[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Foxit PDF Reader through 12.0.2.12465 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.0.2.12465 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications which fails to properly handle the annotation objects. Successful exploitation allow attackers to execute code in the context of the curre ...

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle the exportXFAData method. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle certain XLS or DOC files. Successful exploitation results in remote code execution and crash when parsing certa ...

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle certain XLS or DOC files. Successful exploitation results in remote code execution and crash when parsing certa ...

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code due to the access of null pointe ...

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.2.15332 or Foxit PDF Editor through 10.1.12.37872 or 11.x through 11.2.6.53790 or 12.x through 12.1.2.15332 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to cause memory corruption and execute remote code.

The host is installed with Foxit PhantomPDF through 8.3.9.41099 or 9.x through 9.4.1.16828 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle malicious page or open a malicious file. Successful exploitation allow remote attackers to leverage this in conjunction with other vulnerabilities to execute code in the context of th ...


Pages:      Start    1714    1715    1716    1717    1718    1719    1720    1721    1722    1723    1724    1725    1726    1727    ..   2700

© SecPod Technologies