Successful exploitation of a maliciously crafted web contentmay leadto arbitrary code execution
multiple memory corruption issues ... if exploited by a maliciously crafted web contentcould leadto arbitrary code execution
an issue where processing maliciously crafted Web contentmay leadto arbitrary code execution
an issue ... processing maliciously crafted Web contentmay leadto arbitrary code execution
a flaw ... Processing maliciously crafted web contentmay leadto arbitrary code execution
Both vulnerabilities ... maliciously crafted web contentcould leadto arbitrary code execution
The vulnerabilities ... a buffer overflow , use - after - free and other memory corruption issuescan leadto arbitrary code execution
It fixes an issue where processing maliciously crafted Web contentmay leadto arbitrary code execution
A specially crafted malformed file ... a heap overflowcan resultin arbitrary code execution
Successful exploitation of this vulnerabilitymay leadto arbitrary code execution
Successful exploitation of this vulnerabilitycould leadto arbitrary code execution
Successful exploitation of the vulnerabilityleadsto arbitrary code execution
Successful exploitation of this vulnerabilitycan leadto arbitrary code execution
Successful exploitation of vulnerabilityleadsto arbitrary code execution
Successful exploitation of the vulnerabilitycan possibly leadto arbitrary code execution
Successful exploitation of the vulnerabilitycould leadto arbitrary code execution
Processing maliciously crafted web contentmay leadto arbitrary code execution
The processing maliciously crafted web contentmay leadto arbitrary code execution
Processing maliciously crafted web contentmay leadto arbitrary code execution
by processing maliciously crafted web contentmay leadto arbitrary code execution
Processing maliciously crafted web contentmay leadto arbitrary code execution
maliciously crafted web content processingleadingto arbitrary code execution
Processing maliciously crafted web contentwill leadto arbitrary code execution
that processing maliciously crafted web contentmay leadto arbitrary code execution
a critical buffer overflow vulnerabilityleadsto arbitrary code execution
Processing a maliciously crafted audio filemay leadto arbitrary code execution
This vulnerability can allow an attacker to overflow a vulnerable buffer on the heap-possibly leadingto arbitrary code execution
Processing a maliciously crafted font filemay leadto arbitrary code execution
Client Successful exploitation of these vulnerabilitiesmay resultin arbitrary code execution
Successful exploitation of these vulnerabilitiescould leadto arbitrary code execution
Successful exploitation of the vulnerabilitiesleadsto arbitrary code execution
An authenticated , remote attacker can exploit this , via specially crafted requestto causethe execution of arbitrary code
A successful attack can trigger a memory corruptionleadingto arbitrary code execution
The vulnerabilities ... memory corruption issuescan leadto arbitrary code execution
This memory corruption vulnerabilitycould potentially resultin arbitrary code execution
A memory corruption vulnerabilitycan leadto arbitrary code execution
memory allocation to occurcausedmemory allocation to occur
crashesto causecrashes
in a denial of servicecould resultin a denial of service
in root compromisecould resultin root compromise
in Flash Player 10.1.82.76 ... currentlyhas been discoveredin Flash Player 10.1.82.76 ... currently
in a loss of integrityresultingin a loss of integrity
ARCserve Backup to dereference arbitrary pointerscausesARCserve Backup to dereference arbitrary pointers
to data leakage or operating systemcould leadto data leakage or operating system
in a loss of integrityresultingin a loss of integrity
in a loss of integrityresultingin a loss of integrity
in any given two - month period , such as the period between 1.0PR and 1.0would be discoveredin any given two - month period , such as the period between 1.0PR and 1.0
to OS compromisecan leadto OS compromise
a buffer overflowcausinga buffer overflow
in heap - based buffer overflow on the affected systemmay resultin heap - based buffer overflow on the affected system
to a system compromiseleadingto a system compromise
to system compromiseleadingto system compromise
to the compromise of the systemleadsto the compromise of the system
to memory corruptionleadsto memory corruption
in memory corruptionresultsin memory corruption
in memory corruptionresultin memory corruption
in memory corruption on the affected systemmay ... resultin memory corruption on the affected system
in possible privilege escalationresultingin possible privilege escalation
a stack based buffer overflowcausinga stack based buffer overflow
to data leakage andcould ... leadto data leakage and
in sensitive data leakagecould resultin sensitive data leakage
to an information disclosurecould leadto an information disclosure
to information disclosuremay leadto information disclosure
in a complete system compromisecould resultin a complete system compromise
in a loss of integrityresultingin a loss of integrity
to an information dcould leadto an information d
a stack basedcausinga stack based
to a permanent device compromisecould leadto a permanent device compromise
in complete compromise of the firewallresultedin complete compromise of the firewall
in a loss of integrityresultingin a loss of integrity
in escalation of privilegesresultingin escalation of privileges
in a Denial of Service attackcould resultin a Denial of Service attack
in a loss of confidentialityresultingin a loss of confidentiality
in complete security bypassresultsin complete security bypass
in a loss of availability or integrityresultingin a loss of availability or integrity
to the possibility of a local permanent device compromise , which may require reflashing the operating system to repair the deviceleadingto the possibility of a local permanent device compromise , which may require reflashing the operating system to repair the device