Page 2 of 373 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. Existe una vulnerabilidad de use-after-free en la forma en que Foxit Reader 12.1.2.15356 maneja un campo de firma. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path. Un elemento no controlado en la ruta de búsqueda en Foxit Software lanzado en Foxit Reader v11.2.118.51569 permite a los atacantes escalar privilegios al buscar librerías DLL sin especificar una ruta absoluta • https://github.com/hxxt9049/futing https://www.foxitsoftware.cn/support/security-bulletins.html https://www.foxitsoftware.com/support/security-bulletins.php • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows memory corruption during conversion of a PDF document to a different document format. Se ha detectado un problema en Foxit Reader y PhantomPDF versiones anteriores a 10.1.4. Permite una corrupción de memoria durante la conversión de un documento PDF a un formato de documento diferente • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows stack consumption via recursive function calls during the handling of XFA forms or link objects. Se ha detectado un problema en Foxit Reader y PhantomPDF versiones anteriores a 10.1.4. Permite un consumo de pila por medio de llamadas a funciones recursivas durante el manejo de formularios XFA u objetos de enlace • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-674: Uncontrolled Recursion •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows attackers to delete arbitrary files (during uninstallation) via a symlink. Se ha detectado un problema en Foxit Reader y PhantomPDF versiones anteriores a 10.1.4. Permite a atacantes eliminar archivos arbitrarios (durante la desinstalación) por medio de un enlace simbólico • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-59: Improper Link Resolution Before File Access ('Link Following') •