[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 193826 Download | Alert*

Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file.

The host is installed with Adobe Shockwave Player before 11.5.6.606 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted 3D model in a Shockwave file. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Reader 8.x before 8.2.0 or 9.x before 9.3.0 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the Atlcom.get_atlcom ActiveX control. Successful exploitation allows remote attackers to execute arbitrary code.

Buffer overflow in the Atlcom.get_atlcom ActiveX control in gp.ocx in Adobe Download Manager, as used in Adobe Reader and Acrobat 8.x before 8.2 and 9.x before 9.3, allows remote attackers to execute arbitrary code via unspecified parameters.

The host is installed with Adobe Reader or Acrobat 10.x through 10.1.1 or 9.x through 9.4.6 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader or Acrobat 10.x through 10.1.1 or 9.x through 9.4.6 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB11-30. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is missing a critical security update according to Adobe advisory, APSA11-04. The update is required to fix unspecified vulnerability. A flaw is present in the application, which fails to properly handle U3D component. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Reader 9.x through 9.4.6 and is prone to unspecified vulnerability. A flaw is present in the application, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSA11-04. The update is required to fix an unspecified vulnerability. A flaw is present in the application, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    8145    8146    8147    8148    8149    8150    8151    8152    8153    8154    8155    8156    8157    8158    ..   19382

© SecPod Technologies