[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249622

 
 

909

 
 

195521

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31251 Download | Alert*

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to re ...

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 2022.001.20117, Acrobat 2017 or Acrobat Reader 2017 before 2017.012.30229, Acrobat DC 2020 or Acrobat Reader DC 2020 before 2020.005.30334 and is prone to a use after free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to ...

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 2022.001.20117, Acrobat 2017 or Acrobat Reader 2017 before 2017.012.30229, Acrobat DC 2020 or Acrobat Reader DC 2020 before 2020.005.30334 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attacker ...

The host is installed with Acrobat DC Continuous or Acrobat Reader DC Continuous before 2022.001.20117, Acrobat 2017 or Acrobat Reader 2017 before 2017.012.30229, Acrobat DC 2020 or Acrobat Reader DC 2020 before 2020.005.30334 and is prone to a use after free vulnerability. A flaw is present in the applications, which fail to handle unspecified vectors. Successful exploitation allows attackers to ...

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 26.0.2 or earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows an attacker to memory leak.

The host is installed with Adobe Illustrator 2021 before 25.4.6 or Adobe Illustrator 2022 before 25.4.6 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.


Pages:      Start    1569    1570    1571    1572    1573    1574    1575    1576    1577    1578    1579    1580    1581    1582    ..   3125

© SecPod Technologies