[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26317 Download | Alert*

The host is installed with Adobe Photoshop 22.x through 22.5.7 or 23.x through 23.3.2 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow leads to memory leak.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers could corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Shockwave Player before 11.5.9.620 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in dirapi.dll module of the application, which fails to avoid memory corruptions. Successful exploitation allows a remote attacker to corrupt memory and execute arbitrary code on the system.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to re ...

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 before 25.4.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.


Pages:      Start    1363    1364    1365    1366    1367    1368    1369    1370    1371    1372    1373    1374    1375    1376    ..   2631

© SecPod Technologies