Show filters
797 Total Results
Displaying 131-140 of 797
Sort by:
Attacker Value
Unknown

CVE-2018-19418

Disclosure Date: January 07, 2021 (last updated February 22, 2025)
Foxit PDF ActiveX before 5.5.1 allows remote code execution via command injection because of the lack of a security permission control.
Attacker Value
Unknown

CVE-2018-20311

Disclosure Date: January 07, 2021 (last updated February 22, 2025)
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyCPDFAction race condition that can cause a stack-based buffer overflow or an out-of-bounds read.
Attacker Value
Unknown

CVE-2018-20312

Disclosure Date: January 07, 2021 (last updated February 22, 2025)
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyDoAction race condition that can cause a stack-based buffer overflow or an out-of-bounds read, a different issue than CVE-2018-20310 because of a different opcode.
Attacker Value
Unknown

CVE-2020-35931

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader before 10.1.1 (and before 4.1.1 on macOS) and PhantomPDF before 9.7.5 and 10.x before 10.1.1 (and before 4.1.1 on macOS). An attacker can spoof a certified PDF document via an Evil Annotation Attack because the products fail to consider a null value for a Subtype entry of the Annotation dictionary, in an incremental update.
Attacker Value
Unknown

CVE-2020-13547

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A type confusion vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger an improper use of an object, resulting in memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Attacker Value
Unknown

CVE-2020-13557

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A use after free vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Attacker Value
Unknown

CVE-2020-13560

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A use after free vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Attacker Value
Unknown

CVE-2020-13570

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger the reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Attacker Value
Unknown

CVE-2020-28203

Disclosure Date: December 15, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF 10.1.0.37527 and earlier. There is a null pointer access/dereference while opening a crafted PDF file, leading the application to crash (denial of service).
Attacker Value
Unknown

CVE-2020-14425

Disclosure Date: November 02, 2020 (last updated November 28, 2024)
Foxit Reader before 10.0 allows Remote Command Execution via the app.opencPDFWebPage JavsScript API. An attacker can execute local files and bypass the security dialog.