[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198218 Download | Alert*

The host is missing a critical security update according to APSA10-04. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a Director file containing a crafted pamm chunk with an invalid size and number of sub-chunks. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.

The host is missing a critical security update according to Adobe advisory, APSB11-03. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader before 9.4.2 or 10.x before 10.0.1 and is prone to denial of service vulnerability. A flaw is present in EScript.api plugin, which causes memory corruption when processing the "printSeps()" function within a PDF document. Successful exploitation allows remote attackers to execute arbitrary code using a crafted PDF document and cause a denial of service condi ...

The host is missing a critical security update according to Adobe advisory, APSB11-03. The update is required to fix a multiple library-loading vulnerabilities. The flaws are present in the application, which fails to directly specify a fully qualified path to a dynamic-linked library (DLL). Successful exploitation allows attackers to execute arbitrary code on the system using a specially-crafted ...

The host is installed with Adobe Reader 9.0 before 9.4.1 and is prone to memory corruption vulnerability. A flaw is present in the application, which causes memory corruption when processing the "printSeps()" function within a PDF document. Successful exploitation allows remote attackers to execute arbitrary code using a crafted PDF document and cause a denial of service.

The host is installed with Adobe Acrobat or Adobe Reader and is prone to denial of service vulnerability. A flaw is present in EScript.api plugin in Adobe Acrobat and Adobe Reader 9.4.0, 8.1.7 and other versions, which causes memory corruption when processing the "printSeps()" function within a PDF document. Successful exploitation allows remote attackers to execute arbitrary code using a crafted ...

The host is installed with Adobe Reader 9.x through 9.4.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document that triggers memory corruption. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is missing a critical security update according to Adobe advisory, APSB11-03.The update is required to fix a multiple library-loading vulnerabilities. The flaws are present in the applications, which fail to directly specify a fully qualified path to a dynamic-linked library (DLL). Successful exploitation allows attackers to execute arbitrary code on the system using a specially-crafted l ...


Pages:      Start    8995    8996    8997    8998    8999    9000    9001    9002    9003    9004    9005    9006    9007    9008    ..   19821

© SecPod Technologies