[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198218 Download | Alert*

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The host is missing a critical security update according to APSB10-25. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fail to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to stack overflow vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows attackers to execute arbitrary code via unspecified vectors.

Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows attackers to execute arbitrary code via unspecified vectors.

The host is missing a critical security update according to APSB10-25. The update is required to fix multiple memory corruption vulnerabilities. The flaws are present in the application, which fail to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code.

An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly reallocate a buffer when processing a DEMX chunk in a Director file. Successful exploitation allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.

The host is missing a critical security update according to APSA10-04. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.


Pages:      Start    8994    8995    8996    8997    8998    8999    9000    9001    9002    9003    9004    9005    9006    9007    ..   19821

© SecPod Technologies