[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with OpenSSL 0.9.8 and is prone to man-in-the-middle attack vulnerability. A flaw is present in Diffie-Hellman key-exchange implementation in OpenSSL, which does not properly validate a public parameter. Successful exploitation makes it easier for man-in-the-middle attackers to obtain the shared secret key.

The host is installed with Oracle VM VirtualBox before 5.1.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core (OpenSSL). Successful exploitation allows attackers to affect Confidentiality.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.1, 8.x before 8.1.4 or 9.x before 9.1 and is prone to a denial of service vulnerability. The flaw is present in the JavaScript API, which fails to handle getAnnots Doc method in the JavaScript API. Successful exploitation allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle crafted PDF file that contains JBIG2 text region segments with Huffman encoding. Successful exploitation allows remote attackers to cause a denial of service (memory corru ...

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle crafted file that triggers memory corruption. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the Application, which fails to handle PDF file containing a malformed U3D model file with a crafted extension block. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to an integer overflow vulnerability. The flaw is present in the Application, which fails to handle PDF file containing unspecified parameters to the FlateDecode filter. Successful exploitation allows attackers to cause a denial of service or possibly execute arbitrary code, which ...


Pages:      Start    1362    1363    1364    1365    1366    1367    1368    1369    1370    1371    1372    1373    1374    1375    ..   1502

© SecPod Technologies