[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31422 Download | Alert*

The host is installed with Adobe Genuine Service before 6.6 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle secure library loading. Successful exploitation could allow an attacker with admin privileges to plant custom binaries and execute them with System permissions.

The host is installed with Adobe Audition 14.4 or before version and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Character Animator 4.4 or earlier version is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Character Animator 4.2 or earlier version is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Character Animator before 4.4.7 or 22.0 before 22.4 is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Character Animator through 4.4.7 or 22.x through 22.4 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Character Animator through 4.4.7 or 22.x through 22.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Premiere Pro before 15.4.1 and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Premiere Pro before 15.4.3 or 22.0 before 22.1.1 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Premiere Pro 15.2 or earlier version and is prone to an access of memory location after end of buffer vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code.


Pages:      Start    1916    1917    1918    1919    1920    1921    1922    1923    1924    1925    1926    1927    1928    1929    ..   3142

© SecPod Technologies