The host is installed with Adobe Shockwave Player before 11.5.6.606 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted 3D model in a Shockwave file. Successful exploitation allows remote attackers to execute remote code.
The host is installed with Adobe Reader 8.x before 8.2.0 or 9.x before 9.3.0 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the Atlcom.get_atlcom ActiveX control. Successful exploitation allows remote attackers to execute arbitrary code.
The host is installed with Adobe Reader or Acrobat 10.x through 10.1.1 or 9.x through 9.4.6 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Reader 9.x through 9.4.6, Adobe Redader or Acrobat 10.x through 10.1.1 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle PRC component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to heap corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.
The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.