The host is installed with Foxit PDF Reader through 12.1.0.1229 or Foxit PDF Editor before 11.1.4.1121, 12.x through 12.1.0.1229 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.
The host is installed with Foxit PDF Reader through 12.1.0.1229 or Foxit PDF Editor before 11.1.4.1121, 12.x through 12.1.0.1229 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.
The host is installed with Foxit PDF Reader through 12.1.0.1229 or Foxit PDF Editor before 11.1.4.1121, 12.x through 12.1.0.1229 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.
The host is missing a security update according to Apple advisory. The update is required to privilege escalation vulnerabilities. The flaws are present in the application, which fails to properly handle the logic issues. On successful exploitation, an app may be able to elevate privileges
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is missing a security update according to Apple advisory. The update is required to privilege escalation vulnerabilities. The flaws are present in the application, which fails to properly handle the logic issues. On successful exploitation, an app may be able to elevate privileges
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is installed with Apple iTunes before 12.12.9 and is prone to a privilege escalation vulnerability. A flaw is present in the applications, which fail to properly handle the logic issue. On successful exploitation, an app may be able to elevate privileges.
The host is installed with Apple iTunes before 12.12.9 and is prone to a dynamic library loading vulnerability. A flaw is present in the applications, which fail to properly handle a path searching issue. On successful exploitation, an app may be able to gain elevated privileges.