[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26713 Download | Alert*

The host is installed with Foxit PDF Reader through 2023.3.0.23028, or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.8.53842, 12.x through 12.1.4.15400, 13.x through 13.0.1.21693, 2023.x through 2023.3.0.23028 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly validate the existence of an object prior to performing operations o ...

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an access of uninitialized pointer vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause memory leak.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Adobe After Effects 23.0.x through 23.6, or 24.0.x through 24.0.2 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause arbitrary code execution.

The host is installed with Google Chrome before 124.0.6367.118 or Microsoft Edge before 124.0.2478.80 and is prone to a use after free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    10    11    12    13    14    15    16    17    18    19    20    21    22    23    ..   2671

© SecPod Technologies