Page 27 of 266 results (0.004 seconds)

CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 0

20 Jul 2021 — Foxit PDF SDK For Web through 7.5.0 allows XSS. There is arbitrary JavaScript code execution in the browser if a victim uploads a malicious PDF document containing embedded JavaScript code that abuses app.alert (in the Acrobat JavaScript API). Foxit PDF SDK For Web versiones hasta 7.5.0, permite un ataque de tipo XSS. Se presenta una ejecución de código JavaScript arbitrario en el navegador si una víctima carga un documento PDF malicioso conteniendo código JavaScript insertado que abusa de app.alert (en la ... • https://www.foxitsoftware.com/support/security-bulletins.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

23 Apr 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 8.3.2.25013. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad explotable de uso ... • http://www.securityfocus.com/bid/103942 • CWE-416: Use After Free •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

23 Apr 2018 — An exploitable use-after-free vulnerability exists in the JavaScript engine Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If a browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. Existe una vulnerabilidad explotable de uso de memor... • http://www.securityfocus.com/bid/103942 • CWE-416: Use After Free •

CVSS: 10.0EPSS: 83%CPEs: 1EXPL: 2

10 Mar 2009 — Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action. Desbordamiento de búfer basado en pila en Foxit Reader v3.0 anteriores a Build 1506, incluidas la 1120 y la 1301, permite a atacantes remotos ejecutar código arbitrario a través de (1)una ruta relativa larga o (2)una ruta absolu... • https://www.exploit-db.com/exploits/8201 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 2

24 Apr 2008 — Foxit Reader 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with (1) a malformed ExtGState resource containing a /Font resource, or (2) an XObject resource with a Rotate setting, which triggers memory corruption. NOTE: this is probably a different vulnerability than CVE-2007-2186. El Foxit Reader 2.2 permite a los atacantes remotos causar una denegación de servicio (caida) y posiblemente la ejecución de código arbitrario mediante un ficher... • http://secunia.com/advisories/29934 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 8%CPEs: 9EXPL: 1

24 Apr 2007 — Foxit Reader 2.0 allows remote attackers to cause a denial of service (application crash) via a crafted PDF document. Foxit Reader 2.0 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) mediante un documento PDF manipulado artesanalmente. • https://www.exploit-db.com/exploits/3770 •