[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Foxit PDF Reader through 12.0.1.12430 or Foxit PDF Editor through 10.1.9.37808 or 11.x through 11.2.3.53593 or 12.x through 12.0.1.12430 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications which fails to properly handle the parsing of U3D files. Successful exploitation allow attackers to execute code in the context of the curr ...

The host is installed with Foxit PDF Reader through 12.0.1.12430 or Foxit PDF Editor through 10.1.9.37808 or 11.x through 11.2.3.53593 or 12.x through 12.0.1.12430 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications which fails to properly handle the parsing of U3D files. Successful exploitation allow attackers to execute code in the context of the curr ...

The host is installed with Foxit PDF Reader through 12.0.1.12430 or Foxit PDF Editor through 10.1.9.37808 or 11.x through 11.2.3.53593 or 12.x through 12.0.1.12430 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle the parsing of U3D files. Successful exploitation allow attackers to execute code in the context of the curren ...

The host is installed with Foxit PDF Reader through 12.0.2.12465 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.0.2.12465 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications which fails to properly handle the annotation objects. Successful exploitation allow attackers to execute code in the context of the curre ...

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle the exportXFAData method. Successful exploitation allow attackers to execute arbitrary code.

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle certain XLS or DOC files. Successful exploitation results in remote code execution and crash when parsing certa ...

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle certain XLS or DOC files. Successful exploitation results in remote code execution and crash when parsing certa ...

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code due to the access of null pointe ...

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.


Pages:      Start    1714    1715    1716    1717    1718    1719    1720    1721    1722    1723    1724    1725    1726    1727    ..   2700

© SecPod Technologies