[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.1, 8.x before 8.1.4 or 9.x before 9.1 and is prone to a denial of service vulnerability. The flaw is present in the JavaScript API, which fails to handle getAnnots Doc method in the JavaScript API. Successful exploitation allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle crafted PDF file that contains JBIG2 text region segments with Huffman encoding. Successful exploitation allows remote attackers to cause a denial of service (memory corru ...

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle crafted file that triggers memory corruption. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 filter, which fails to handle unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the Application, which fails to handle PDF file containing a malformed U3D model file with a crafted extension block. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to an integer overflow vulnerability. The flaw is present in the Application, which fails to handle PDF file containing unspecified parameters to the FlateDecode filter. Successful exploitation allows attackers to cause a denial of service or possibly execute arbitrary code, which ...

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to a denial of service vulnerability. The flaw is present in the Application, which fails to handle PDF document with a crafted TrueType font. Successful exploitation allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.3, 8.x before 8.1.6 or 9.x before 9.1.2 and is prone to an unspecified vulnerability. The flaw is present in the Application, which fails to handle unspecified vectors that trigger memory corruption. Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    1288    1289    1290    1291    1292    1293    1294    1295    1296    1297    1298    1299    1300    1301    ..   1429

© SecPod Technologies