[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11616 Download | Alert*

The host is installed with VMware Movie Decoder before 6.5.4 Build 246459, movie decoder in VMware Workstation 6.5.x before 6.5.4 build 246459 or VMware Player 2.5.x before 2.5.4 build 246459 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle an AVI file with crafted hextile-encoded video chunks that trigger heap-based buffer over ...

The host is installed with VMware Movie Decoder before 6.5.4 Build 246459, movie decoder in VMware Workstation 6.5.x before 6.5.4 build 246459 or VMware Player 2.5.x before 2.5.4 build 246459 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle an AVI file with crafted video chunks that use hextile encoding. Successful exploitation ...

The host is installed with VMware Movie Decoder before 6.5.3 build 185404, VMware Workstation 6.5.x before 6.5.3 build 185404 or VMware Player 2.5.x before 2.5.3 build 185404 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a video file with crafted dimensions (aka framebuffer parameters). Successful exploitation allow remote a ...

The host is installed with Adobe Reader and Acrobat 9.x before 9.1, 8.x before 8.1.4 or 7.x before 7.1.1 and is prone to an unspecified vulnerability. The flaw is present in the JBIG2, which fails to handle unknown attack vectors related to JBIG2. Successful exploitation allows remote attackers to trigger memory corruption and possibly execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to multiple heap-based buffer overflow vulnerabilities. The flaws are present in the Application, which fails to handle a crafted PDF file with a JPX (aka JPEG2000) stream that triggers heap memory corruption. Successful exploitation allows remote attackers to execute arbitrary co ...

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a denial of service vulnerability. The flaw is present in the Application, which fails to handle PDF document with a crafted TrueType font. Successful exploitation allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the Application, which fails to handle PDF file containing a malformed U3D model file with a crafted extension block. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.1, 8.x before 8.1.4 or 9.x before 9.1 and is prone to an unspecified vulnerability. The flaw is present in the JBIG2, which fails to handle PDF file with a malformed JBIG2 symbol dictionary segment. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.1.0, 8.1.3 or 9.0.0 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    1146    1147    1148    1149    1150    1151    1152    1153    1154    1155    1156    1157    1158    1159    ..   1161

© 2013 SecPod Technologies