Page 20 of 360 results (0.004 seconds)

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x00000000000d11ea" issue. El plugin u3d 9.3.0.10809 (también conocido como plugins\U3DBrowser.fpi) en FoxitReader.exe en Foxit Reader 9.3.0.10826 permite que los atacantes remotos provoquen una denegación de servicio (lectura fuera de límites) u obtengan información sensible mediante una muestra U3D debido a un problema "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x00000000000d11ea". • https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/10/2018/11/2018-11-10/index.html https://www.foxitsoftware.com/support/security-bulletins.php https://yan-1-20.github.io/2018/11/10/2018/11/2018-11-10 • CWE-125: Out-of-bounds Read •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x00000000000d11bb" issue. El plugin u3d 9.3.0.10809 (también conocido como plugins\U3DBrowser.fpi) en FoxitReader.exe en Foxit Reader 9.3.0.10826 permite que los atacantes remotos provoquen una denegación de servicio (lectura fuera de límites) u obtengan información sensible mediante una muestra U3D debido a un problema "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x00000000000d11bb". • https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/10/2018/11/2018-11-10/index.html https://www.foxitsoftware.com/support/security-bulletins.php https://yan-1-20.github.io/2018/11/10/2018/11/2018-11-10 • CWE-125: Out-of-bounds Read •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x000000000012dff5" issue. El plugin u3d 9.3.0.10809 (también conocido como plugins\U3DBrowser.fpi) en FoxitReader.exe en Foxit Reader 9.3.0.10826 permite que los atacantes remotos provoquen una denegación de servicio (lectura fuera de límites) u obtengan información sensible mediante una muestra U3D debido a un problema "Data from Faulting Address controls Branch Selection starting at U3DBrowser!PlugInMain+0x000000000012dff5". • https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/08/2018/11/2018-11-08/index.html https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/10/2018/11/2018-11-10/index.html https://www.foxitsoftware.com/support/security-bulletins.php https://yan-1-20.github.io/2018/11/08/2018/11/2018-11-08 https://yan-1-20.github.io/2018/11/10/2018/11/2018-11-10 • CWE-125: Out-of-bounds Read •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation near NULL starting at FoxitReader!safe_vsnprintf+0x00000000002c4330" issue. El plugin u3d 9.3.0.10809 (también conocido como plugins\U3DBrowser.fpi) en FoxitReader.exe en Foxit Reader 9.3.0.10826 permite que los atacantes remotos provoquen una denegación de servicio (lectura fuera de límites) u obtengan información sensible mediante una muestra U3D debido a un problema "Read Access Violation near NULL starting at FoxitReader!safe_vsnprintf+0x00000000002c4330". • https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/02/2018/11/2018-11-02/index.html https://github.com/Yan-1-20/Yan-1-20.github.io/blob/master/2018/11/10/2018/11/2018-11-10/index.html https://www.foxitsoftware.com/support/security-bulletins.php https://yan-1-20.github.io/2018/11/02/2018/11/2018-11-02 https://yan-1-20.github.io/2018/11/10/2018/11/2018-11-10 • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 2%CPEs: 2EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.foxitsoftware.com/support/security-bulletins.php https://zerodayinitiative.com/advisories/ZDI-18-939 • CWE-704: Incorrect Type Conversion or Cast CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •