[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26675 Download | Alert*

The host is installed with Adobe ColdFusion 11 before Update 15, 2016 before Update 7 or 2018 before Update 1 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow an attacker to obtain sensitive information.

The host is installed with Adobe ColdFusion 11 before Update 15, 2016 before Update 7 or 2018 before Update 1 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow an attacker to perform arbitrary folder creation.

The host is installed with Adobe ColdFusion 11 before Update 15, 2016 before Update 7 or 2018 before Update 1 and is prone to a directory listing vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow an attacker to obtain sensitive information.

The host is installed with Adobe ColdFusion 11 before Update 15, 2016 before Update 7 or 2018 before Update 1 and is prone to an unrestricted file upload vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow an attacker to cause arbitrary code execution.

The host is installed with Adobe ColdFusion 11 before Update 15, 2016 before Update 7 or 2018 before Update 1 and is prone to an arbitrary file overwrite vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation could allow an attacker to cause arbitrary file overwrite.

The host is installed with Adobe ColdFusion 10 before Update 15 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to cause a denial of service (resource consumption).

The host is installed with Adobe Reader or Acrobat 8.x before 8.1.2 or 7.x before 7.1.0 and is prone to multiple unspecified vulnerabilities. The flaws are present in the applications, which fails to handle the specially crafted file. Successful exploitation allows remote attackers to silently print the specially crafted file arbitrary number of times.

The host is installed with Adobe Reader or Acrobat 8.x before 8.1.2 or 7.x before 7.1.0 and is prone to security bypass vulnerability. The flaw is present in the application, which fails to handle the DOC.print function. Successful exploitation allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document.

The host is installed with Adobe Reader or Acrobat 8.x before 8.1.2 or 7.x before 7.1.0 and is prone to integer overflow vulnerability. The flaw is present the application, which fails to handle the printSepsWithParams function. Successful exploitation allows remote attackers to cause memory corruption.

The host is installed with Adobe Reader 8.1.2 and earlier or before 7.1.1 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to handle malformed PDF document. Successful exploitation allows remote attackers to cause application crash.


Pages:      Start    2590    2591    2592    2593    2594    2595    2596    2597    2598    2599    2600    2601    2602    2603    ..   2667

© SecPod Technologies