[Forgot Password]
Login  Register Subscribe

23631

 
 

114973

 
 

93492

 
 

909

 
 

77004

 
 

97

 
 
Paid content will be excluded from the download.

Filter
Matches : 77004 Download | Alert*

The Simple Protocol for Independent Computing Environments is a remote display system built for virtual environments which allows the user to view a computing "desktop" environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. Security Fix: * A vulnerability was discovered in spice server"s protocol handling. An au ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful e ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exp ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to type confusion vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploi ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exp ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful e ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful e ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exp ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exp ...

The host is installed with Adobe Reader or Acrobat before 11.0.21, Adobe Acrobat Reader 2017 or Acrobat 2017 before 2017.011.30059, Acrobat or Acrobat Reader DC Classic before 2015.006.30352 or Acrobat or Acrobat Reader DC Continuous before 2017.012.20093 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exp ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   7700

© 2016 SecPod Technologies