Keyword: adobe tiff file vulnerability
95263 Total Search   |   Showing Results : 421 - 440
(RE: [Noteworthy] Flash 0day(CVE-2016-4117)) According to the report, Separately, Adobe officials warned that a newly discovered Flash vulnerability also gives attackers the ability to remotely
CVE-2014-0502,apsb14-07 Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe
(CVE-2018-7602) Web Client Common 1008739* - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB17-36) - 1 1009092 - Foxit PDF Reader JavaScript 'XFA Clone' Remote Code Execution Vulnerability
* indicates a new version of an existing rule Deep Packet Inspection Rules: DCERPC Services 1008432* - Microsoft Windows SMB Information Disclosure Vulnerability (CVE-2017-0267) 1008660* - Microsoft
Client Common 1009460 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB19-02) 1009452 - Microsoft Windows COM Elevation Of Privilege Vulnerability (CVE-2018-8550) 1009461 - Microsoft
control and run arbitrary code on infected system. The attack may be done via a PDF file with long arguments to unspecified JavaScript methods. Adobe Reader 8.1.1 and earlier versions,Adobe Acrobat
downloading capability. Information Theft This Trojan does not have any information-stealing capability. Other Details More information on this vulnerability can be found below: Adobe Reader and Acrobat .PDF
It takes advantage of the following vulnerabilities: Adobe Flash Player Vulnerability (CVE-2015-5119) SWF/Exploit.ExKit.AQ (ESET-NOD32); Troj/SWFExp-IM (Sophos); Exploit:SWF/Axpergle.D (Microsoft);
CVE-2015-3104 This Adobe Flash vulnerability is used by Angler Exploit Kit as a starting point in the infection chain that spreads a Point-of-Sale (PoS) malware reconnaissance. Trend Micro detects
CVE-2015-0336 This Adobe Flash vulnerability is used by Angler Exploit Kit as a starting point in the infection chain that spreads a Point-of-Sale (PoS) malware reconnaissance. Trend Micro detects
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to cause a denial of service (NULL pointer dereference) or
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to cause a denial of service (NULL pointer dereference) or
CVE-2010-1241 Heap-based buffer overflow in the custom heap management system in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows remote attackers to
vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1004073| 1004073 - Adobe Acrobat And Reader Remote Code Execution Vulnerability
unspecified vectors, a different vulnerability than CVE-2010-0194, CVE-2010-0201, and CVE-2010-0204. adobe acrobat 8.0.0,adobe acrobat 8.1,adobe acrobat 8.1.1,adobe acrobat 8.1.2,adobe acrobat 8.1.3,adobe
Adobe Acrobat And Reader Remote Buffer Overflow Vulnerability (CVE-2012-1525)
Adobe Acrobat And Reader Remote Buffer Overflow Vulnerability (CVE-2012-2049)
vulnerabilities in Microsoft Windows. The vulnerability could allow elevation of privilege when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. (MS16-135) Security Update for
successfully perform its intended routine. It takes advantage of the following vulnerabilities: Adobe Flash Player Integer Overflow Vulnerability (CVE-2015-8651) VirTool:SWF/Injector.C (Microsoft) Downloaded
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux, allow attackers to execute arbitrary code or cause a denial of service