[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11495 Download | Alert*

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a denial of service vulnerability. The flaw is present in the Application, which fails to handle PDF document with a crafted TrueType font. Successful exploitation allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the Application, which fails to handle PDF file containing a malformed U3D model file with a crafted extension block. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.1, 8.x before 8.1.4 or 9.x before 9.1 and is prone to an unspecified vulnerability. The flaw is present in the JBIG2, which fails to handle PDF file with a malformed JBIG2 symbol dictionary segment. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.1.0, 8.1.3 or 9.0.0 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 9.x before 9.1, 8.x before 8.1.4 or 7.x before 7.1.1 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 symbol dictionary segment, which fails to handle PDF file with a malformed JBIG2 symbol dictionary segment. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Lync Server 2010 or 2013 and is prone to a content sanitization vulnerability. A flaw is present in the application, which fails to fails to properly sanitize specially crafted content. Successful exploitation could allow attackers to potentially execute scripts in the users browser to obtain information from web sessions.

The host is installed with Microsoft FrontPage 2003 and is prone to a xml disclosure vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to disclose the contents of a file on a target system.


Pages:      Start    1134    1135    1136    1137    1138    1139    1140    1141    1142    1143    1144    1145    1146    1147    ..   1149

© 2013 SecPod Technologies