[Forgot Password]
Login  Register Subscribe

24544

 
 

132176

 
 

121100

 
 

909

 
 

98726

 
 

148

 
 
Paid content will be excluded from the download.

Filter
Matches : 13793 Download | Alert*

The host is installed with Foxit Reader 8.3.1.21155 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly open a malicious file. Successful exploitation could allow remote attackers to execute arbitrary code.

The host is installed with Foxit Reader 8.3.1.21155 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly open a malicious file. Successful exploitation could allow remote attackers to disclose sensitive information.

The host is installed with Foxit Reader 8.3.1.21155 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly validate user supplied data. Successful exploitation could allow remote attackers to disclose sensitive information.

The host is installed with Foxit Reader 6.1 through 6.2.x or 7.x before 7.2.2 and is prone to elevation of privileges vulnerability. A flaw is present in the Foxit Cloud Update Service (FoxitCloudUpdateService), which fails to handle crafted data on shared memory region, which triggers memory corruption. Successful exploitation allow local attackers to gain privileges.

The host is installed with Foxit Reader 6.1 through 7.0.6.1126 and is prone to an unquoted windows search path vulnerability. A flaw is present in the application which fails to handle a Trojan horse program in the %SYSTEMDRIVE% folder. Successful exploitation allows local users to gain privileges.

The host is installed with Foxit Reader before 5.0.2.0718 and is prone to untrusted search path vulnerability. A flaw is present in the application which is caused due to the insecure loading of the DLLs. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with Foxit Reader and is prone to integer overflow vulnerability. A flaw is present in FreeType engine in the application which fails to decode the Type 1 font in a PDF document due to lack of a numerical boundary checking. Successful exploitation allow remote attackers to execute arbitrary code or cause a denial of service.

The host is installed with Microsoft malware protection engine before 1.1.13704.0 for Microsoft Forefront Security for SharePoint, Windows Defender or Microsoft Security Essentials and is prone to a remote code execution vulnerability. A flaw is present in the mpengine.dll, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code in the security cont ...

The host is installed with Microsoft malware protection engine before 1.1.13804.0 for Microsoft Forefront Security for SharePoint, Windows Defender or Microsoft Security Essentials and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to prevent the Microsoft Malware Protection Engine ...

The host is installed with Microsoft malware protection engine before 1.1.13804.0 for Microsoft Forefront Security for SharePoint, Windows Defender or Microsoft Security Essentials and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted file. Successful exploitation allows attackers to execute arbitrary code in the security conte ...


Pages:      Start    1272    1273    1274    1275    1276    1277    1278    1279    1280    1281    1282    1283    1284    1285    ..   1379

© SecPod Technologies