Page 18 of 140 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled. Se presenta una vulnerabilidad de uso de memoria previamente liberada en el motor de JavaScript de Foxit Software"s PDF Reader, versión 11.1.0.52543. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429 • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

A memory corruption vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger an exception which is improperly handled, leaving the engine in an invalid state, which can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled. Se presenta una vulnerabilidad de corrupción de memoria en el motor JavaScript de Foxit Software"s PDF Reader, versión 11.1.0.52543. • https://talosintelligence.com/vulnerability_reports/TALOS-2022-1439 • CWE-460: Improper Cleanup on Thrown Exception CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via getURL in the JavaScript API. Foxit PDF Reader y PDF Editor versiones anteriores a 11.1 en macOS, permiten a atacantes remotos ejecutar código arbitrario por medio de getURL en la API de JavaScript • https://github.com/dlehgus1023 https://github.com/dlehgus1023/CVE/tree/master/CVE-2021-45980 https://www.foxit.com/support/security-bulletins.html •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via app.launchURL in the JavaScript API. Foxit PDF Reader y PDF Editor versiones anteriores a 11.1 en macOS, permiten a atacantes remotos ejecutar código arbitrario por medio de app.launchURL en la API de JavaScript • https://github.com/dlehgus1023 https://github.com/dlehgus1023/CVE/tree/master/CVE-2021-45979 https://www.foxit.com/support/security-bulletins.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via xfa.host.gotoURL in the XFA API. Foxit PDF Reader y PDF Editor versiones anteriores a 11.1 en macOS, permiten a atacantes remotos ejecutar código arbitrario por medio de xfa.host.gotoURL en la API de XFA • https://github.com/dlehgus1023 https://github.com/dlehgus1023/CVE/tree/master/CVE-2021-45978 https://www.foxit.com/support/security-bulletins.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •