[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14850 Download | Alert*

The host is installed with Adobe Reader or Adobe Acrobat and is prone to denial of service vulnerability. A flaw is present in the applications which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Adobe reader or Adobe Acrobat and is prone to cross document script execution vulnerability. A flaw is present in the applications which does not properly restrict script. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to denial of service vulnerability. A flaw is present in the applications which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Adobe Reader or Adobe Acrobat and is prone to memory corruption vulnerability. A flaw is present in the applications which fails to properly handle the memory. Successful exploitation allows remote attacker to execute arbitrary code.

The host is installed with Adobe Flash Player 10.3.181.23 or earlier and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to handle malicious data. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Flash Player before 10.3.183.16 or 11.x before 11.1.102.63 and is prone to information disclosure vulnerability. A flaw is present in the application, which does not properly handle integers. Successful exploitation allows attackers to obtain sensitive information via unspecified vectors.

The host is installed with Adobe Flash Player before 10.3.183.16 or 11.x before 11.1.102.63 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle the Matrix3D component. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe ColdFusion 11 before Update 19, 2016 before Update 11 or 2018 before Update 4 and is prone to a file extension blacklist bypass vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to cause arbitrary code execution.

The host is installed with Adobe ColdFusion 2016 before Update 11 or 2018 before Update 4 and is prone to a command injection vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to cause arbitrary code execution.

The host is installed with Adobe ColdFusion 11 before Update 19, 2016 before Update 11 or 2018 before Update 4 and is prone to a deserialization of untrusted data vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to cause arbitrary code execution.


Pages:      Start    1428    1429    1430    1431    1432    1433    1434    1435    1436    1437    1438    1439    1440    1441    ..   1484

© SecPod Technologies