[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17483 Download | Alert*

The host is installed with Foxit PDF Reader before 10.1, or Foxit PDF Editor before 10.1 and is prone to a use-after-free vulnerability. A flaw is present in the applications which fails to properly handle an issue when there is a multiple interpretation error for /V (in the Additional Action and Field dictionaries). Successful exploitation allows attackers to cause a use-after-free can occur with ...

The host is installed with Foxit PDF Reader before 10.1, or Foxit PDF Editor before 10.1 and is prone to an uncontrolled search path element vulnerability. A flaw is present in the applications which fails to properly handle a trojan horse taskkill.exe in the current working directory. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Foxit PDF Reader before 10.1, or Foxit PDF Editor before 10.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications which fails to properly handle a certain shading calculation, when the number of outputs is unequal to the number of color components in a color space. Successful exploitation allows attackers to cause an out-of-bounds ...

The host is installed with Foxit PDF Reader before 10.1, or Foxit PDF Editor before 10.1 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the applications which fails to properly handle a crafted pdf document. Successful exploitation allows remote attackers to cause null pointer dereference attack.

The host is installed with Foxit PDF Reader before 10.1, or Foxit PDF Editor before 10.1 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications which fails to properly handle an issue when TslAlloc attempts to allocate thread local storage but obtains an unacceptable index value. Successful exploitation allows attackers to cause an exception that leads to a wri ...

The host is installed with Foxit PDF Reader before 10.1, or Foxit PDF Editor before 10.1 and is prone to a use-after-free vulnerability. A flaw is present in the applications which fails to properly handle an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Foxit PDF Reader before 9.7.1, or Foxit PDF Editor before 9.7.1 and is prone to a stack consumption vulnerability. A flaw is present in the applications which fails to properly handle a loop of an indirect object reference. Successful exploitation allows attackers to cause uncontrolled resource consumption.

The host is installed with Foxit PDF Reader before 9.7.1, or Foxit PDF Editor before 9.7.1 and is prone to a use-after-free vulnerability. A flaw is present in the applications which fails to properly handle a document that lacks a dictionary. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to a signature validation bypass vulnerability. A flaw is present in the applications which fails to properly handle a modified file or a file with non-standard signatures. Successful exploitation allows attackers to bypass signature validation.

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to a resource consumption vulnerability. A flaw is present in the applications which fails to properly handle long strings in the content stream. Successful exploitation allows attackers to cause resource consumption attack.


Pages:      Start    11    12    13    14    15    16    17    18    19    20    21    22    23    24    ..   1748

© SecPod Technologies