[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17483 Download | Alert*

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a PDF file containing Flash content with a crafted #1023 (3FFh) tag. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211.

The host is installed with Adobe Reader 9.x before 9.3.4 or 8.x before 8.2.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle a TrueType font with a large maxCompositePoints value in a Maximum Profile (maxp) table. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a .dir file containing duplicated LCSM entries in mmap record. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a .dir file with duplicated references to the same KEY* chunk. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a .dir file with a crafted mmap record containing an invalid length of a VSWV entry. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    931    932    933    934    935    936    937    938    939    940    941    942    943    944    ..   1748

© SecPod Technologies