The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.
The host is installed with Adobe Dimension before 3.4.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.