[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 16261 Download | Alert*

The host is installed with Adobe Shockwave Player and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle an integer overflow. Successful exploitation could allow an attacker to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 12.0.3.133 and is prone to memory corruption vulnerability. The flaw is present in the application, which fails to properly handle memory. Successful exploitation allow attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Shockwave Player and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to handle an integer overflow. Successful exploitation could allow an attacker to execute arbitrary code.

The host is installed with Adobe Flash Player before 11.7.700.232 or 11.8.x before 11.8.800.94 and is prone to heap based buffer overflow vulnerability. The flaw is present in the application, which fail to handle crafted data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Flash Player before 11.7.700.232 or 11.8.x before 11.8.800.94 and is prone to memory corruption vulnerability. The flaw is present in the application, which fail to handle crafted data. Successful exploitation could allow attackers to execute denial of service or execute arbitrary via unspecified vectors.

The host is installed with Adobe Flash Player before 11.7.700.232 or 11.8.x before 11.8.800.94 and is prone to an integer overflow vulnerability. The flaw is present in the application, which fail to handle PCM data that is not properly handled during resampling. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle the memory properly. Successful exploitation could allow an attacker to execute arbitrary code or crash the application.

The host is installed with Adobe Shockwave Player and is prone to a buffer overflow vulnerability. A flaw is present in the application, specific details regarding the vulnerability have not been made public. Successful exploitation could allow an attacker to overflow the memory or execute arbitrary code.

The host is installed with Adobe Shockwave Player and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle a specially crafted shockwave file. Successful exploitation could allow an attacker to execute arbitrary code, corrupt memory or crash the application.

The host is installed with Adobe Shockwave Player and is prone to a remote code execution vulnerability. A flaw is present in the application, as it fails to handle malicious requests. Successful exploitation could allow an attacker to execute arbitrary code or crash the application.


Pages:      Start    914    915    916    917    918    919    920    921    922    923    924    925    926    927    ..   1626

© SecPod Technologies