[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 1621 Download | Alert*

The host is installed with Foxit PDF Reader through 2023.3.0.23028, or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.8.53842, 12.x through 12.1.4.15400, 13.x through 13.0.1.21693, 2023.x through 2023.3.0.23028 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications which fails to properly handle the template objects. Successful exploitation allows rem ...

The host is installed with Foxit PDF Reader through 2023.3.0.23028, or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.8.53842, 12.x through 12.1.4.15400, 13.x through 13.0.1.21693, 2023.x through 2023.3.0.23028 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly validate the existence of an object prior to performing operations o ...

The host is installed with Elasticsearch 8.4.0 before 8.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an uncaught exception when an encrypted PDF is passed to an attachment processor through the REST API. Successful exploitation allows attackers to cause the Elasticsearch ingest node that attempts to parse the PDF file ...

The host is installed with Elasticsearch 8.4.0 before 8.11.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an uncaught exception when an encrypted PDF is passed to an attachment processor through the REST API. Successful exploitation allows attackers to cause the Elasticsearch ingest node that attempts to parse the PDF file ...

The host is installed with iTerm2 before 3.4.21 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in the iTermSessionLauncher.m. Successful exploitation allows attackers to have unspecified impact.

The host is installed with iTerm2 before 3.4.21 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle issues in the iTermSessionLauncher.m. Successful exploitation allows attackers to have unspecified impact.

Adobe After Effects is installed

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.


Pages:      Start    98    99    100    101    102    103    104    105    106    107    108    109    110    111    ..   162

© SecPod Technologies