[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194770 Download | Alert*

Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave f ...

Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file.

The host is installed with Adobe Shockwave Player before 11.5.6.606 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted 3D model in a Shockwave file. Successful exploitation allows remote attackers to execute remote code.

The host is installed with Adobe Reader 8.x before 8.2.0 or 9.x before 9.3.0 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the Atlcom.get_atlcom ActiveX control. Successful exploitation allows remote attackers to execute arbitrary code.

Buffer overflow in the Atlcom.get_atlcom ActiveX control in gp.ocx in Adobe Download Manager, as used in Adobe Reader and Acrobat 8.x before 8.2 and 9.x before 9.3, allows remote attackers to execute arbitrary code via unspecified parameters.

The host is installed with Adobe Reader or Acrobat 10.x through 10.1.1 or 9.x through 9.4.6 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader or Acrobat 10.x through 10.1.1 or 9.x through 9.4.6 and is prone to unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to Adobe advisory, APSB11-30. The update is required to fix multiple denial of service vulnerabilities. The flaws are present in the application, which fails to sanitize user supplied input. Successful exploitation could allow attackers to crash the service.

The host is missing a critical security update according to Adobe advisory, APSA11-04. The update is required to fix unspecified vulnerability. A flaw is present in the application, which fails to properly handle U3D component. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Adobe advisory, APSA11-04. The update is required to fix an unspecified vulnerability. A flaw is present in the applications, which fail to properly handle U3D component. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.


Pages:      Start    8372    8373    8374    8375    8376    8377    8378    8379    8380    8381    8382    8383    8384    8385    ..   19476

© SecPod Technologies