Filtered by vendor Foxitsoftware
Subscriptions
Total
800 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-20826 | 1 Foxitsoftware | 2 Phantompdf, Reader | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF Mac 3.3 and Foxit Reader for Mac before 3.3. It has a NULL pointer dereference. | ||||
CVE-2019-20825 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 9.8 Critical |
An issue was discovered in Foxit PhantomPDF before 8.3.11. It has an out-of-bounds write when Internet Explorer is used. | ||||
CVE-2019-20824 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF before 8.3.11. It has a NULL pointer dereference via FXSYS_wcslen in an Epub file. | ||||
CVE-2019-20823 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF before 8.3.11. It has a buffer overflow because a looping correction does not occur after JavaScript updates Field APs. | ||||
CVE-2019-20822 | 2 Foxitsoftware, Microsoft | 2 3d, Windows | 2024-11-21 | 9.8 Critical |
An issue was discovered in the 3D Plugin Beta for Foxit Reader and PhantomPDF before 9.7.0.29430. It has an out-of-bounds write via incorrect image data. | ||||
CVE-2019-20821 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF Mac before 3.4. It has a NULL pointer dereference. | ||||
CVE-2019-20820 | 1 Foxitsoftware | 2 Phantompdf, Reader | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit Reader and PhantomPDF before 9.7. It has a NULL pointer dereference during the parsing of file data. | ||||
CVE-2019-20819 | 1 Foxitsoftware | 2 Phantompdf, Reader | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit Reader and PhantomPDF before 9.7. It allows stack consumption via nested function calls for XML parsing. | ||||
CVE-2019-20818 | 1 Foxitsoftware | 2 Phantompdf, Reader | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit Reader and PhantomPDF before 9.7. It allows memory consumption because data is created for each page of an application level. | ||||
CVE-2019-20817 | 1 Foxitsoftware | 2 Phantompdf, Reader | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit Reader and PhantomPDF before 9.7. It has a NULL pointer dereference. | ||||
CVE-2019-20816 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF before 8.3.12. It has a NULL pointer dereference during the parsing of file data. | ||||
CVE-2019-20815 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF before 8.3.12. It allows stack consumption via nested function calls for XML parsing. | ||||
CVE-2019-20814 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF before 8.3.12. It allows memory consumption because data is created for each page of an application level. | ||||
CVE-2019-20813 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 7.5 High |
An issue was discovered in Foxit PhantomPDF before 8.3.12. It has a NULL pointer dereference. | ||||
CVE-2019-17183 | 2 Foxitsoftware, Microsoft | 2 Reader, Windows | 2024-11-21 | 7.5 High |
Foxit Reader before 9.7 allows an Access Violation and crash if insufficient memory exists. | ||||
CVE-2019-17145 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 8.8 High |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9276. | ||||
CVE-2019-17144 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 8.8 High |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DWG files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9274. | ||||
CVE-2019-17143 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 4.3 Medium |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9273. | ||||
CVE-2019-17142 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 8.8 High |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Keystroke action of a listbox field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9081. | ||||
CVE-2019-17141 | 1 Foxitsoftware | 1 Phantompdf | 2024-11-21 | 8.8 High |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Calculate action of a text field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9044. |