Foxitsoftware

Foxit Reader

379 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 19.8%
  • Veröffentlicht 22.12.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:01:29

A use after free vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An att...

Exploit
  • EPSS 5.3%
  • Veröffentlicht 22.12.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:01:31

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger the reuse of previously free memory which can lead to arbitrary code execution. An attac...

  • EPSS 0.02%
  • Veröffentlicht 15.12.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 05:22:28

An issue was discovered in Foxit Reader and PhantomPDF 10.1.0.37527 and earlier. There is a null pointer access/dereference while opening a crafted PDF file, leading the application to crash (denial of service).

Exploit
  • EPSS 26.57%
  • Veröffentlicht 02.11.2020 21:15:24
  • Zuletzt bearbeitet 21.11.2024 05:03:14

Foxit Reader before 10.0 allows Remote Command Execution via the app.opencPDFWebPage JavsScript API. An attacker can execute local files and bypass the security dialog.

  • EPSS 0.07%
  • Veröffentlicht 13.10.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:08:03

This vulnerability allows local attackers to escalate privileges on affected installations of Foxit Reader 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerabil...

  • EPSS 0.07%
  • Veröffentlicht 13.10.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:08:03

This vulnerability allows local attackers to escalate privileges on affected installations of Foxit PhantomPDF 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulner...

  • EPSS 1.78%
  • Veröffentlicht 13.10.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:08:03

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious...

  • EPSS 3.07%
  • Veröffentlicht 13.10.2020 17:15:14
  • Zuletzt bearbeitet 21.11.2024 05:08:03

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious...

  • EPSS 1.96%
  • Veröffentlicht 13.10.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:08:02

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malic...

  • EPSS 0.03%
  • Veröffentlicht 02.10.2020 08:15:12
  • Zuletzt bearbeitet 21.11.2024 05:20:01

An issue was discovered in Foxit Reader and PhantomPDF before 10.1. There is an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution.