CVE-2021-37599
https://notcve.org/view.php?id=CVE-2021-37599
The exporter/Login.aspx login form in the Exporter in Nuance Winscribe Dictation 4.1.0.99 is vulnerable to SQL injection that allows a remote, unauthenticated attacker to read the database (and execute code in some situations) via the txtPassword parameter. El formulario de inicio de sesión exporter/Login.aspx del exportador en Nuance Winscribe Dictation versión 4.1.0.99 es vulnerable a una inyección SQL que permite a un atacante remoto no autenticado leer la base de datos (y ejecutar código en algunas situaciones) por medio del parámetro txtPassword • https://slazarus.xyz/winscribe.html https://www.nuance.com/dragon/business-solutions/winscribe-dictation-workflow.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2018-18688
https://notcve.org/view.php?id=CVE-2018-18688
The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, an Incremental Saving vulnerability exists in multiple products. When an attacker uses the Incremental Saving feature to add pages or annotations, Body Updates are displayed to the user without any action by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects LibreOffice, Master PDF Editor, Nitro Pro, Nitro Reader, Nuance Power PDF Standard, PDF Editor 6 Pro, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, Perfect PDF 10 Premium, and Perfect PDF Reader. • https://pdf-insecurity.org/signature/evaluation_2018.html https://pdf-insecurity.org/signature/signature.html https://www.foxitsoftware.com/support/security-bulletins.php https://www.pdfa.org/recently-identified-pdf-digital-signature-vulnerabilities • CWE-347: Improper Verification of Cryptographic Signature •
CVE-2013-0732
https://notcve.org/view.php?id=CVE-2013-0732
Heap-based buffer overflow in PDFCore8.dll in Nuance PDF Reader before 8.1 allows remote attackers to execute arbitrary code via crafted font table directory values in a TTF file, related to naming table entries. Desbordamiento de buffer basado en memoria dinámica en PDFCore8.dll en Nuance PDF Reader anterior a 8.1 permite a atacantes remotos ejecutar código arbitrario a través de valores de directorio de tabla de fuentes manipulados en un archivo TTF, relacionado con el nombramiento de entradas de tabla. • http://osvdb.org/93870 http://secunia.com/advisories/51943 http://www.securityfocus.com/bid/60315 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-0113
https://notcve.org/view.php?id=CVE-2013-0113
Nuance PDF Reader 7.0 and PDF Viewer Plus 7.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document. Nuance PDF Reader v7.0 y PDF Viewer Plus v7.1, permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (corrupción de memoria) a través de un documento PDF manipulado. • http://www.kb.cert.org/vuls/id/248449 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-5209
https://notcve.org/view.php?id=CVE-2010-5209
Multiple untrusted search path vulnerabilities in Nuance PDF Reader 6.0 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) exceptiondumpdll.dll file in the current working directory, as demonstrated by a directory that contains a .pdf file. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de ruta de búsqueda no confiable en Nuance PDF Reader 6.0, permite a usuarios locales ganar privilegios a través de un archivo de caballo de troya (1) dwmapi.dll o (2) exceptiondumpdll.dll en el directorio de trabajo actual, como se demostró con un directorio que contiene un archivo .pdf. NOTA: algunos de estos datos han sido obtenidos a partir de información de terceros. • http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bnuance_pdf_reader%5D_6.0_insecure_dll_hijacking http://secunia.com/advisories/41410 •