[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 10723 Download | Alert*

The host is installed with Adobe Flash Player before 18.0.0.333, 19.x, 20.x before 21.0.0.182, Adobe AIR before 21.0.0.176, Internet Explorer 10, Internet Explorer 11 or Microsoft Edge and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Flash Player before 18.0.0.324, 19.x, 20.x before 20.0.0.267 , Adobe AIR before 20.0.0.233, Internet Explorer 10, Internet Explorer 11 or Microsoft Edge and is prone to an use-after-free vulnerability. A flaw is present in the applications, which fail to properly handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to handle a crafted resource. Successful exploitation allows local users to gain privilege in an unspecified ...

The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a den ...

The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cau ...

The host is installed with Adobe Photoshop CC 2014 before 15.2.4.58 or Adobe Photoshop CC 2015 before 16.1.2.355 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Photoshop CC 2014 before 15.2.4.58 or Adobe Photoshop CC 2015 before 16.1.2.355 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to handle a global object. Successful exploitation allows attackers to bypass javascript API execution restri ...

The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to a denial of service vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or cause a den ...

The host is installed with Adobe Reader or Acrobat before 11.0.14, Acrobat or Acrobat Reader DC Classic before 15.006.30119 or Acrobat or Acrobat Reader DC Continuous before 15.010.20056 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to bypass javascript API execution re ...


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   1072

© 2013 SecPod Technologies