[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2581, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to APSB10-25. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fail to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to stack overflow vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.

The host is missing a critical security update according to APSB10-25. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fail to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly reallocate a buffer when processing a DEMX chunk in a Director file. Successful exploitation allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.

The host is missing a critical security update according to APSA10-04. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    8681    8682    8683    8684    8685    8686    8687    8688    8689    8690    8691    8692    8693    8694    ..   19630

© SecPod Technologies