Runtime
1 EDB exploit
7.8
CVSSv3
CVE-2016-3316
Microsoft Word 2013 SP1, 2013 RT SP1, 2016, and 2016 for Mac allow remote malicious users to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability."
Microsoft Word 2013
Microsoft Word 2016
Microsoft Word For Mac 2016
1 EDB exploit
7.8
CVSSv3
CVE-2016-3313
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016, Word 2016 for Mac, and Word Viewer allow remote malicious users to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability."
Microsoft Office 2013
Microsoft Office 2010
Microsoft Word For Mac 2016
Microsoft Word Viewer
Microsoft Office 2007
1 EDB exploit
9.8
CVSSv3
CVE-2016-4201
Adobe Reader and Acrobat prior to 11.0.17, Acrobat and Acrobat Reader DC Classic prior to 15.006.30198, and Acrobat and Acrobat Reader DC Continuous prior to 15.017.20050 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corr...
Adobe Reader
Adobe Acrobat
Adobe Acrobat Dc
Adobe Acrobat Reader Dc
1 EDB exploit
9.8
CVSSv3
CVE-2016-4204
Adobe Reader and Acrobat prior to 11.0.17, Acrobat and Acrobat Reader DC Classic prior to 15.006.30198, and Acrobat and Acrobat Reader DC Continuous prior to 15.017.20050 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corr...
Adobe Acrobat Dc
Adobe Reader
Adobe Acrobat
Adobe Acrobat Reader Dc
1 EDB exploit
9.8
CVSSv3
CVE-2016-4205
Adobe Reader and Acrobat prior to 11.0.17, Acrobat and Acrobat Reader DC Classic prior to 15.006.30198, and Acrobat and Acrobat Reader DC Continuous prior to 15.017.20050 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corr...
Adobe Acrobat Dc
Adobe Acrobat
Adobe Acrobat Reader Dc
Adobe Reader
1 EDB exploit
9.8
CVSSv3
CVE-2016-4206
Adobe Reader and Acrobat prior to 11.0.17, Acrobat and Acrobat Reader DC Classic prior to 15.006.30198, and Acrobat and Acrobat Reader DC Continuous prior to 15.017.20050 on Windows and OS X allow malicious users to execute arbitrary code or cause a denial of service (memory corr...
Adobe Acrobat
Adobe Acrobat Reader Dc
Adobe Reader
Adobe Acrobat Dc
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »