[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1440 Download | Alert*

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to a signature validation bypass vulnerability. A flaw is present in the applications which fails to properly handle a modified file or a file with non-standard signatures. Successful exploitation allows attackers to bypass signature validation.

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to a resource consumption vulnerability. A flaw is present in the applications which fails to properly handle long strings in the content stream. Successful exploitation allows attackers to cause resource consumption attack.

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to a resource consumption vulnerability. A flaw is present in the applications which fails to properly handle a crafted cross-reference stream data. Successful exploitation allows attackers to cause resource consumption attack.

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to an infinite loop vulnerability. A flaw is present in the applications which fails to properly handle a circular reference looping issue. Successful exploitation allows attackers to have a loop with unreachable exit condition.

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to a use-after-free vulnerability. A flaw is present in the applications which fails to properly handle a JavaScript execution after a deletion or close operation. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to an improper restriction of excessive authentication attempts vulnerability. A flaw is present in the applications which fails to properly handle a brute-force attack. Successful exploitation allows attackers to cause a brute-force attack because the CAS service lacks a limit on login failures ...

The host is installed with Foxit PDF Reader before 9.7.2, or Foxit PDF Editor before 9.7.2 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle a hardcoded username and password in the DocuSign plugin. Successful exploitation allows attackers to disclose sensitive information.

The host is installed with Foxit PDF Editor before 8.3.10 and is prone to a signature validation bypass vulnerability. A flaw is present in the applications which fails to properly handle a modified file or a file with non-standard signatures. Successful exploitation allows attackers to bypass signature validation.

The host is installed with Foxit PDF Editor before 8.3.10 and is prone to an improper authentication vulnerability. A flaw is present in the applications which fails to properly handle the cloud credentials, as demonstrated by Google Drive. Successful exploitation allows attackers to have unspecified impact.

The host is installed with Foxit PDF Editor before 8.3.10 and is prone to an unspecified vulnerability. A flaw is present in the applications which fails to properly handle the homograph. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    112    113    114    115    116    117    118    119    120    121    122    123    124    125    ..   143

© SecPod Technologies