[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252416

 
 

909

 
 

196839

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26665 Download | Alert*

The host is installed with Foxit PDF Reader through 12.1.2.15332 or Foxit PDF Editor through 10.1.12.37872 or 11.x through 11.2.6.53790 or 12.x through 12.1.2.15332 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.

The host is installed with SumatraPDF 3.4.6 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted text file. Successful exploitation could allow attackers to cause a Denial of Service (DoS).

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a local privilege escalation vulnerability. A flaw is present in the applications which fails to properly handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability. On successful exploitation, the attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.

Microsoft SharePoint Server Security Feature Bypass Vulnerability.

Microsoft SharePoint Server Remote Code Execution Vulnerability.

Microsoft SharePoint Server Spoofing Vulnerability.

Microsoft Excel Remote Code Execution Vulnerability.

Microsoft SharePoint Remote Code Execution Vulnerability.

Microsoft Excel Remote Code Execution Vulnerability. An attacker must send the user a malicious file and convince them to open it.


Pages:      Start    1603    1604    1605    1606    1607    1608    1609    1610    1611    1612    1613    1614    1615    1616    ..   2666

© SecPod Technologies