[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139176

 
 

909

 
 

113006

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 112944 Download | Alert*

The host is installed with Foxit Reader through 9.7.0.29455 and is prone to an arbitrary code execution vulnerability. A flaw exists exists within the processing of JPEG2000 files, which fails to properly validate user-supplied data. Successful exploitation could allow attackers to execute code in the context of the current process.

The host is installed with Foxit Reader through 9.7.0.29455 and is prone to an arbitrary code execution vulnerability. A flaw exists exists within the processing of JPEG2000 files, which fails to properly validate user-supplied data. Successful exploitation could allow attackers to execute code in the context of the current process.

The host is installed with Foxit PhantomPDF 9.6.0.25114 and is prone to a use-after-free vulnerability. A flaw is present in the application which fails to properly handle watermarks in AcroForms. Successful exploitation allows remote attackers to leverage this vulnerability to execute arbitrary code in the context of the current process.

The host is installed with Foxit Reader through 9.6.0.25114 and is prone to an arbitrary code execution vulnerability. A flaw exists exists within the processing of JPEG2000 files within CovertToPDF, which fails to properly validate user-supplied data. Successful exploitation could allow attackers to execute code in the context of the current process.

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding.To exploit this vulnerability, an attacker would need to run a specially crafted application against a se ...

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability ...

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability ...

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.To exploit the vul ...

A remote code execution vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system.To exploit the vulnerability, an attacker who has a domain user account could create a specially crafted request, causing Windows to execute arbitrary code with elevated per ...

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.The security update addresses the vulnerability by ensuring the Windows Kernel prope ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   11294

© SecPod Technologies