[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139176

 
 

909

 
 

113006

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 112944 Download | Alert*

The spice-gtk packages provide a GIMP Toolkit widget for Simple Protocol for Independent Computing Environments clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Security Fix: * spice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows For more details about the s ...

The host is missing a critical servicing stack security update for ADV990001

The host is installed with Foxit PhantomPDF 9.6.0.25608 and is prone to a use-after-free vulnerability. A flaw is present in the application which fails to properly handle watermarks. Successful exploitation allows remote attackers to leverage this vulnerability to execute arbitrary code in the context of the current process.

The host is installed with Foxit Reader through 9.7.0.29455 and is prone to an arbitrary code execution vulnerability. A flaw exists within the parsing of form Annotation objects within AcroForms, which fails to properly validate existence of an object prior to performing operations on the object. Successful exploitation could allow attackers to execute code in the context of the current process.

The host is installed with Foxit PhantomPDF 9.7.0.29478 and is prone to a use-after-free vulnerability. A flaw is present in the application which fails to properly handle fxhtml2pdf.exe module. Successful exploitation allows remote attackers to leverage this vulnerability to execute arbitrary code in the context of the current process.

The host is installed with Foxit PhantomPDF 9.7.0.29478 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application which fails to properly handle the conversion of JPEG files to PDF. Successful exploitation allows remote attackers to leverage this vulnerability to execute arbitrary code in the context of the current process.

The host is installed with Foxit PhantomPDF 9.7.0.29478 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application which fails to properly handle the conversion of HTML files to PDF. Successful exploitation allows remote attackers to leverage this vulnerability to execute arbitrary code in the context of the current process.

The host is installed with Foxit Reader through 9.7.0.29455 and is prone to an information disclosure vulnerability. A flaw exists exists within the processing of JPEG2000 files, which fails to properly validate user-supplied data. Successful exploitation could allow attackers to execute code in the context of the current process.

The host is installed with Foxit Reader through 9.7.0.29455 and is prone to an arbitrary code execution vulnerability. A flaw exists exists within the processing of JPEG2000 files, which fails to properly validate user-supplied data. Successful exploitation could allow attackers to execute code in the context of the current process.

The host is installed with Foxit Reader through 9.7.0.29455 and is prone to an arbitrary code execution vulnerability. A flaw exists exists within the processing of JPEG2000 files, which fails to properly validate user-supplied data. Successful exploitation could allow attackers to execute code in the context of the current process.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   11294

© SecPod Technologies