[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to a remote code execution vulnerability. A flaw is present in the applications which fails to properly handle certain XLS or DOC files. Successful exploitation results in remote code execution and crash when parsing certa ...

The host is installed with Foxit PDF Reader through 12.1.1.15289 or Foxit PDF Editor through 10.1.11.37866 or 11.x through 11.2.5.53785 or 12.x through 12.1.1.15289 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code due to the access of null pointe ...

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.0.15250 or Foxit PDF Editor through 10.1.10.37854 or 11.x through 11.2.4.53774 or 12.x through 12.1.0.15250 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code and cause application to crash.

The host is installed with Foxit PDF Reader through 12.1.2.15332 or Foxit PDF Editor through 10.1.12.37872 or 11.x through 11.2.6.53790 or 12.x through 12.1.2.15332 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to cause memory corruption and execute remote code.

The host is installed with Foxit PDF Reader through 12.0.0.12394 or Foxit PDF Editor through 10.1.8.37795 or 11.x through 11.2.2.53575 or 12.x through 12.0.0.12394 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle the AFSpecial_KeystrokeEx method. Successful exploitation allow attackers to execute arbitrary code in the con ...

The host is installed with Foxit PDF Reader through 12.0.0.12394 or Foxit PDF Editor through 10.1.8.37795 or 11.x through 11.2.2.53575 or 12.x through 12.0.0.12394 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle the ADBC objects. Successful exploitation allow attackers to execute arbitrary code in the context of the curr ...

The host is installed with Foxit PDF Reader through 12.0.0.12394 or Foxit PDF Editor through 10.1.8.37795 or 11.x through 11.2.2.53575 or 12.x through 12.0.0.12394 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications which fails to properly handle the AFSpecial_KeystrokeEx method. Successful exploitation allow attackers to execute code in the context of ...

The host is installed with Foxit PDF Reader through 12.0.0.12394 or Foxit PDF Editor through 10.1.8.37795 or 11.x through 11.2.2.53575 or 12.x through 12.0.0.12394 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle the removeIcon method. Successful exploitation allow attackers to execute arbitrary code in the context of the ...


Pages:      Start    10709    10710    10711    10712    10713    10714    10715    10716    10717    10718    10719    10720    10721    10722    ..   19630

© SecPod Technologies