[Forgot Password]
Login  Register Subscribe

24436

 
 

131815

 
 

115190

 
 

909

 
 

90025

 
 

140

 
 
Paid content will be excluded from the download.

Filter
Matches : 9511 Download | Alert*

The host is installed with Adobe Flash Player before 25.0.0.171 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

The host is installed with Adobe Flash Player before 26.0.0.126 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

The host is installed with Adobe Flash Player before 26.0.0.126 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

The host is installed with Adobe Flash Player before 26.0.0.126 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

The host is installed with Adobe Flash Player before 26.0.0.126 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to code execution.

The host is installed with Adobe Flash Player before 18.0.0.324, 19.x, 20.x before 20.0.0.267 or Adobe AIR before 20.0.0.233 and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.343 or 19.x through 21.x before 21.0.0.213 or Adobe AIR before 21.0.0.198 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to bypass intended access restrictions.

A spoofing vulnerability exists when Microsoft Outlook for MAC does not properly handle the encoding and display of email addresses. This improper handling and display may cause antivirus or antispam scanning to not work as intended. To exploit the vulnerability, an attacker could send a specially crafted email attachment to a user in an attempt to launch a social engineering attack, such as phish ...

The host is installed with Apple Mac OS X 10.6.8 or 10.7.0 before 10.7.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle H.264 encoded movie files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Photoshop CS5 (12.0) or CS5.1 (12.1) and is prone to stack-based buffer-overflow vulnerability. A flaw is present in the application, which fails to perform adequate boundary-checks on user-supplied data. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    917    918    919    920    921    922    923    924    925    926    927    928    929    930    ..   951

© SecPod Technologies