[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17564 Download | Alert*

The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass the same origin policy.

The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Adobe Flash Player before 13.0.0.214 or Adobe AIR before 13.0.0.111 and is prone to security bypass vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to bypass intended access restrictions.

The host is installed with Adobe Flash Player 12.0.0.77 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the applications, which fails to properly handle the unknown vectors. Successful exploitation allows attackers to execute arbitrary code and bypass a sandbox protection mechanism.

The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to corrupt memory or crash the service.

The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to validate user supplied input. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to remote code execution vulnerability. A flaw is present in the IML32 component, which fails to validate user supplied input. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Shockwave Player before 11.6.1.629 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to sanitize user supplied input. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.


Pages:      Start    999    1000    1001    1002    1003    1004    1005    1006    1007    1008    1009    1010    1011    1012    ..   1756

© SecPod Technologies