[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31177 Download | Alert*

The host is installed with Jenkins LTS through 2.235.4 or Jenkins rolling release through 2.242 and is prone to a buffer corruption vulnerability. A flaw is present in the application, which fails to properly handle issues in Jetty. Successful exploitation could allow unauthenticated attackers to obtain HTTP response headers that may include sensitive data intended for another user.

The host is installed with Jenkins LTS before 2.138.2 or Jenkins rolling release before 2.146 is prone to a remote code execution vulnerability. The flaw is present in the application, which fails to properly handle an issue in Stapler web framework. Successful exploitation allow attackers to obtain sensitive information through crafted URLs.

The host is installed with Foxit Reader 8.3.2.25013 and earlier and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at tiptsf!CPenInputPanel::FinalRelease+0x000000000000002f". Successful exploitation could allow remote attackers to exec ...

The host is installed with Foxit Reader 9.3.0.10826 and earlier and is prone to a signature validation bypass vulnerability. A flaw is present in the application, which fails to properly validate certain PDF file that is modified maliciously or contains non-standard signatures. Successful exploitation could allow remote attackers to bypass signature validation.

The host is installed with Foxit Reader 9.0.1.1049 and earlier and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly validate specially crafted PDF document. Successful exploitation could allow remote attackers to cause arbitrary code execution.

The host is installed with Foxit Reader 11.0 before 11.1 and is prone to an improper verification of cryptographic signature vulnerability. A flaw is present in the applications, which fails to properly handle signed documents. Successful exploitation could allow an attacker to write in an arbitrary file, and display controlled contents, during signature verification.

The host is installed with Foxit Reader 11.0 before 11.1 and is prone to an use after free vulnerability. A flaw is present in the applications, which fails to properly handle JavaScript. Successful exploitation could allow an attacker to trigger a use-after-free and execute arbitrary code.

The host is installed with Foxit Reader 11.0 before 11.1 and is prone to an use after free vulnerability. A flaw is present in the applications, which fails to properly handle JavaScript. Successful exploitation could allow an attacker to trigger a use-after-free and execute arbitrary code.

The host is installed with Foxit Reader 11.0 before 11.1 and is prone to an use after free vulnerability. A flaw is present in the applications, which fails to properly handle JavaScript. Successful exploitation could allow an attacker to trigger a use-after-free and execute arbitrary code.

The host is installed with Foxit Reader 11.0 before 11.1 and is prone to an use after free vulnerability. A flaw is present in the applications, which fails to properly handle JavaScript. Successful exploitation could allow an attacker to trigger a use-after-free and execute arbitrary code.


Pages:      Start    2073    2074    2075    2076    2077    2078    2079    2080    2081    2082    2083    2084    2085    2086    ..   3117

© SecPod Technologies