[Forgot Password]
Login  Register Subscribe

23631

 
 

126998

 
 

102010

 
 

909

 
 

80911

 
 

121

 
 
Paid content will be excluded from the download.

Filter
Matches : 8257 Download | Alert*

The host is installed with Adobe Flash Player before 10.3.183.51 or 11.x before 11.5.502.149 or Adobe AIR before 3.6.0.597 and is prone to a buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted SWF content. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.61 and 11.x before 11.6.602.167 or Adobe Air before 3.6.0.597 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.61 and 11.x before 11.6.602.167 or Adobe Air before 3.6.0.597 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.68 or 11.x before 11.6.602.180 or Adobe AIR before 3.6.0.6090 and is prone to integer overflow vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 10.3.183.68 or 11.x before 11.6.602.180 or Adobe AIR before 3.6.0.6090 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.5.502.135 or before 10.3.183.50 or Adobe AIR before 3.5.0.1060 and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attacker to execute remote code.

The host is installed with Opera before 12.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed SVG image. Successful exploitation could allow a remote attacker to execute arbitrary code or cause a denial of service (application crash).

The host is installed with Opera before 12.10 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle incorrect size data in a WebP image. Successful exploitation could allow a remote attacker to obtain potentially sensitive information from process memory by using a crafted image as the fill pattern for a canvas.

The host is installed with Opera before 12.10 and is prone to phishing attacks. A flaw is present in the application, which fails to properly handle the internet shortcuts that are referenced by a IMG element or other inline element. Successful exploitation could allow a remote attacker to conduct phishing attacks via a crafted web site.

The host is installed with Opera before 12.11 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long HTTP response. Successful exploitation could allow a remote attacker to execute arbitrary code or cause a denial of service (memory corruption).


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   825

© 2013 SecPod Technologies