
CVE-2018-17623 – Foxit Reader Link setAction Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17623
28 Sep 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Link objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVE-2018-17624 – Foxit Reader OCG setAction Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2018-17624
28 Sep 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of OCG objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context ... • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •

CVE-2018-7407
https://notcve.org/view.php?id=CVE-2018-7407
24 May 2018 — An issue was discovered in Foxit Reader before 9.1 and PhantomPDF before 9.1. This vulnerability allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists when rendering U3D images inside of pdf files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. • http://www.securityfocus.com/bid/104300 • CWE-704: Incorrect Type Conversion or Cast •

CVE-2018-5680
https://notcve.org/view.php?id=CVE-2018-5680
24 May 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an all... • http://www.securityfocus.com/bid/104300 • CWE-125: Out-of-bounds Read •

CVE-2018-7406
https://notcve.org/view.php?id=CVE-2018-7406
24 May 2018 — An issue was discovered in Foxit Reader before 9.1 and PhantomPDF before 9.1. This vulnerability allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the u3d images inside of a pdf. The issue results from the lack of proper validation of user-supplied data, which can result in an array indexing issue. • http://www.securityfocus.com/bid/104300 • CWE-129: Improper Validation of Array Index •

CVE-2018-5674
https://notcve.org/view.php?id=CVE-2018-5674
24 May 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. Crafted data in the PDF file can trigger an overflow of a heap-based buffer. An attacker can leverage this vulnerability to e... • http://www.securityfocus.com/bid/104300 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-5675
https://notcve.org/view.php?id=CVE-2018-5675
24 May 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. Crafted data in the PDF file can trigger an out-of-bounds write on a buffer. An attacker can leverage this vulnerability to e... • http://www.securityfocus.com/bid/104300 • CWE-787: Out-of-bounds Write •

CVE-2018-5678
https://notcve.org/view.php?id=CVE-2018-5678
24 May 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. Crafted data in the PDF file can trigger an overflow of a heap-based buffer. An attacker can leverage this vulnerability to e... • http://www.securityfocus.com/bid/104300 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2018-5679
https://notcve.org/view.php?id=CVE-2018-5679
24 May 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an all... • http://www.securityfocus.com/bid/104300 • CWE-125: Out-of-bounds Read •

CVE-2018-5676
https://notcve.org/view.php?id=CVE-2018-5676
24 May 2018 — This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. Crafted data in the PDF file can trigger an overflow of a heap-based buffer. An attacker can leverage this vulnerability to e... • http://www.securityfocus.com/bid/104300 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •