![]() These updates resolve integer overflow vulnerabilities that could lead to code execution (CVE-2013-2727, CVE-2013-2729). These updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2013-2730, CVE-2013-2733). These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2013-2724). These updates resolve an information leakage issue involving a Javascript API (CVE-2013-2737). ![]() These updates resolve a use-after-free vulnerability that could lead to a bypass of Adobe Reader’s sandbox protection (CVE-2013-2550). These updates resolve an integer underflow vulnerability that could lead to code execution (CVE-2013-2549). ![]() This update address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |