[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Adobe Reader 8.1.3 or earlier and is prone to stack-based buffer overflow vulnerability. The flaw is present in the getPlus ActiveX, which fails to handle the unspecified vectors. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 9.x before 9.1, 8.x before 8.1.4 or 7.x before 7.1.1 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the JBIG2 symbol dictionary segment, which fails to handle PDF file with a malformed JBIG2 symbol dictionary segment. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.1, 8.x before 8.1.3, or 9.x before 9.1 and is prone to a stack-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle a crafted argument to the getIcon method of a Collab object. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.1.0, 8.1.3 or 9.0.0 and is prone to a heap-based buffer overflow vulnerability. The flaw is present in the application, which fails to handle a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader or Acrobat 7.x before 7.1.1, 8.x before 8.1.4 or 9.x before 9.1 and is prone to an unspecified vulnerability. The flaw is present in the JBIG2, which fails to handle PDF file with a malformed JBIG2 symbol dictionary segment. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader and Acrobat 9.x before 9.1, 8.x before 8.1.4 or 7.x before 7.1.1 and is prone to an unspecified vulnerability. The flaw is present in the JBIG2, which fails to handle unknown attack vectors related to JBIG2. Successful exploitation allows remote attackers to trigger memory corruption and possibly execute arbitrary code.

The host is installed with 7-zip before 18.0 and is prone to multiple memory corruption vulnerabilities. A flaw is present in the application, which fails to handle a crafted RAR archive. Successful exploitation could allow remote attackers to crash the service.

A remote code execution vulnerability exists in PowerShell Editor Services. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. In an attack scenario, an attacker could execute malicious code in a PowerShell Editor Services process. The update addresses the vulnerability by correcting how PowerShell Editor Services secures local connection ...

The host is installed with RSA SecurID Software Token 4.1 before 4.1.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to handle a Trojan horse DLL in the current working directory. Successful could allow the local users to gain privileges.

The host is installed with Microsoft Office 2007 SP3, Office 2010 SP2 or Office 2013 SP1 and is prone to a security feature bypass vulnerability. The flaw is present in the applications, which fails to handle a specially crafted file. Successful exploitation allows attackers to bypass security feature.


Pages:      Start    2631    2632    2633    2634    2635    2636    2637    2638    2639    2640    2641    2642    2643    2644    ..   2700

© SecPod Technologies