Show filters
379 Total Results
Displaying 71-80 of 379
Sort by:
Attacker Value
Unknown

CVE-2020-26535

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. If TslAlloc attempts to allocate thread local storage but obtains an unacceptable index value, V8 throws an exception that leads to a write access violation (and read access violation).
Attacker Value
Unknown

CVE-2020-26539

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. When there is a multiple interpretation error for /V (in the Additional Action and Field dictionaries), a use-after-free can occur with resultant remote code execution (or an information leak).
Attacker Value
Unknown

CVE-2020-26537

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. In a certain Shading calculation, the number of outputs is unequal to the number of color components in a color space. This causes an out-of-bounds write.
Attacker Value
Unknown

CVE-2020-26534

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. There is an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution.
Attacker Value
Unknown

CVE-2020-26540

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
An issue was discovered in Foxit Reader and PhantomPDF before 4.1 on macOS. Because the Hardened Runtime protection mechanism is not applied to code signing, code injection (or an information leak) can occur.
Attacker Value
Unknown

CVE-2020-10913

Disclosure Date: April 22, 2020 (last updated February 21, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the OCRAndExportToExcel command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9946.
Attacker Value
Unknown

CVE-2019-17139

Disclosure Date: October 25, 2019 (last updated November 27, 2024)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Javascript in the HTML2PDF plugin. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8692.
Attacker Value
Unknown

CVE-2019-13123

Disclosure Date: September 30, 2019 (last updated November 27, 2024)
Foxit Reader 9.6.0.25114 and earlier has two unique RecursiveCall bugs involving 3 functions exhausting available stack memory because of Uncontrolled Recursion in the V8 JavaScript engine (issue 1 of 2).
Attacker Value
Unknown

CVE-2019-13124

Disclosure Date: September 30, 2019 (last updated November 27, 2024)
Foxit Reader 9.6.0.25114 and earlier has two unique RecursiveCall bugs involving 3 functions exhausting available stack memory because of Uncontrolled Recursion in the V8 JavaScript engine (issue 2 of 2).
Attacker Value
Unknown

CVE-2019-6764

Disclosure Date: June 03, 2019 (last updated November 27, 2024)
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA Template objects. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7972.