Show filters
797 Total Results
Displaying 151-160 of 797
Sort by:
Attacker Value
Unknown

CVE-2020-26535

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. If TslAlloc attempts to allocate thread local storage but obtains an unacceptable index value, V8 throws an exception that leads to a write access violation (and read access violation).
Attacker Value
Unknown

CVE-2020-26539

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. When there is a multiple interpretation error for /V (in the Additional Action and Field dictionaries), a use-after-free can occur with resultant remote code execution (or an information leak).
Attacker Value
Unknown

CVE-2020-26537

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. In a certain Shading calculation, the number of outputs is unequal to the number of color components in a color space. This causes an out-of-bounds write.
Attacker Value
Unknown

CVE-2020-26534

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. There is an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution.
Attacker Value
Unknown

CVE-2020-26540

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 4.1 on macOS. Because the Hardened Runtime protection mechanism is not applied to code signing, code injection (or an information leak) can occur.
Attacker Value
Unknown

CVE-2020-11493

Disclosure Date: September 04, 2020 (last updated February 22, 2025)
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.
Attacker Value
Unknown

CVE-2020-12247

Disclosure Date: September 04, 2020 (last updated February 22, 2025)
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information from an out-of-bounds read because a text-string index continues to be used after splitting a string into two parts. A crash may also occur.
Attacker Value
Unknown

CVE-2020-12248

Disclosure Date: September 04, 2020 (last updated February 22, 2025)
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.
Attacker Value
Unknown

CVE-2020-17404

Disclosure Date: August 25, 2020 (last updated February 22, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11191.
Attacker Value
Unknown

CVE-2020-17403

Disclosure Date: August 25, 2020 (last updated February 22, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11003.