[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198221 Download | Alert*

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to multiple vulnerabilities. A flaw is present in the application, which fails to validate user supplied data. Successful exploitation could allow an attacker to execute arbitrary code or crash the service.

The host is installed with Adobe Reader 8.x before 8.2.5 or 9.x before 9.4 and is prone to an unspecified vulnerability. A flaw is present in the application which fails to parse an image properly. Successful exploitation could allow an attacker to execute arbitrary code or lead to unspecified impact.

The host is installed with Adobe Reader 8.x before 8.2.5 and 9.x before 9.4 and is prone to an array-indexing vulnerability. A flaw is present in the application, which fails to handle an array-index error. Successful exploitation could allow an attacker to execute arbitrary code.

The host is missing a critical security update according to APSA10-02. The update is required to fix stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service ...

The host is missing a critical security update according to APSA10-02. The update is required to fix stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a PDF document with a long field in a Smart Independent Glyphlets (SING) table in a TTF font. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service ...

The host is installed with Adobe Reader 9.x through 9.3.4 or 8.x before 8.2.5 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle CoolType.dll. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Shockwave Player before 11.5.8.612 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly parse .dir files. Successful exploitation allows remote attackers to cause a denial of service or execute arbitrary code.

IML32.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3712 of a certain file.

DIRAPIX.dll in Adobe Shockwave Player before 11.5.8.612 does not properly validate a certain chunk size in the mmap chunk in a Director movie, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.

The host is installed with Adobe Shockwave Player before 11.5.8.612 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly validate a certain chunk size in the mmap chunk in a Director movie. Successful exploitation allows remote attackers to cause a denial of service or execute arbitrary code.


Pages:      Start    8987    8988    8989    8990    8991    8992    8993    8994    8995    8996    8997    8998    8999    9000    ..   19822

© SecPod Technologies