[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 10943 Download | Alert*

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a PDF file containing a malformed U3D model file with a crafted extension block. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a PDF file containing unspecified parameters to the FlateDecode filter. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to an integer overflow vulnerability. A flaw is present in the application, which fails to properly handle a PDF document with a crafted TrueType font. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a multiple heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF file with a JPX. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Adobe Reader before 8.1.6 or 9.x before 9.1.2 and is prone to a heap based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to crash the service or execute arbitrary code.

The host is installed with Oracle Weblogic Server 10.3.6.0, 12.1.3.0, 12.2.1.2 or 12.2.1.3 and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to take over the server without authorization.


Pages:      Start    1060    1061    1062    1063    1064    1065    1066    1067    1068    1069    1070    1071    1072    1073    ..   1094

© SecPod Technologies