[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14857 Download | Alert*

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to an out of bounds read vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to gain access to sensitive information.

The host is installed with Adobe Digital Editions before 4.5.9 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation allow attackers to perform arbitrary code execution.

The host is installed with Adobe Digital Editions before 4.5.8 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle crafted epub files. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with Adobe Digital Editions before 4.5.8 and is prone to a stack overflow vulnerability. A flaw is present in the application, which fails to handle crafted epub files. Successful exploitation allow attackers to disclose sensitive information.

The host is installed with AIMP 2.51 build 330 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a MP3 file with a long ID3 tag. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with AIMP 2.51 build 330 or earlier and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a long File1 argument. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with Adobe Presenter 6 or 7 before 7.0.1 and is prone to multiple cross-site scripting (XSS) vulnerabilities. The flaws are present in the application, which fails to handle vectors involving viewer.swf and loadflash.js. Successful exploitation allows attackers to inject arbitrary web script or HTML.

The host is installed with Comodo Antivirus 12.0.0.6870 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle an issue in IRP_MJ_CLEANUP requests in the minifilter for directory change notifications. Successful exploitation could allow attackers to cause a denial of service (BSOD) when an executable is run inside the container.

The host is installed with Citrix Receiver through 3.2 along with Citrix Receiver Online plug-in through 12.1 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to handle a specially crafted malicious file from an SMB or WebDAV fileserver. Successful exploitation allows an attacker to execute arbitrary code on the client device in the conte ...


Pages:      Start    1344    1345    1346    1347    1348    1349    1350    1351    1352    1353    1354    1355    1356    1357    ..   1485

© SecPod Technologies