Pwn2Own – Wikipedia.Adobe fixes critical security vulnerabilities in Acrobat, Reader

Looking for:

– Adobe acrobat x pro vulnerabilities free

Click here to Download

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. The first contest in [1] was conceived and developed by Dragos Ruiu in response to his frustration with Apple Inc.

Any conference attendee that could connect to this wireless access point and exploit one of the devices would be able to leave the conference with that laptop. There was no monetary reward. The vulnerabilities sold to ZDI are made public only after the affected vendor has issued a patch for it. For the rules were changed to a capture-the-flag style competition with a point system, [14] At and Chrome was successfully exploited for the first time, by regular competitor VUPEN.

Other prizes such as laptops were also given to winning researchers. Winners of the contest receive the device that they exploited and a cash prize. Only certain attacks were allowed and these restrictions were progressively loosened over the three days of the conference.

In order to win the 15″ MacBook Pro, contestants would be required to further escalate their privileges to root after gaining access with their initial exploit. The laptops were not hacked on the first day. When clicked, the link gave Macauley control of the laptop, winning the contest by proxy for Dai Zovi, who gave Macaulay the 15″ MacBook Pro.

The contest would demonstrate the widespread insecurity of all software in widespread use by consumers. Day 2 had browser and Instant messaging attacks included, as well as malicious website attacks with links sent to organizers to be clicked.

Their exploit targeted an open-source subcomponent of the Safari browser. After having considerably more success targeting web browsers than any other category of software in , the third Pwn2Own focused on popular browsers used on consumer desktop operating systems.

It added another category of mobile devices which contestants were challenged to hack via many remote attack vectors including email, SMS messages, and website browsing. All browsers were fully patched and in default configurations on the first day of the contest. As in previous years, the attack surface contest expanded over the three days. On day 2, Adobe Flash, Java, Microsoft.

On day 3, other popular third party plugins were included like Adobe Reader. Multiple winners per target were allowed, but only the first contestant to exploit each laptop would get it.

As with the browser contest, the attack surface available to contestants expanded over three days. In order to prove that they were able to successfully compromise the device, contestants had to demonstrate they could collect sensitive data from the mobile device or incur some type of financial loss from the mobile device owner. Wifi if on by default , Bluetooth if on by default , and radio stack were also in-scope.

Wifi was turned on and Bluetooth could be turned on and paired with a nearby headset additional pairing disallowed. Day 3 allowed one level of user interaction with the default applications. Multiple winners per device were allowed, but only the first contestant to exploit each mobile device would get it along with a one-year phone contract.

Concerning outcome, based on the increased interest in competing in , ZDI arranged a random selection to determine which team went first against each target. He exploited Safari on OS X without the aid of any browser plugins. Nils successfully ran an exploit against Internet Explorer 8 on Windows 7 Beta. Although Miller had already exploited Safari on OS X, Nils exploited this platform again, [31] then moved on to exploit Firefox successfully.

At the time, OS X had Java enabled by default which allowed for reliable exploitation against that platform. However, due to having reported the vulnerabilities to the vendor already, Tinnes’ participation fell outside the rules of the contest and was unable to be rewarded.

Chrome, as well as all of the mobile devices, went unexploited in Pwn2Own The Opera web browser was left out of the contests as a target: The ZDI team argued that Opera had a low market share and that Chrome and Safari are only included “due to their default presence on various mobile platforms”. However, Opera’s rendering engine, Presto , is present on millions of mobile platforms. The contest took place between March 9 until 11th during the CanSecWest conference in Vancouver.

New to the Pwn2Own contest was the fact that a new attack surface was allowed for penetrating mobile phones, specifically over cellphone basebands. Several teams registered for the desktop browser contest. For the mobile browser category, the following teams registered. During the first day of the competition, Safari and Internet Explorer were defeated by researchers. Safari was version 5. Internet Explorer was a bit version 8 installed on bit Windows 7 Service Pack 1.

This was demonstrated Just as with Safari. The iPhone was running iOS 4. The team of Vincenzo Iozzo, Willem Pinckaers, and Ralf Philipp Weinmann took advantage of a vulnerability in the Blackberry’s WebKit based web browser by visiting their previously prepared webpage. Sam Thomas had been selected to test Firefox, but he withdrew stating that his exploit was not stable.

The researchers that had been chosen to test Android and Windows Phone 7 did not show up. Chrome and Firefox were not hacked. For the rules were changed to a capture-the-flag style competition with a point system. At Pwn2Own , Chrome was successfully exploited for the first time. VUPEN declined to reveal how they escaped the sandbox, saying they would sell the information. Safari on Mac OS X Lion was the only browser left standing at the conclusion of the zero day portion of pwn2own.

Google withdrew from sponsorship of the event because the rules did not require full disclosure of exploits from winners, specifically exploits to break out of a sandboxed environment and demonstrated exploits that did not “win”.

Non-Chrome vulnerabilities used were guaranteed to be immediately reported to the appropriate vendor. In , Google returned as a sponsor and the rules were changed to require full disclosure of exploits and techniques used.

French security firm VUPEN has successfully exploited a fully updated Internet Explorer 10 on Microsoft Surface Pro running a bit version of Windows 8 and fully bypassed Protected Mode sandbox without crashing or freezing the browser.

The company used a total of 11 distinct zero-day vulnerabilities. At the contest in March , “each of the winning entries was able to avoid the sandboxing mitigations by leveraging vulnerabilities in the underlying OSs. Google Pixel was not hacked. In , the conference was much smaller and sponsored primarily by Microsoft. China had banned its security researchers from participating in the contest, despite Chinese nationals winning in the past, and banned divulging security vulnerabilities to foreigners.

Nevertheless, certain openings were found in Edge, Safari, Firefox and more. In October , Politico reported that the next edition of Pwn2Own had added industrial control systems. Also entered was the Oculus Quest virtual reality kit. They did so by hacking into the “patch gap” that meshed older software patched onto other platforms, as the smart screen used an old version of Chromium. Overall, the contest had 14 winning demonstrations, nine partial wins due to bug collisions, and two failed entries.

The spring edition of Pwn2Own occurred on March 18—19, Tesla again returned as a sponsor and had a Model 3 as an available target. The Zero Day Initiative decided to allow remote participation. This allowed researchers to send their exploits to the program prior to the event. ZDI researchers then ran the exploits from their homes and recorded the screen as well as the Zoom call with the contestant.

ZDI researchers in Toronto ran the event, with others connecting from home. This contest also saw the inclusion of storage area network SAN servers as a target. On April 6—8, , the Pwn2Own contest took place in Austin and virtually. Zoom Messenger was compromised on the second day of the contest with a zero-click exploit. NET Standard. Pwn2Own returned to Vancouver on May , , to celebrate the 15th anniversary [] of the contest. Also demonstrated were successful demonstrations against the Mozilla Firefox and Apple Safari web browsers.

Researchers from the Synacktiv Team were able to remotely start the windshield wipers, open the trunk, and flash the headlights of the vehicle. All six of these exploits used unique bugs. From Wikipedia, the free encyclopedia. Computer hacking contest. This article needs to be updated. Please help update this article to reflect recent events or newly available information. April Archived from the original on May 27, Retrieved April 1, Vancouver: The Register.

Retrieved 10 April Archived from the original on January 25, Digital Vaccine Laboratories. Archived from the original on 29 March Retrieved 11 April Good poke at Vista UAC”. Zero Day Initiative. Archived from the original on March 18, Archived from the original on March 14,

 
 

 

– Adobe Acrobat – Wikipedia

 

Adobe AIR. Adobe After Effects. Adobe Analytics. Adobe Animate. Adobe Audition. Adobe Application Manager. Adobe BlazeDS. Adobe Brackets. Adobe Breeze. Adobe Bridge. Adobe Campaign. Adobe Captivate. Adobe Character Animator. Adobe ColdFusion. Adobe Connect. Adobe Contribute Publishing Services. Adobe Creative Suite. Adobe Creative Cloud Desktop.

Adobe Digital Editions. Adobe Dimension. Adobe DNG Converter. Adobe Document Server. Adobe Download Manager. Adobe Dreamweaver. Adobe Experience Manager. Adobe Experience Manager Forms. Adobe Framemaker. Adobe Flash. Adobe Flash Media Server. Adobe Flash Player. Adobe Flex. Adobe Form Client. Adobe Form Designer. Adobe Genuine Service. Adobe GoLive. Adobe Graphics Server. Adobe Illustrator. Adobe InCopy. Adobe InDesign. Adobe JRun. Adobe Lightroom.

Adobe LiveCycle Data Services. Adobe LiveCycle ES. Adobe LiveCycle Form Manager. Adobe LiveCycle Workflow. Adobe Media Encoder. Adobe Medium. Adobe ops-cli. Adobe PageMaker. Adobe PhoneGap. Adobe Photoshop.

Actionscript 2. The last version of Flash released by Macromedia was Flash 8 , which focused on graphical upgrades such as filters blur, drop shadow, etc. It introduced the ActionScript 3. Adobe Flex Builder built on Eclipse targeted the enterprise application development market, and was also released the same year. Flash 10 improved animation capabilities within the Flash editor, adding a motion editor panel similar to Adobe After Effects , inverse kinematics bones , basic 3D object animation, object-based animation, and other text and graphics features.

Flash Player 10 included an in-built 3D engine without GPU acceleration that allowed basic object transformations in 3D space position, rotation, scaling. With AIR, developers could access the file system the user’s files and folders , and connected devices such as a joystick, gamepad, and sensors for the first time. In May , Adobe announced that Adobe AIR was used in over , unique applications and had over 1 billion installations logged worldwide.

Adobe has taken steps to reduce or eliminate Flash licensing costs. For instance, the SWF file format documentation is provided free of charge [50] after they relaxed the requirement of accepting a non-disclosure agreement to view it in Adobe has not been willing to make complete source code of the Flash Player available for free software development and even though free and open source alternatives such as Shumway and Gnash have been built, they are no longer under active development.

On May 1, , Adobe announced the Open Screen Project , with the intent of providing a consistent application interface across devices such as personal computers, mobile devices , and consumer electronics. One of Flash’s primary uses on the Internet when it was first released was for building fully immersive, interactive websites. These were typically highly creative site designs that provided more flexibility over what the current HTML standards could provide as well as operate over dial-up connections.

Fully Flash-run sites fell out of favor for more strategic use of Flash plugins for video and other interactive features among standard HTML conventions, corresponding with the availability of HTML features like cascading style-sheets in the mid’s. Fifteen years later, WAP had largely been replaced by full-capability implementations and the HTML5 standard included more support for interactive and video elements.

Support for Flash in these mobile browsers was not included. In , Apple ‘s Steve Jobs famously wrote Thoughts on Flash , an open letter to Adobe criticizing the closed nature of the Flash platform and the inherent security problems with the application to explain why Flash was not supported on iOS.

While Adobe eventually won, allowing for other third-party development environments to get access to the iOS, Apple’s decision to block Flash itself was considered the “death blow” to the Flash application. In , Adobe ended support for Flash on Android. With Flash’s EOL announced, many browsers took steps to gradually restrict Flash content caution users before launching it, eventually blocking all content without an option to play it.

By January , all major browsers were blocking all Flash content unconditionally. Only IE11 , niche browser forks, and some browsers built for China plan to continue support.

Furthermore, excluding the China variant of Flash, Flash execution software has a built-in kill switch which prevents it from playing Flash after January 12, Adobe Flash will still be supported in China and worldwide on some specialized enterprise platforms beyond As early as , around the same time that Adobe began encouraging Flash developers to transition their works to HTML5 standards, others began efforts to preserve existing Flash content through emulation of Flash in open standards.

While some Flash applications were utilitarian, several applications had been shown to be experimental art, while others had laid the foundation of the independent video game development.

Google had developed the Swiffy application, released in , to convert Flash applications to HTML5-compatible scripts for viewing on mobile devices, but it was shut down in Closer to Flash’s EOL date in , there were more concentrated efforts simply to preserve existing Flash applications, including websites, video games, and animations beyond Flash’s EOL.

Flash source files are in the FLA format and contain graphics and animation, as well as embedded assets such as bitmap images, audio files, and FLV video files. The Flash source file format was a proprietary format and Adobe Animate and Adobe Flash Pro were the only available authoring tools capable of editing such files. Flash source files. Note that FLA files can be edited, but output.

Flash Video files [spec 1] have a. The use of vector graphics combined with program code allows Flash files to be smaller—and thus allows streams to use less bandwidth —than the corresponding bitmaps or video clips. For content in a single format such as just text, video, or audio , other alternatives may provide better performance and consume less CPU power than the corresponding Flash movie, for example, when using transparency or making large screen updates such as photographic or text fades.

In addition to a vector-rendering engine, the Flash Player includes a virtual machine called the ActionScript Virtual Machine AVM for scripting interactivity at run-time, with video, MP3-based audio, and bitmap graphics.

Virtually all browser plugins for video are free of charge and cross-platform, including Adobe’s offering of Flash Video, which was introduced with Flash version 6. Flash Video had been a popular choice for websites due to the large installed user base and programmability of Flash. In , Apple publicly criticized Adobe Flash, including its implementation of video playback for not taking advantage of hardware acceleration, one reason Flash was not to be found on Apple’s mobile devices.

Soon after Apple’s criticism, Adobe demoed and released a beta version of Flash Flash Flash Player supports two distinct modes of video playback, and hardware accelerated video decoding may not be used for older video content. Such content causes excessive CPU usage compared to comparable content played with other players. Flash allows sample rates of 11, 22 and Adobe Flash Player Flash Player Flash programs use ActionScript programming language.

It is an enhanced superset of the ECMAScript programming language, with a classical Java -style class model, rather than JavaScript ‘s prototype model. Several developers quickly created a C library for producing SWF. Macromedia also hired Middlesoft to create a freely available developers’ kit for the SWF file format versions 3 to 5. Macromedia made the Flash Files specifications for versions 6 and later available only under a non-disclosure agreement , but they are widely available from various sites.

In April , the Flash SWF file format specification was released with details on the then newest version format Flash 8. Although still lacking specific information on the incorporated video compression formats On2, Sorenson Spark, etc. The file format specification document is offered only to developers who agree to a license agreement that permits them to use the specifications only to develop programs that can export to the Flash file format.

The license does not allow the use of the specifications to create programs that can be used for playback of Flash files. The Flash 9 specification was made available under similar restrictions.

Previously, developers could not use the specification for making SWF-compatible players, but only for making SWF-exporting authoring software. The specification still omits information on codecs such as Sorenson Spark , however. The Adobe Animate authoring program is primarily used to design graphics and animation and publish the same for websites, web applications, and video games.

The program also offers limited support for audio and video embedding and ActionScript scripting. Adobe released Adobe LiveMotion , designed to create interactive animation content and export it to a variety of formats, including SWF. LiveMotion failed to gain any notable user base. In February , Macromedia purchased Presedia, which had developed a Flash authoring tool that automatically converted PowerPoint files into Flash.

Macromedia subsequently released the new product as Breeze, which included many new enhancements. Various free and commercial software packages can output animations into the Flash SWF format including:. The Flash 4 Linux project was an initiative to develop an open source Linux application as an alternative to Adobe Animate. Development plans included authoring capacity for 2D animation, and tweening , as well as outputting SWF file formats.

UIRA intended to combine the resources and knowledge of the F4L project and the Qflash project, both of which were Open Source applications that aimed to provide an alternative to the proprietary Adobe Flash. Adobe provides a series of tools to develop software applications and video games for Flash:.

Third-party development tools have been created to assist developers in creating software applications and video games with Flash.

Adobe Flash Player is the multimedia and application player originally developed by Macromedia and acquired by Adobe Systems. Scaleform GFx is a game development middleware solution that helps create graphical user interfaces or HUDs within 3D video games.

It does not work with web browsers. Lightspark supports OpenGL -based rendering for 3D content. The player is also compatible with H. Gnash aimed to create a software player and browser plugin replacement for the Adobe Flash Player. Shumway was an open source Flash Player released by Mozilla in November It was built in JavaScript and is thus compatible with modern web browsers. In the same year that Shumway was abandoned, work began on Ruffle , a flash emulator written in Rust. Adobe Flash Player is currently only supported with the enterprise [1] [2] [4] and China [5] variants, it has been deprecated everywhere else.

The projector version is a standalone player that can open SWF files directly. Adobe Flash Player was previously available for a variety of mobile operating systems, including Android between versions 2.

Flash Player for smartphones was originally made available to handset manufacturers at the end of However, Flash content can be made to run on iOS devices in a variety of ways:. The mobile version of Internet Explorer for Windows Phone cannot play Flash content; [] however, Flash support is still present on the tablet version of Windows. Adobe Flash Lite is a lightweight version of Adobe Flash Player intended for mobile phones [] [ self-published source?

The only alternative is using HTML5 and responsive web design to build websites that support both desktop and mobile devices. Such games will not work in mobile web browsers but must be installed via the appropriate app store. The reliance on Adobe for decoding Flash makes its use on the World Wide Web a concern—the completeness of its public specifications are debated, and no complete implementation of Flash is publicly available in source code form with a license that permits reuse.

Generally, public specifications are what makes a format re-implementable see future proofing data storage , and reusable codebases can be ported to new platforms without the endorsement of the format creator. However, despite efforts of projects like Gnash, Swfdec , and Lightspark , a complete free Flash player is yet to be seen, as of September For example, Gnash cannot use SWF v10 yet.

Notable advocates of free software, open standards, and the World Wide Web have warned against the use of Flash:. The founder of Mozilla Europe , Tristan Nitot , stated in []. Companies building websites should beware of proprietary rich-media technologies like Adobe’s Flash and Microsoft’s Silverlight. You’re producing content for your users and there’s someone in the middle deciding whether users should see your content. I believe very strongly, that we need to agree on some kind of baseline video format if [the video element] is going to succeed.

Flash is today the baseline format on the web. The problem with Flash is that it’s not an open standard. Representing the free software movement , Richard Stallman stated in a speech in that: [] “The use of Flash in websites is a major problem for our community. Flash content is usually embedded using the object or embed HTML element.

Often, a plugin is required for the browser to fully implement these elements, though some users cannot or will not install it. Since Flash can be used to produce content such as advertisements that some users find obnoxious or take a large amount of bandwidth to download, some web browsers, by default, do not play Flash content until the user clicks on it, e.

Konqueror , K-Meleon. Most current browsers have a feature to block plugins, playing one only when the user clicks it. Opera versions since Opera Turbo requires the user to click to play Flash content, and the browser also allows the user to enable this option permanently. Both Chrome [] and Firefox [] have an option to enable “click to play plugins”.

Equivalent “Flash blocker” extensions are also available for many popular browsers: Firefox has Flashblock and NoScript , Internet Explorer has Foxie, which contains a number of features, one of them named Flashblock. For many years Adobe Flash Player’s security record [] has led many security experts to recommend against installing the player, or to block Flash content.

Active moves by third parties to limit the risk began with Steve Jobs in saying that Apple would not allow Flash on the iPhone , iPod Touch , and iPad — citing abysmal security as one reason.

In July , a series of newly discovered vulnerabilities resulted in Facebook ‘s chief security officer, Alex Stamos , issuing a call to Adobe to discontinue the software entirely [] and the Mozilla Firefox web browser, Google Chrome , and Apple Safari to blacklist all earlier versions of Flash Player. Flash cookies are not shared across domains. From Wikipedia, the free encyclopedia. Deprecated multimedia platform used to add animation and interactivity to websites.

This article is about the multimedia software platform. For the player, see Adobe Flash Player. Harman —present for enterprise users [1] [2] [3] [4] Zhongcheng —present in China [5] Adobe Inc. Main article: Rich web application. Main articles: List of Flash animated films and List of Flash animated television series. Main article: SWF. Main article: Stage3D. Main article: Flash Video. Main article: Adobe Animate. Main article: Comparison of vector graphics editors.

Main article: Adobe AIR. Main article: Adobe Flash Lite. Main article: OpenFL. See also: Vendor lock-in. Main article: Local shared object. Adobe Systems. Retrieved November 21, Harman International. Zhongcheng Network Technology Co. Retrieved January 17, Adobe Inc. July 25, Archived from the original on December 2, Retrieved July 1, Retrieved June 11, Smashing Magazine.

Smashing 3D. June 15, Retrieved February 4, Adobe Flex 3. ISBN Data Visualization with Flash Builder. Focal Press. O’Reilly Media, Inc. Game Informer. Retrieved February 3, Retrieved May 5, Windows Report – Error-free Tech Life. July 24, Retrieved June 18, Adobe Systems Inc. Archived from the original on February 4, Retrieved October 18, Retrieved February 12, Retrieved March 29, Archived from the original on May 16, Retrieved December 26, April 19, The New York Times.

ISSN Retrieved March 4, What’s New in Flash Player Ben Forta. May 9, It Just Changed Its Name”. Retrieved June 22, Retrieved on March 11, Archived from the original on August 11, Retrieved March 21, Mozilla Foundation Press Center.

San Francisco. November 7, Archived from the original on October 21,

 
 

– Adobe Acrobat – Wikipedia

 
 

For Home Users. Free Security Tools. Free Trials. Product Demos. Have you listened to our podcast? Listen now. Previous : Hacked Fortnite accounts and rent-a-botnet being pushed on Instagram. Sophos Cloud Optix Monitor 25 cloud assets for free.

Laughed at your bio. Take a third party risk management course for FREE. Copy Results Download Results. Press ESC to close.

Total number of vulnerabilities : Page : 1 This Page 2 3 4 5 6. How does it work? Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.

Adobe Acrobat Reader for Android version This could result in disclosure of sensitive information stored in databases used by the application. Exploitation requires a victim to download and run a malicious application. An issue was discovered in Adobe Acrobat Reader The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the image conversion module that handless TIFF data.

An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the JavaScript API related to color conversion. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TIFF processing in the XPS engine. Nikkel explained that some researchers are reporting massive increases in attacks with weaponized documents and theorizing the increase resulted from widespread remote work over the past year.

Home Innovation Security. Adobe said attackers have targeted Adobe Reader users on Windows. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that handles JPEG data. This vulnerability is an instance of a use after free vulnerability in the JavaScript API related to bookmark functionality. A successful attack can lead to code corruption, control-flow hijack, or a code re-use attack.

This vulnerability is an instance of a heap overflow vulnerability in the JavaScript engine. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module when processing metadata in JPEG images. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TTF font processing in the XPS module.

This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TIFF processing in the XPS module.

This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of TIFF processing within the XPS module. This vulnerability is an instance of a heap overflow vulnerability.

This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TIFF processing within the XPS module. This vulnerability is an instance of a use after free vulnerability in the rendering engine. The vulnerability is triggered by a crafted PDF file containing a video annotation and corresponding media files that is activated by the embedded JavaScript.

The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the document identity representation. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of JavaScript manipulation of an Annotation object.

This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the initial XPS page processing. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the XPS engine that adds vector graphics and images to a fixed page.

This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that parses TIFF metadata.

Previous post One moment, please.Adobe Photoshop CC Free Download [ GB] – 5k Pc Soft
Next post Parche para sony vegas pro 12 64 bits free download.Keygen for sony vegas pro 12 64 bit