Keyword: adobe tiff file vulnerability
95263 Total Search   |   Showing Results : 341 - 360
Other Details This Trojan does the following: Takes advantage of a vulnerability in certain versions of Adobe Acrobat and Reader to execute an arbitrary code, thus, compromising system security.
CVE-2012-0754 NOTES: This specially-crafted MP4 is downloaded by its main component from certain website. It takes advantage of a vulnerability in certain versions of Adobe Flash Player. Once this .MP4 file is
Overflow Vulnerability (CVE-2020-25681) Ivanti Avalanche 1011655 - Ivanti Avalanche Directory Traversal Vulnerability (CVE-2022-36981) Web Client Common 1011694 - Adobe Acrobat And Reader Multiple Security
Adobe Acrobat and Reader are prone to an unspecified heap overflow vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack. Apply
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified memory corruption vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
associated Trend Micro DPI Rules. 1006301| 1006301 - Adobe Flash Player Remote Integer Overflow Vulnerability (CVE-2014-0569)
component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. NOTES: It exploits a vulnerability in the following: Adobe Reader and Acrobat 8.x
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.