A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on wi ...
The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Shockwave Player before 12.3.5.205 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
Unspecified vulnerability in Microsoft Excel 2000 through 2004 allows remote user-assisted attackers to execute arbitrary code via unspecified vectors. NOTE: this is a different vulnerability than CVE-2006-3086.
The host is installed with Qbik WinGate through 6.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a self-referencing compressed name pointer. Successful exploitation could allow remote attackers to cause a denial of service (CPU consumption).