[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26496 Download | Alert*

The host is installed with Adobe Photoshop CC 2015 before 17.0.2 or Adobe Photoshop CC 2017 before 18.1 and is prone to an unquoted search path vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to cause an unknown impact.

The host is installed with Adobe Photoshop 22.x through 22.5.7 or 23.x through 23.3.2 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Photoshop 22.x through 22.5.7 or 23.x through 23.3.2 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow leads to memory leak.

The host is installed with Adobe Flash Player before 10.2.152.26 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in the application, which fails to avoid memory corruptions. Successful exploitation allows remote attackers could corrupt memory to execute arbitrary code on the system.

The host is installed with Adobe Shockwave Player before 11.5.9.620 and is prone to denial of service (memory corruption) vulnerability. A flaw is present in dirapi.dll module of the application, which fails to avoid memory corruptions. Successful exploitation allows a remote attacker to corrupt memory and execute arbitrary code on the system.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to re ...

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.


Pages:      Start    1418    1419    1420    1421    1422    1423    1424    1425    1426    1427    1428    1429    1430    1431    ..   2649

© SecPod Technologies