[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Adobe Flash Player before 32.0.0.192 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause arbitrary code execution.

The host is missing a critical update according to Adobe advisory, APSB19-26. The update is required to fix a use-after-free vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote attackers to cause arbitrary code execution in the context of the current user.

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 32.0.0.192. Security Fix: * flash-plugin: Arbitrary Code Execution vulnerability For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the Refere ...

The host is installed with Adobe Shockwave Player before 11.5.8.612 and is prone to memory corruption vulnerability. A flaw is present in the application, which does not properly validate a count value in a Director movie. Successful exploitation allows attackers to cause a denial of service or execute arbitrary code.

Adobe Shockwave Player before 11.5.8.612 does not properly validate a count value in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to IML32X.dll and DIRAPIX.dll.

IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x320D of a certain file.

The host is installed with Adobe Shockwave Player before 11.5.8.612 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly parse .dir files. Successful exploitation allows attackers to execute arbitrary code via a malformed file containing an invalid value.

The host is installed with Adobe Shockwave Player before 11.5.8.612 and is prone to pointer offset vulnerability. A flaw is present in the application, which fails to properly handle a certain return value associated with the rcsL chunk in a Director movie. Successful exploitation allows remote attackers to cause a denial of service.

DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly handle a certain return value associated with the rcsL chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie, related to a "pointer offset vulnerability."

Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie.


Pages:      Start    8661    8662    8663    8664    8665    8666    8667    8668    8669    8670    8671    8672    8673    8674    ..   19630

© SecPod Technologies