[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198218 Download | Alert*

DIRAPI.dll in Adobe Shockwave Player before 11.5.8.612 does not properly parse .dir files, which allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a malformed file containing an invalid value, as demonstrated by a value at position 0x3812 of a certain file.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object's deletion, which allows attackers to execute arbitrary code via unspecified vectors.

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to dereference deleted heap object vulnerability. A flaw is present in the application, which will dereference a heap object after this object's deletion. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to dereference deleted heap object vulnerability. A flaw is present in the application, which fails to handle a object after its deletion. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x before 9.3.3 and is prone to a dereference deleted heap object vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Reader 9.x before 9.3.3 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle crafted data. Successful exploitation allows remote attackers to execute arbitrary code or crash the service.

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Adobe Reader 9.x before 9.3.3 or 8.x before 8.2.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2210, CVE-2010-2211, and CVE-2010-2212.

Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2211, and CVE-2010-2212.


Pages:      Start    8990    8991    8992    8993    8994    8995    8996    8997    8998    8999    9000    9001    9002    9003    ..   19821

© SecPod Technologies