[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31491 Download | Alert*

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers could corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Shockwave Player before 11.5.9.620 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in dirapi.dll module of the application, which fails to avoid memory corruptions. Successful exploitation allows a remote attacker to corrupt memory and execute arbitrary code on the system.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to re ...

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 before 25.4.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to execute arbitrary code.


Pages:      Start    1663    1664    1665    1666    1667    1668    1669    1670    1671    1672    1673    1674    1675    1676    ..   3149

© SecPod Technologies