
CVE-2018-17697 – Foxit Reader Collab templates Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17697
11 Oct 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of templates. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVE-2018-17636 – Foxit Reader XFA aliasNode Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17636
11 Oct 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the id property of a aliasNode. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute c... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVE-2018-17667 – Foxit Reader XFA host print Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17667
11 Oct 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the print method of a Host object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execut... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVE-2018-17664 – Foxit Reader XFA isCompatibleNS Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17664
11 Oct 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the isCompatibleNS method of a XFA object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability t... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVE-2018-17703 – Foxit Reader defaultStyle Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17703
11 Oct 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the defaultValue property of ComboBox objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerabili... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVE-2018-3941
https://notcve.org/view.php?id=CVE-2018-3941
08 Oct 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Existe una vulnerabilidad explotable de uso de memoria previamente liberada en el motor JavaScript de Foxit PDF Reader, de Foxit Software, en su versió... • http://www.securitytracker.com/id/1041769 • CWE-416: Use After Free •

CVE-2018-3940
https://notcve.org/view.php?id=CVE-2018-3940
08 Oct 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused. An attacker needs to trick the user to open the malicious file to trigger. Existe una vulnerabilidad explotable de uso de memoria previamente liberada en el motor JavaScript de Foxit PDF Reader, de Foxit Software, en su versión 9.1.0.5096. Un documento PDF especialmente manipulado puede h... • http://www.securitytracker.com/id/1041769 • CWE-416: Use After Free •

CVE-2018-3996
https://notcve.org/view.php?id=CVE-2018-3996
08 Oct 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad explotable de uso de mem... • http://www.securitytracker.com/id/1041769 • CWE-416: Use After Free •

CVE-2018-16297
https://notcve.org/view.php?id=CVE-2018-16297
08 Oct 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Reader before 9.3 and PhantomPDF before 9.3, a different vulnerability than CVE-2018-16291, CVE-2018-16292, CVE-2018-16293, CVE-2018-16294, CVE-2018-16295, and CVE-2018-16296. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin e... • http://www.securitytracker.com/id/1041769 • CWE-416: Use After Free •

CVE-2018-16292
https://notcve.org/view.php?id=CVE-2018-16292
08 Oct 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Reader before 9.3 and PhantomPDF before 9.3, a different vulnerability than CVE-2018-16291, CVE-2018-16293, CVE-2018-16294, CVE-2018-16295, CVE-2018-16296, and CVE-2018-16297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin e... • http://www.securitytracker.com/id/1041769 • CWE-416: Use After Free •