The host is installed with Foxit PDF Reader through 2023.2.0.21408 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356, 13.0.0.21632, 2023.1.0.15510 or 2023.2.0.21408 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle null pointer, wild pointer, or object that has been deleted or freed wi ...
The host is installed with Foxit PDF Reader through 2023.2.0.21408 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356, 13.0.0.21632, 2023.1.0.15510 or 2023.2.0.21408 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle null pointer, wild pointer, or object that has been deleted or freed wi ...
The host is installed with Foxit PDF Reader through 2023.2.0.21408 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356, 13.0.0.21632, 2023.1.0.15510 or 2023.2.0.21408 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle null pointer, wild pointer, or object that has been deleted or freed wi ...
The host is installed with Foxit PDF Reader through 2023.2.0.21408 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356, 13.0.0.21632, 2023.1.0.15510 or 2023.2.0.21408 and is prone to an arbitrary file creation vulnerability. A flaw is present in the applications which fails to properly handle executable files due to the failure to properly identify the f ...
The host is installed with Foxit PDF Reader through 2023.2.0.21408 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356, 13.0.0.21632, 2023.1.0.15510 or 2023.2.0.21408 and is prone to an arbitrary file creation vulnerability. A flaw is present in the applications which fails to properly handle executable files due to the failure to properly identify the f ...
The host is installed with Adobe Photoshop CC 22.x before 22.4.2 or 21.x before 21.2.9 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could lead to arbitrary code execution.
The host is installed with Adobe Bridge 11.0.2 and earlier and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Bridge 11.0.2 and earlier and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to read arbitrary files from the system.
The host is installed with Adobe Bridge 11.0.2 and earlier and is prone to an improper input validation vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Adobe Bridge 11.0.2 and earlier and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow attackers to execute arbitrary code.