Latest CVE Feed
-
10.0
HIGHCVE-2017-3095
Adobe Digital Editions versions 4.5.4 and earlier have an exploitable memory corruption vulnerability in the PDF parsing engine. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : digital_editions- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3094
Adobe Digital Editions versions 4.5.4 and earlier have an exploitable memory corruption vulnerability in the PDF processing engine. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : digital_editions- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3093
Adobe Digital Editions versions 4.5.4 and earlier have an exploitable memory corruption vulnerability in the bitmap representation module. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : digital_editions- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3092
Adobe Digital Editions versions 4.5.4 and earlier contain an insecure library loading vulnerability. The vulnerability is due to unsafe library loading of editor control library functions in the installer plugin. A successful exploitation could lead to ar... Read more
Affected Products : digital_editions- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3090
Adobe Digital Editions versions 4.5.4 and earlier contain an insecure library loading vulnerability. The vulnerability is due to unsafe library loading of browser related library extensions in the installer plugin. A successful exploitation could lead to ... Read more
Affected Products : digital_editions- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3089
Adobe Digital Editions versions 4.5.4 and earlier have an exploitable memory corruption vulnerability in the PDF imaging model. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : digital_editions- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
CRITICALCVE-2017-3088
Adobe Digital Editions versions 4.5.4 and earlier have an exploitable memory corruption vulnerability in the PDF runtime engine. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : digital_editions- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
7.5
HIGHCVE-2017-3087
Adobe Captivate versions 9 and earlier have an information disclosure vulnerability resulting from abuse of the quiz reporting feature in Captivate.... Read more
Affected Products : captivate- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3086
Adobe Shockwave versions 12.2.8.198 and earlier have an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : shockwave_player- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3084
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability in the advertising metadata functionality. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : flash_player- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3083
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability in the Primetime SDK functionality related to the profile metadata of the media stream. Successful exploitation could lead to arbitrary code execution.... Read more
Affected Products : flash_player- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3082
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the LocaleID class. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3081
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability during internal computation caused by multiple display object mask manipulations. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3079
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the internal representation of raster data. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3078
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3077
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the PNG image parser. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3076
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the MPEG-4 AVC module. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
10.0
HIGHCVE-2017-3075
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability when manipulating the ActionsScript 2 XML class. Successful exploitation could lead to arbitrary code execution.... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
9.8
CRITICALCVE-2017-7679
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.... Read more
Affected Products : http_server- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025
-
7.5
HIGHCVE-2017-7668
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may... Read more
- Published: Jun. 20, 2017
- Modified: Apr. 20, 2025