CVE-2019-6774 – Foxit Reader AcroForm deleteItemAt Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2019-6774
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deleteItemAt method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.foxitsoftware.com/support/security-bulletins.php https://www.zerodayinitiative.com/advisories/ZDI-19-629 • CWE-416: Use After Free •
CVE-2019-13315 – Foxit Reader Text removeField Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2019-13315
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.foxitsoftware.com/support/security-bulletins.php https://www.zerodayinitiative.com/advisories/ZDI-19-632 • CWE-416: Use After Free •
CVE-2019-13320 – Foxit Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2019-13320
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.foxitsoftware.com/support/security-bulletins.php https://www.zerodayinitiative.com/advisories/ZDI-19-637 • CWE-416: Use After Free •
CVE-2018-19444
https://notcve.org/view.php?id=CVE-2018-19444
A use after free in the TextBox field Validate action in IReader_ContentProvider can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031. An attacker can leverage this to gain remote code execution. Relative to CVE-2018-19452, this has a different free location and requires different JavaScript code for exploitation. Puede ocurrir un uso de memoria previamente liberada en la acción Validate en el campo TextBox en la función IReader_ContentProvider para archivos PDF especialmente creados en Foxit Reader SDK (ActiveX) Professional versión 5.4.0.1031. Un atacante puede explotar esto para obtener ejecución de código remota. • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-416: Use After Free •
CVE-2018-19445
https://notcve.org/view.php?id=CVE-2018-19445
A command injection can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031 when the JavaScript API app.launchURL is used. An attacker can leverage this to gain remote code execution. Puede ocurrir una inyección de comando para archivos PDF especialmente creados en Foxit Reader SDK (ActiveX) Professional versión 5.4.0.1031 cuando se utiliza la función app.launchURL de la API de JavaScript. Un atacante puede explotar esto para obtener ejecución de código remota. • https://www.foxitsoftware.com/support/security-bulletins.php • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •