[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 8109 Download | Alert*

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to validate user supplied data. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

The host is installed with Mozilla Firefox before 3.6.18 or Thunderbird before 3.1.11 and is prone to use-after-free vulnerability. A flaw is present in the applications which fails to properly handle user-supplied callback. Successful exploitation allows remote attacker to execute arbitrary code and cause a denial of service.

The host is installed with Adobe Reader 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 and is prone to input validation vulnerability. A flaw is present in the applications, which fails to properly perform input validation. Successful exploitation allows remote attackers to execute arbitrary code using a crafted 3D file.

The host is installed with Mozilla Firefox before 3.6.20 or Thunderbird 2.x or 3.x before 3.1.12 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 14.0.835.202 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle vectors related to the Google V8 bindings. Successful exploitation could allow attackers to crash the service.

The host is installed with Google Chrome before 15.0.874.120 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted stream. Successful exploitation could allow attackers to overflow the buffer.

The host is installed with Google Chrome before 17.0.963.46 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors that trigger a large amount of database usage. Successful exploitation allows remote attackers to cause an application crash.

The host is installed with Mozilla Firefox 10.x before 10.0.1 or Thunderbird before 10.0.1 or SeaMonkey before 2.7.1 and is prone to use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle nsXBLDocumentInfo::ReadPrototypeBindings function call. Successful exploitation allows remote attackers to cause arbitrary code to be executed on the target user's syst ...

The host is installed with Adobe Reader 8.x before 8.2.0 or 9.x before 9.3.0 and is prone to script injection vulnerability. A flaw is present in the application, where the default configuration fails to enable the Enhanced Security feature. Successful exploitation has unspecified impact and attack vectors.

The host is installed with Adobe Reader 9.0 before 9.4.1 and is prone to memory corruption vulnerability. A flaw is present in the application, which causes memory corruption when processing the "printSeps()" function within a PDF document. Successful exploitation allows remote attackers to execute arbitrary code using a crafted PDF document and cause a denial of service.


Pages:      Start    778    779    780    781    782    783    784    785    786    787    788    789    790    791    ..   810

© 2013 SecPod Technologies