[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 11239 Download | Alert*

The host is installed with Adobe Reader 9.x before 9.5.1, 10.x before 10.1.3 or Adobe Acrobat 10.x before 10.1.3 and is prone to an integer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType font. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x before 9.5.1, 10.x before 10.1.3 or Adobe Acrobat 10.x before 10.1.3 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation could allow attackers to crash the service.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to type confusion memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted MP4 data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly validate user inputs. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Flash Player 11.x through 11.1.102.55 or before 10.3.183.15 versions and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly validate user inputs. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle vectors related to iTunes Store browsing. Successful exploitation could allow attackers to crash the service.

The host is installed with Apple iTunes before 10.6 or Apple Safari before 5.1.4 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle vectors related to iTunes Store browsing. Successful exploitation could allow attackers to crash the service.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1123

© 2013 SecPod Technologies