Page 112 of 558 results (0.004 seconds)

CVSS: 4.3EPSS: 2%CPEs: 3EXPL: 3

Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted GIF in a PDF file. Foxit Reader, Enterprise Reader, y PhantomPDF anterior a 7.1.5 permiten a atacantes remotos causar una denegación de servicio (corrupción de memoria y caída) a través de un GIF manipulado en un fichero PDF. • https://www.exploit-db.com/exploits/36859 http://packetstormsecurity.com/files/131685/Foxit-Reader-7.1.3.320-Memory-Corruption.html http://protekresearchlab.com/PRL-2015-05 http://www.foxitsoftware.com/support/security_bulletins.php#FRD-27 http://www.securityfocus.com/bid/74418 http://www.securitytracker.com/id/1032229 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allow remote attackers to cause a denial of service (memory corruption and crash) via vectors related to digital signatures. Foxit Reader, Enterprise Reader, y PhantomPDF anterior a 7.1.5 permiten a atacantes remotos causar una denegación de servicio (corrupción de memoria y caída) a través de vectores relacionados con firmas digitales. • http://www.foxitsoftware.com/support/security_bulletins.php#FRD-26 http://www.securityfocus.com/bid/74418 http://www.securitytracker.com/id/1032228 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 78%CPEs: 3EXPL: 6

Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image. Foxit Reader, Enterprise Reader, y PhantomPDF anterior a 7.1 permiten a atacantes remotos causar una denegación de servicio (corrupción de memoria y caída) a través de (1) un tamaño Ubyte manipulado en una estructura DataSubBlock o (2) un LZWMinimumCodeSize manipulado en una imagen GIF. • https://www.exploit-db.com/exploits/36335 https://www.exploit-db.com/exploits/36334 http://protekresearchlab.com/PRL-2015-02 http://protekresearchlab.com/prl-2015-01prl-foxit-products-gif-conversion-memory-corruption-vulnerabilities-lzwminimumcodesize http://securitytracker.com/id/1031878 http://www.exploit-db.com/exploits/36334 http://www.exploit-db.com/exploits/36335 http://www.foxitsoftware.com/support/security_bulletins.php#FRD-23 http://www.foxitsoftware.com/support/security_bulletins.php#FRD-24& • CWE-20: Improper Input Validation •