[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8355 Download | Alert*

The host is installed with Adobe Flash Player before 18.0.0.329, 19.x, 20.x before 20.0.0.306 or Adobe AIR before 20.0.0.260 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Google Chrome before 49.0.2623.75 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to block installations upon deletion of an installation frame. Successful exploitation allows remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site ...

The host is installed with Google Chrome before 49.0.2623.75 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during subtree-removal action. Successful exploitation allows remote attackers to cause a denial of service or possibly have unspecified other impact ...

The host is installed with Adobe Flash Player before 18.0.0.268, 19.x, 20.x before 20.0.0.228 or Adobe AIR before 20.0.0.204 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle crafted MPEG-4 data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.343 or 19.x through 21.x before 21.0.0.213 or Adobe AIR before 21.0.0.198 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.16, Acrobat or Acrobat Reader DC Classic before 15.006.30172 or Acrobat or Acrobat Reader DC Continuous before 15.016.20039 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allow attackers to execute arbitrary code or cause ...

The host is installed with Google Chrome before 51.0.2704.63 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Adobe Flash Player before 18.0.0.360 or 19.x, 21.x through 22.x before 22.0.0.192 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause code execution or other unspecified impact.

The host is installed with Adobe Flash Player before 18.0.0.360 or 19.x, 21.x through 22.x before 22.0.0.192 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause code execution or other unspecified impact.

The host is installed with Adobe Reader or Adobe Acrobat before 11.0.18, Acrobat or Acrobat Reader DC Classic before 15.006.30243 or Acrobat or Acrobat Reader DC Continuous before 15.020.20039 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers that could lead to code execution


Pages:      Start    782    783    784    785    786    787    788    789    790    791    792    793    794    795    ..   835

© 2013 SecPod Technologies