[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194074 Download | Alert*

The host is installed with Adobe Photoshop 22.x through 22.5.7 or 23.x through 23.3.2 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow leads to memory leak.

The host is missing an important security update according to Adobe advisory APSB22-35. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution and memory leakage

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers could corrupt memory to execute arbitrary code on the system.

The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed on the Adobe security page APSB11-02, listed in the References section. Multiple security flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws ...

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to integer overflow vulnerability. A flaw is present in the application, which may cause integer overflow using unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code on the system.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to integer overflow vulnerability. A flaw is present in the application, which may cause integer overflow using unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code on the system.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers to corrupt memory to execute arbitrary code on the system.


Pages:      Start    8058    8059    8060    8061    8062    8063    8064    8065    8066    8067    8068    8069    8070    8071    ..   19407

© SecPod Technologies