Search
Keyword: adobe tiff file vulnerability
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Flash Player is prone to a security bypass vulnerability. An attacker can exploit this vulnerability to bypass intended access restrictions and obtain sensitive information via unspecified
Adobe Flash Player is prone to a security bypass vulnerability. An attacker can exploit this vulnerability to bypass intended access restrictions and obtain sensitive information via unspecified
Adobe Flash Player is prone to a security bypass vulnerability. An attacker can exploit this vulnerability to bypass intended access restrictions and obtain sensitive information via unspecified
Adobe Flash Player is prone to a security bypass vulnerability. An attacker can exploit this vulnerability to bypass intended access restrictions and obtain sensitive information via unspecified
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified
CVE-2009-1868 Heap-based buffer overflow in Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to cause a denial of service (application
vulnerabilities to drop malicious files: Adobe Reader and Acrobat 'newplayer()' JavaScript Method Remote Code Execution Vulnerability It executes the dropped file(s). As a result, malicious routines of the dropped
Adobe Flash Player contains a vulnerability in the ActionScript 3 ByteArray class, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Ref:
Driver Denial of Service Vulnerability Multiple Adobe Font Driver Information Disclosure Vulnerabilities When exploited, the vulnerabilities may allow denial of service or information disclosure. Attackers
CVE-2009-2983 Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x through 7.1.4 allow attackers to cause a denial of service (memory corruption) or possibly execute arbitrary
Flash Player Vulnerability (CVE-2015-5119) NOTES: The SWF file uses the function loadBytes ActionScript3, which is used to load files and/or arbitrary codes. Executes arbitrary code
CVE-2015-5119 Adobe Flash Player contains a vulnerability in the ActionScript 3 ByteArray class, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when the Windows Common Log File System (CLFS) driver improperly handles objects in memory.
CVE-2011-0609 Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and