[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31433 Download | Alert*

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.

The host is installed with Apple iTunes before 12.12.9 and is prone to a dynamic library loading vulnerability. A flaw is present in the applications, which fail to properly handle a path searching issue. On successful exploitation, an app may be able to gain elevated privileges.


Pages:      Start    1565    1566    1567    1568    1569    1570    1571    1572    1573    1574    1575    1576    1577    1578    ..   3143

© SecPod Technologies