[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26933 Download | Alert*

Buffer overflow in the Atlcom.get_atlcom ActiveX control in gp.ocx in Adobe Download Manager, as used in Adobe Reader and Acrobat 8.x before 8.2 and 9.x before 9.3, allows remote attackers to execute arbitrary code via unspecified parameters.

The host is installed with Adobe Reader or Acrobat 10.x through 10.1.1 or 9.x through 9.4.6 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader or Acrobat 10.x through 10.1.1 or 9.x through 9.4.6 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle PRC component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to heap corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Flash Player before 10.3.183.11 or 11.x before 11.1.102.55 or Adobe AIR before 3.1.0.4880 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    1491    1492    1493    1494    1495    1496    1497    1498    1499    1500    1501    1502    1503    1504    ..   2693

© SecPod Technologies