[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to gain access to sensitive information.

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to gain access to sensitive information.

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to gain access to sensitive information.

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to gain access to sensitive information.

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to gain access to sensitive information.

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to perform arbitrary code execution.

The host is installed with Adobe Digital Editions before 4.5.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle crafted epub files. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with Adobe Digital Editions before 4.5.8 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to handle crafted epub files. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with AIMP 2.51 build 330 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a MP3 file with a long ID3 tag. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with AIMP 2.51 build 330 or earlier and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long File1 argument. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1361    1362    1363    1364    1365    1366    1367    1368    1369    1370    1371    1372    1373    1374    ..   1516

© SecPod Technologies