[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17255 Download | Alert*

The host is installed with Adobe Reader 8.x through 8.2.4 or 9.x through 9.3.4 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.

Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.

The host is installed with Adobe Reader 8.x through 8.2.4 or 9.x through 9.3.4 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader 8.x through 8.2.4 or 9.x through 9.3.4 and is prone to font-parsing input validation vulnerability. A flaw is present in the application, which fails to handle a a crafted font. Successful exploitation allows remote attackers to execute arbitrary code.

Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-3626.

Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these detai ...

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to validate user supplied data. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

The host is installed with Adobe Reader 8.x before 8.2.5 or 9.x before 9.4 and is prone to an unspecified vulnerability. A flaw is present in the application which fails to parse an image properly. Successful exploitation could allow an attacker to execute arbitrary code or lead to unspecified impact.

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to an array-indexing vulnerability. A flaw is present in the application, which fails to handle an array-index error. Successful exploitation could allow an attacker to execute arbitrary code.


Pages:      Start    770    771    772    773    774    775    776    777    778    779    780    781    782    783    ..   1725

© SecPod Technologies