[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Adobe Photoshop CC 2014 before 15.2.4.58 or Adobe Photoshop CC 2015 before 16.1.2.355 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.3.58 or Adobe Photoshop CC 2015 before 16.0.0.88 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Google Chrome 1.0.154.64 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fail to handle a crafted (1) image or (2) canvas. Successful exploitation allows remote attackers to execute arbitrary code in the renderer process.

The host is installed with Google Chrome 2.0.172.43 and is prone to a spoofing vulnerability. The flaw is present in the application, which fails to handle a crafted certificate. Successful exploitation allows man-in-the-middle attackers to spoof arbitrary HTTPS servers.

The host is installed with Google Chrome 3.0.195.21 and is prone to a cross-site scripting (XSS) vulnerability. The flaw is present in the application, which fails to handle a (1) RSS or (2) Atom feed. Successful exploitation allows remote attackers to inject arbitrary web script or HTML.

The host is installed with Google Chrome 2.0.172.37 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle crafted javascript regular expression. Successful exploitation allows remote attackers to execute arbitrary code in the chrome sandbox.

The host is installed with Google Chrome 2.0.172.37 and is prone to a denial of service vulnerability. The flaw is present in the application, which fails to handle unspecified vectors that trigger excessive memory allocation. Successful exploitation allows remote attackers to leverage renderer access to cause a denial of service (memory corruption and application crash) or possibly execute arbitr ...


Pages:      Start    1231    1232    1233    1234    1235    1236    1237    1238    1239    1240    1241    1242    1243    1244    ..   1484

© SecPod Technologies