Search
Keyword: adobe tiff file vulnerability
CVE-2014-0497 Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and before 11.2.202.336 on Linux allows remote attackers to execute
website and run when a user accesses the said website. NOTES: This is Trend Micro detection for specially crafted .SWF file that takes advantage of a vulnerability in certain versions of Adobe Flash Player
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/317201351045.jpeg PE_EXPIRO is a family of file infector malware first detected in 2010. In July 11, 2013, we detected a notable rise in PE_EXPIRO
successfully exploited, the vulnerability could allow denial of service. (MS16-050) Security Update for Adobe Flash Player (3154132) Risk Rating: Critical This security update resolves several vulnerabilities in
CVE-2015-2426 This vulnerability is assigned as CVE-2015-2426 and is described as the following: Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista
Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2011-0609 More information on this vulnerability can be found below: Adobe Security Bulletin APSA11-01 It does the following:
This Trojan takes advantage of the following software vulnerabilities to download possibly malicious files: Adobe Flash Player Integer Underflow Vulnerability (CVE-2014-0497) It then executes the
download possibly malicious files: Adobe Reader And Acrobat Integer wraparound vulnerability (CVE-2013-2729) It saves the files it downloads using the following names: %Temporary Internet Files%\{random
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
TROJ_WIMMIE.BYE (Note: %Program Files% is the default Program Files folder, usually C:\Program Files.) It drops the following non-malicious file: %User Temp%\Adobe-.pdf - non malciious PDF file opened by the
and earlier versions for Windows, Macintosh and UNIX (CVE-2010-2883) Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh (CVE-2010-2883) More information on this vulnerability can be
Server 2003.) It takes advantage of the following software vulnerabilities to drop malicious files: Adobe Flash Player 'SWF' File Remote Memory Corruption Vulnerability (CVE-2011-0611) It executes the
Adobe Flash Player Use After Free Vulnerability (CVE-2018-15982) 1009407 - Detected Suspicious DLL Side Loading Attempt Over WebDAV Integrity Monitoring Rules: There are no new or updated Integrity
Server (NPS). The vulnerability could cause denial of service (DoS) when exploited successfully by an attacker. (MS16-022) Security Update for Adobe Flash Player (3135782) Risk Rating: Critical This
process of evaluating the schedule for an update to resolve this vulnerability.' 1004393| 1004393 - Adobe Reader SING Table Parsing Vulnerability
CVE-2014-0509,apsb14-09 Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 11.7.700.275 and 11.8.x through 13.0.x before 13.0.0.182 on Windows and before 11.2.202.350 on Linux
vulnerabilities to allow a remote user or malware/grayware to download files: Collab.collectEmailInfo function in certain versions of Adobe Acrobat and Reader After successfully exploiting the said vulnerability,
the following software to drop malicious files: Adobe Vulnerability CVE-2009-4324 It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected
Update for Microsoft Office (3194063) Risk Rating: Important This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office
vulnerability in Microsoft Silverlight that could allow remote code execution. The vulnerability is exploited when a user visits a compromised website that contains a specially crafted Silverlight application.