Show filters
596 Total Results
Displaying 371-380 of 596
Sort by:
Attacker Value
Unknown
CVE-2018-3943
Disclosure Date: October 02, 2018 (last updated November 27, 2024)
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
0
Attacker Value
Unknown
CVE-2018-3959
Disclosure Date: October 02, 2018 (last updated November 27, 2024)
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Author property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
0
Attacker Value
Unknown
CVE-2018-3958
Disclosure Date: October 02, 2018 (last updated November 27, 2024)
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Subject property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
0
Attacker Value
Unknown
CVE-2018-17781
Disclosure Date: September 29, 2018 (last updated November 27, 2024)
Foxit PhantomPDF and Reader before 9.3 allow remote attackers to trigger Uninitialized Object Information Disclosure because creation of ArrayBuffer and DataView objects is mishandled.
0
Attacker Value
Unknown
CVE-2018-17609
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
0
Attacker Value
Unknown
CVE-2018-17608
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
0
Attacker Value
Unknown
CVE-2018-17610
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
0
Attacker Value
Unknown
CVE-2018-17607
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
0
Attacker Value
Unknown
CVE-2018-17611
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
0
Attacker Value
Unknown
CVE-2018-3924
Disclosure Date: August 01, 2018 (last updated November 27, 2024)
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
0