
CVE-2018-18689
https://notcve.org/view.php?id=CVE-2018-18689
07 Jan 2021 — The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, a Signature Wrapping vulnerability exists in multiple products. An attacker can use /ByteRange and xref manipulations that are not detected by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects eXpert PDF 12 Ultimate, Expert PDF Reader, Nitro Pro, Nitro Reader, PDF Arch... • https://pdf-insecurity.org/signature/evaluation_2018.html • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2018-18688
https://notcve.org/view.php?id=CVE-2018-18688
07 Jan 2021 — The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, an Incremental Saving vulnerability exists in multiple products. When an attacker uses the Incremental Saving feature to add pages or annotations, Body Updates are displayed to the user without any action by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects LibreOffice... • https://pdf-insecurity.org/signature/evaluation_2018.html • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2020-6093
https://notcve.org/view.php?id=CVE-2020-6093
18 May 2020 — An exploitable information disclosure vulnerability exists in the way Nitro Pro 13.9.1.155 does XML error handling. A specially crafted PDF document can cause uninitialized memory access resulting in information disclosure. In order to trigger this vulnerability, victim must open a malicious file. Se presenta una vulnerabilidad de divulgación de información explotable en la manera en que Nitro Pro versión 13.9.1.155 realiza el manejo de errores XML. Un documento PDF especialmente diseñado puede causar un ac... • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1014 • CWE-824: Access of Uninitialized Pointer •

CVE-2020-6092
https://notcve.org/view.php?id=CVE-2020-6092
18 May 2020 — An exploitable code execution vulnerability exists in the way Nitro Pro 13.9.1.155 parses Pattern objects. A specially crafted PDF file can trigger an integer overflow that can lead to arbitrary code execution. In order to trigger this vulnerability, victim must open a malicious file. Se presenta una vulnerabilidad de ejecución de código explotable en la manera en que Nitro Pro versión 13.9.1.155, analiza los objetos Pattern. Un archivo PDF especialmente diseñado puede desencadenar un desbordamiento de ente... • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1013 • CWE-190: Integer Overflow or Wraparound •

CVE-2020-6074
https://notcve.org/view.php?id=CVE-2020-6074
18 May 2020 — An exploitable code execution vulnerability exists in the PDF parser of Nitro Pro 13.9.1.155. A specially crafted PDF document can cause a use-after-free which can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de ejecución de código explotable en el analizador de PDF de Nitro Pro versión 13.9.1.155. Un documento PDF especialmente diseñado puede causar un uso de la memoria previamente liberada que puede conllevar a una ej... • https://talosintelligence.com/vulnerability_reports/TALOS-2020-0997 • CWE-416: Use After Free •

CVE-2020-10222
https://notcve.org/view.php?id=CVE-2020-10222
08 Mar 2020 — npdf.dll in Nitro Pro before 13.13.2.242 is vulnerable to Heap Corruption at npdf!nitro::get_property+2381 via a crafted PDF document. La biblioteca npdf.dll en Nitro Pro versiones anteriores a 13.13.2.242, es vulnerable a una Corrupción de la Pila en npdf!nitro::get_property+2381 por medio de un documento PDF diseñado. • https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md •

CVE-2020-10223
https://notcve.org/view.php?id=CVE-2020-10223
08 Mar 2020 — npdf.dll in Nitro Pro before 13.13.2.242 is vulnerable to JBIG2Decode CNxJBIG2DecodeStream Heap Corruption at npdf!CAPPDAnnotHandlerUtils::create_popup_for_markup+0x12fbe via a crafted PDF document. La biblioteca npdf.dll en Nitro Pro versiones anteriores a 13.13.2.242, es vulnerable a una Corrupción de la Pila de JBIG2Decode CNxJBIG2DecodeStream en npdf!CAPPDAnnotHandlerUtils::create_popup_for_markup+0x12fbe por medio de un documento PDF diseñado. • https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2020-03-05-fuzzing-heap-corruption-nitro-pdf-vulnerability.md • CWE-787: Out-of-bounds Write •

CVE-2019-18958
https://notcve.org/view.php?id=CVE-2019-18958
21 Nov 2019 — Nitro Pro before 13.2 creates a debug.log file in the directory where a .pdf file is located, if the .pdf document was produced by an OCR operation on the JPEG output of a scanner. Reportedly, this can have a security risk if debug.log is later edited and then executed. Nitro Pro versiones anteriores a 13.2, crea un archivo debug.log en el directorio donde se encuentra un archivo .pdf, si el documento .pdf fue producido por una operación OCR en la salida JPEG de un escáner. Según se reporta, esto puede tene... • https://a-man-in-the-cookie.blogspot.com/2019/11/nitro-pro-vulnerability.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2013-3552
https://notcve.org/view.php?id=CVE-2013-3552
08 Feb 2018 — Nitro Pro 7.5.0.29 and earlier and Nitro Reader 2.5.0.45 and earlier allow remote attackers to execute arbitrary code via a crafted PDF file. Nitro Pro 7.5.0.29 y anteriores y Nitro Reader 2.5.0.45 y anteriores permite que atacantes remotos ejecuten código arbitrario mediante un archivo PDF manipulado. • https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-006 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-3553
https://notcve.org/view.php?id=CVE-2013-3553
08 Feb 2018 — Nitro Pro 7.5.0.22 and earlier and Nitro Reader 2.5.0.36 and earlier allow remote attackers to execute arbitrary code via a crafted PDF file. Nitro Pro 7.5.0.22 y anteriores y Nitro Reader 2.5.0.36 y anteriores permite que atacantes remotos ejecuten código arbitrario mediante un archivo PDF manipulado. • https://docs.microsoft.com/en-us/security-updates/vulnerabilityresearchadvisories/2013/msvr13-007 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •