Page 19 of 105 results (0.008 seconds)

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

Adobe Bridge versions 10.0.1 and earlier version have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . Adobe Bridge versiones 10.0.1 y versiones anteriores, presenta una vulnerabilidad de uso de la memoria previamente liberada. Una explotación con éxito podría conllevar a una ejecución de código arbitraria This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TrueType fonts. • https://helpx.adobe.com/security/products/bridge/apsb20-19.html • CWE-416: Use After Free •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . Adobe Bridge versiones 10.0.1 y versiones anteriores, presenta una vulnerabilidad de escritura fuera de límites. Una explotación con éxito podría conllevar a una ejecución de código arbitraria This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of the drop command in PostScript. • https://helpx.adobe.com/security/products/bridge/apsb20-19.html • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . Adobe Bridge versiones 10.0.1 y versiones anteriores, presenta una vulnerabilidad de escritura fuera de límites. Una explotación con éxito podría conllevar a una ejecución de código arbitraria This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of GIF files. • https://helpx.adobe.com/security/products/bridge/apsb20-19.html • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 1%CPEs: 2EXPL: 0

Adobe Bridge versions 10.0.1 and earlier version have a stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution. Adobe Bridge versiones 10.0.1 y versiones anteriores, presenta una vulnerabilidad de desbordamiento del búfer en la región stack de la memoria. Una explotación con éxito podría conllevar a una ejecución de código arbitraria This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of the BoundingBox element in PostScript. • https://helpx.adobe.com/security/products/bridge/apsb20-19.html • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution . Adobe Bridge versiones 10.0.1 y versiones anteriores, presenta una vulnerabilidad de escritura fuera de límites. Una explotación con éxito podría conllevar a una ejecución de código arbitraria This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Bridge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of the put command in PostScript. • https://helpx.adobe.com/security/products/bridge/apsb20-19.html • CWE-787: Out-of-bounds Write •