[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27003 Download | Alert*

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.2.15332 or Foxit PDF Editor through 10.1.12.37872 or 11.x through 11.2.6.53790 or 12.x through 12.1.2.15332 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to cause memory corruption and execute remote code.

The host is installed with Foxit PhantomPDF through 8.3.9.41099 or 9.x through 9.4.1.16828 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle malicious page or open a malicious file. Successful exploitation allow remote attackers to leverage this in conjunction with other vulnerabilities to execute code in the context of th ...

The host is installed with Foxit PhantomPDF through 8.3.9.41099 or 9.x through 9.4.1.16828 and is prone to an information disclosure vulnerability. A flaw is present in the application which fails to properly handle malicious page or open a malicious file. Successful exploitation allow remote attackers to an attacker can leverage this in conjunction with other vulnerabilities to execute code in th ...

The host is installed with Foxit PhantomPDF through 8.3.9.41099 or 9.x through 9.4.1.16828 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application which fails to properly handle malicious page or open a malicious file. Successful exploitation allow remote attackers to an attacker can leverage this vulnerability to execute code in the context of the current p ...

The host is installed with Foxit PhantomPDF through 8.3.9.41099 or 9.x through 9.4.1.16828 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application which fails to properly handle malicious page or open a malicious file. Successful exploitation allow remote attackers to an attacker can leverage this vulnerability to execute code in the context of the current p ...

The host is installed with Foxit PhantomPDF before 8.3.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the issue in a wild pointer. Successful exploitation allow remote attackers to crash the application.

The host is installed with Foxit PhantomPDF before 8.3.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the "t.hidden = true" function. Successful exploitation could crash the application.

The host is installed with Foxit PhantomPDF before 8.3.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an issue in the signature dictionary. Successful exploitation could crash the application.

The host is installed with Foxit PhantomPDF before 8.3.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a validation issue. Successful exploitation could crash the application.


Pages:      Start    1715    1716    1717    1718    1719    1720    1721    1722    1723    1724    1725    1726    1727    1728    ..   2700

© SecPod Technologies