[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8059 Download | Alert*

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.15, 11.x before 11.0.12, Acrobat Reader DC Classic before 2015.006.30060, Acrobat Reader DC Continuous before 2015.008.20082, Acrobat DC Classic before 2015.006.30060 or Acrobat DC Continuous before 2015.008.20082 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspeci ...

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.16, 11.x before 11.0.13, Acrobat DC Classic before 2015.006.30094, Acrobat Reader DC Classic before 2015.006.30094, Acrobat DC Continuous before 2015.009.20069 or Acrobat Reader DC Continuous before 2015.009.20069 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted ...

The host is installed with Adobe Reader or Acrobat 10.x before 10.1.16, 11.x before 11.0.13, Acrobat DC Classic before 2015.006.30094, Acrobat Reader DC Classic before 2015.006.30094, Acrobat DC Continuous before 2015.009.20069 or Acrobat Reader DC Continuous before 2015.009.20069 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to handle unspecifi ...

The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a cross site scripting vulnerability. A flaw is present in the application, which fails to properly perform input validation. Successful exploitation allow attackers to leak sensitive user information.

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.9.5, 10.10.5 or 10.11.x before 10.11.1 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted web site. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted app. Successful exploitation could allow attackers to cause a denial of service.

The host is installed with Apple Mac OS X or Server 10.11.x before 10.11.1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to bypass an intended user-confirmation requirement for AppleScript execution.

The host is installed with Microsoft Office 2011 or 2016 for Mac and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted Microsoft Office file. Successful exploitation could allow attackers to run arbitrary code in the context of the current user.

The host is installed with Apple Safari before 9.0.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a crafted website. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    6    7    8    9    10    11    12    13    14    15    16    17    18    19    ..   805

© 2013 SecPod Technologies