[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Adobe Shockwave Player and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle dirapi.dll module. Successful exploitation could allow an attacker to execute arbitrary code.

The host is installed with Adobe Shockwave Player, and is prone to a remote code execution vulnerability. A flaw is present in the dirapi.dll module, which fails to account for a specific condition and can be made to misallocate a buffer on the heap. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

The host is installed with Adobe Shockwave Player and is prone to a remote code execution vulnerability. A flaw is present in the dirapi module, as it fails to validate input with malicious "Set Argument" instructions. Successful exploitation could allow an attacker to corrupt memory or execute arbitrary code.

The host is installed with Adobe Shockwave Player and is prone to a remote memory corruption vulnerability. A flaw is present in the application, which fails to handle dirapi.dll module. Successful exploitation could allow an attacker to execute remote code or corrupt the memory and crash the service.

The host is installed with with Adobe Shockwave Player and is prone to a remote code execution vulnerability. A flaw is present in the dirapi.dll module, which fails to validate "Get Local" instructions in malicious director files. Successful exploitation could allow an attacker to execute arbitrary code or crash the application.

The host is installed with Adobe Shockwave Player before 11.6.0.626 and is prone to a remote code execution vulnerability. A flaw is present in the dirapi.dll module, as it is possible to trigger a code path that leads to an incorrect string copy operation when processing "DRCF" chunks. Successful exploitation could allow an attacker to overflow a heap buffer and execute arbitrary code.

The host is installed with Adobe Shockwave Player and is prone to a remote code execution vulnerability. A flaw is present in the IML32.dll module, which fails to parse GIF images properly. Successful exploitation could allow an attacker to execute arbitrary code or crash the application.

The host is installed with Adobe Shockwave Player, and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the IML32.dll module, since a boundary error exists when processing the data section of DEMX chunks. Successful exploitation could allow an attacker to overflow buffer and execute arbitrary code.

The host is installed with Adobe Shockwave Player and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle IML32.dll module. Successful exploitation could allow an attacker to execute arbitrary code or crash the application.

The host is installed with Adobe Shockwave Player, and is prone to a remote code execution vulnerability. A flaw is present in the IML32.dll module, as it fails to validate certain fields before using them to calculate sizes used for later memory copy operations. Successful exploitation could allow an attacker to execute arbitrary code and crash the application.


Pages:      Start    1278    1279    1280    1281    1282    1283    1284    1285    1286    1287    1288    1289    1290    1291    ..   1429

© SecPod Technologies