[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 17483 Download | Alert*

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to an arbitrary files write vulnerability. A flaw is present in the applications which fails to properly validate the CombineFiles pathname. Successful exploitation allows attackers to write to arbitrary files.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to an arbitrary files write vulnerability. A flaw is present in the applications which fails to properly validate the extractPages pathname. Successful exploitation allows attackers to write to arbitrary files.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to a stack consumption vulnerability. A flaw is present in the applications which fails to properly handle the recursive function calls during the handling of XFA forms or link objects. Successful exploitation allows attackers to cause stack consumption attack.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to a memory corruption vulnerability. A flaw is present in the applications which fails to properly handle an issue during conversion of a PDF document to a different document format. Successful exploitation allows attackers to cause memory corruption.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to a signature validation bypass vulnerability. A flaw is present in the applications which fails to properly handle the certificate name, document owner, and signature author. Successful exploitation allows attackers to produce incorrect PDF document signatures.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to a denial of service vulnerability. A flaw is present in the applications which fails to properly handle the Tab key during XFA form interaction. Successful exploitation allows attackers to cause information disclosure or an application crash.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications which fails to properly handle a cross-Reference table during Office document conversion. Successful exploitation allows attackers to cause an out-of-bounds write.

The host is installed with Foxit PDF Reader before 10.1.4, or Foxit PDF Editor before 10.1.4 and is prone to an out-of-bounds write vulnerability. A flaw is present in the applications which fails to properly handle a crafted /size key in the trailer dictionary. Successful exploitation allows attackers to cause an out-of-bounds write.

The host is installed with Foxit PDF Reader before 4.1.1, or Foxit PDF Editor before 4.1.1 and is prone to a certificate spoofing vulnerability. A flaw is present in the applications which fails to properly handle an evil annotation attack. Successful exploitation allows attackers to spoof a certified pdf document because the products fail to consider a null value for a Subtype entry of the Annota ...

The host is installed with Foxit PDF Reader before 4.1, or Foxit PDF Editor before 4.1 and is prone to an information disclosure vulnerability. A flaw is present in the applications which fails to properly handle an issue as the hardened runtime protection mechanism is not applied to code signing. Successful exploitation allows remote attackers to cause code injection (or an information leak).


Pages:      Start    10    11    12    13    14    15    16    17    18    19    20    21    22    23    ..   1748

© SecPod Technologies