[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255479

 
 

909

 
 

198938

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 4561 Download | Alert*

The host is missing a critical security update according to APSB15-17 advisory. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the application, which fails to properly handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code or crash the service.

The host is missing a security update according to Adobe advisory, APSB14-10. The update is required to fix denial of service vulnerability. The flaw is present in the application, which fails to properly handle memory. Successful exploitation allow attackers to execute arbitrary code or cause a denial of service (memory corruption).

The host is missing a critical security update according to APSB10-03. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing a critical security update according to Adobe advisory, APSB15-10. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to execute arbitrary code, obtain sensitive information or cause a denial of service (memory corruption).

The host is missing a critical security update according to Adobe advisory, APSB14-19. The update is required to fix sandbox bypass vulnerability. The flaws are present in the applications, which fail to properly handle unspecified vectors. Successful exploitation allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context.

The host is missing a critical security update according to Adobe advisory, APSB09-07. The update is required to fix multiple vulnerabilities. The flaws are present in the JBIG2 filter, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is missing an important security update according to Adobe security bulletin, APSB19-58. The update is required to fix an insecure inherited permissions vulnerability. The flaws are present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to gain elevated privileges.

The host is missing a critical security update according to Adobe security bulletin, APSB19-47. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code or obtain sensitive information.

The host is missing a critical security update according to APSB10-01. The update is required to fix multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle memory. Successful exploitation allows attackers to execute arbitrary code.

The host is missing a critical security update according to security update, APSB10-29. A flaw is present in the application, which is caused by insecure loading of libraries. Successful exploitation allows attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll or aires.dll that is located in the same folder as an .ait or .eps file.


Pages:      Start    420    421    422    423    424    425    426    427    428    429    430    431    432    433    ..   456

© SecPod Technologies