Search
Keyword: adobe tiff file vulnerability
CVE-2009-4324 Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote
CVE-2009-3459 Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file
dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: It takes advantage of vulnerability found in Adobe programs to download a possibly malicious file
vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code. An attacker
zero-day exploit for the following vulnerability: Adobe Flash Player Adobe Reader Acrobat More information on this vulnerability can be found below: APSA10-05
vulnerabilities to allow a remote user or malware/grayware to download files: Vulnerability in Adobe Acrobat and Reader Collab.collectEmailInfo() Method After successfully exploiting the said vulnerability, this
This malicious HTML file is related to the zero-day vulnerability in Internet Explorer 9 and 10, or CVE-2014-0322. The vulnerability makes use of a "hybrid exploit" where
Adobe Acrobat and Reader are prone to an unspecified security bypass vulnerability. Attackers can exploit the vulnerability to execute code. Apply associated Trend Micro DPI Rules. 1008000|
Adobe Acrobat and Reader are prone to an unspecified security bypass vulnerability. Attackers can exploit the vulnerability to execute code. Apply associated Trend Micro DPI Rules. 1008000|
CVE-2010-1278 Buffer overflow in the Atlcom.get_atlcom ActiveX control in gp.ocx in Adobe Download Manager, as used in Adobe Reader and Acrobat 8.x before 8.2 and 9.x before 9.3, allows remote
attackers to execute arbitrary code on the affected system. It takes advantage of the following vulnerabilities: Adobe Flash Player Remote Code Execution Vulnerability (CVE-2015-0336)
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Client Common 1009437* - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB18-41) - 1 1009440* - Adobe
CVE-2014-0581 This vulnerability in Adobe Flash Player can allow attackers to execute arbitrary code or cause denial of service (memory corruption) thus compromising the security of the system.
dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: This malware takes advantage of vulnerability found in Adobe programs to download a possibly
An information disclosure vulnerability exists in Adobe Flash Player that could allow an attacker to read the contents of the system via unspecified vector. Apply associated Trend Micro DPI Rules.
An information disclosure vulnerability exists in Adobe Flash Player that could allow an attacker to read the contents of the system via unspecified vector. Apply associated Trend Micro DPI Rules.
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and before 11.2.202.508 on Linux allows attackers to execute arbitrary code via unspecified vectors. Apply associated
Overflow Web Application PHP Based 1008817 - PHP WDDX NULL Pointer Dereference Vulnerability (CVE-2016-9934) Web Client Common 1009273 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB18-09)
specially crafted Microsoft Office file to exploit these vulnerabilities. (MS16-089) Security Update for Windows Secure Kernel Mode (3170050) Risk Rating: Important This security update resolves a
website and run when a user accesses the said website. NOTES: This is Trend Micro detection for specially crafted .SWF file that takes advantage of a vulnerability in certain versions of Adobe Flash Player