[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8261 Download | Alert*

The host is installed with Adobe Flash Player before 18.0.0.343 or 19.x through 21.x before 21.0.0.213 or Adobe AIR before 21.0.0.198 and is prone to an ASLR bypass vulnerability. A flaw is present in the application, which fails to handle a crafted JIT data. Successful exploitation could allow attackers to bypass the ASLR protection mechanism.

The host is installed with Google Chrome before 50.0.2661.94 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.16, Acrobat or Acrobat Reader DC Classic before 15.006.30172 or Acrobat or Acrobat Reader DC Continuous before 15.016.20039 and is prone to a javaScript API execution restrictions bypass vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allow attackers to bypas ...

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.16, Acrobat or Acrobat Reader DC Classic before 15.006.30172 or Acrobat or Acrobat Reader DC Continuous before 15.016.20039 and is prone to a javaScript API execution restrictions bypass vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allow attackers to bypas ...

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.16, Acrobat or Acrobat Reader DC Classic before 15.006.30172 or Acrobat or Acrobat Reader DC Continuous before 15.016.20039 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.352 or 19.x through 21.x before 21.0.0.242 or Adobe AIR before 21.0.0.215 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause code execution or other unspecified impact.

The host is installed with Adobe Flash Player before 18.0.0.366 or 19.x, 21.x through 22.x before 22.0.0.209 and is prone to a stack corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause code execution or other unspecified impact.

The host is installed with Adobe Flash Player before 18.0.0.366 or 19.x, 21.x through 22.x before 22.0.0.209 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause code execution or other unspecified impact.

The host is installed with Adobe Flash Player before 18.0.0.366 or 19.x, 21.x through 22.x before 22.0.0.209 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause code execution or other unspecified impact.

The host is installed with Mozilla Firefox before 48.0 or Firefox ESR before 45.3 and is prone to a same-origin policy bypass vulnerability. A flaw is present in the applications, which fail to a handle local HTML file and saved shortcut file. Successful exploitation allows remote attackers to bypass same-origin policy and perform data theft.


Pages:      Start    778    779    780    781    782    783    784    785    786    787    788    789    790    791    ..   826

© 2013 SecPod Technologies