Page 23 of 553 results (0.012 seconds)

CVSS: 8.0EPSS: 0%CPEs: 3EXPL: 0

02 Oct 2018 — A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Creator property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad de uso de memoria previamente liberada en el motor JavaScript de Fox... • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 • CWE-416: Use After Free •

CVSS: 8.0EPSS: 0%CPEs: 3EXPL: 0

02 Oct 2018 — A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Keywords property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad de uso de memoria previamente liberada en el motor JavaScript de Fo... • http://www.securitytracker.com/id/1041769 • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

02 Oct 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad explotable de uso de mem... • http://www.securitytracker.com/id/1041769 • CWE-416: Use After Free •

CVSS: 8.0EPSS: 0%CPEs: 3EXPL: 0

02 Oct 2018 — A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Author property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad de uso de memoria previamente liberada en el motor JavaScript de Foxi... • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 • CWE-416: Use After Free •

CVSS: 8.0EPSS: 0%CPEs: 3EXPL: 0

02 Oct 2018 — A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Producer property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad de uso de memoria previamente liberada en el motor JavaScript de Fo... • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

29 Sep 2018 — Foxit PhantomPDF and Reader before 9.3 allow remote attackers to trigger Uninitialized Object Information Disclosure because creation of ArrayBuffer and DataView objects is mishandled. Foxit PhantomPDF y Reader en versiones anteriores a la 9.3 permiten que atacantes remotos desencadenen una divulgación de información de objetos sin inicializar debido a que se gestiona de forma incorrecta la creación de objetos ArrayBuffer y DataView. • http://www.securitytracker.com/id/1041769 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

28 Sep 2018 — Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects. Foxit PhantomPDF y Reader en versiones anteriores a la 9.3 permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio (uso de memoria previamente liberada) debido a que se manejan incorrectamente las propiedades de los... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

28 Sep 2018 — Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects. Foxit PhantomPDF y Reader en versiones anteriores a la 9.3 permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio (uso de memoria previamente liberada) debido a que se manejan incorrectamente las propiedades de los... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

28 Sep 2018 — Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects. Foxit PhantomPDF y Reader en versiones anteriores a la 9.3 permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio (uso de memoria previamente liberada) debido a que se manejan incorrectamente las propiedades de los... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

28 Sep 2018 — Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects. Foxit PhantomPDF y Reader en versiones anteriores a la 9.3 permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio (uso de memoria previamente liberada) debido a que se manejan incorrectamente las propiedades de los... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •