[Forgot Password]
Login  Register Subscribe

24003

 
 

131486

 
 

106342

 
 

909

 
 

84662

 
 

134

 
 
Paid content will be excluded from the download.

Filter
Matches : 12407 Download | Alert*

The host is installed with Adobe Flash Player through 13.0.0.296 and 14.x through 18.x through 18.0.0.194 or Adobe Air before 18.0.0.180 and is prone to a same origin policy bypass vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could cause a crash and potentially allow attackers to disclose sensitive information.

The host is installed with Adobe Reader and Acrobat and is prone to input validation vulnerability. A flaw is present in the applications, which fails to properly perform input validation. Successful exploitation allows attackers to execute arbitrary code using unknown vectors.

The host is installed with Adobe Reader and Acrobat and is prone to cross-site scripting (XSS) vulnerability. A flaw is present in the applications, which fails to properly validate user-supplied input. An unspecified parameter in a specially-crafted URL could execute a script in a victim's Web browser within the security context of the hosting web site, once the URL is clicked. Successful exploit ...

The host is installed with Adobe Reader and Acrobat and is prone to untrusted search path vulnerability. A flaw is present in the applications, which does not directly specify a fully qualified path to a dynamic-linked library (DLL) while running on Microsoft Windows. Successful exploitation allows attackers to execute arbitrary code on the system using a specially-crafted library.

The host is installed with Oracle Java SE 8u45 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Security. Successful exploitation could allow attackers to affect availability.

The host is installed with Oracle Java SE 7u80 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Hotspot. Successful exploitation could allow attackers to affect integrity.

The host is installed with Oracle Java SE 7u80 or earlier or 8u45 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Deployment. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle Java SE 7u80 or earlier or 8u45 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Deployment. Successful exploitation could allow attackers to affect confidentiality and integrity.

The host is installed with Oracle Java SE 7u80 or earlier or 8u45 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to JCE. Successful exploitation could allow attackers to affect confidentiality.

The host is installed with Oracle Java SE 7u80 or earlier or 8u45 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Install. Successful exploitation could allow attackers to affect confidentiality, integrity and availability.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1240

© 2013 SecPod Technologies