The host is installed with Foxit Reader through 11.2.1.53537, Foxit PhantomPDF through 10.1.7.37777 or 11.x through 11.2.1.53537 and is prone to a use after free vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. An attacker can leverage this vulnerability to execute code in the context of the current process.
The host is installed with Foxit Reader through 11.2.1.53537, Foxit PhantomPDF through 10.1.7.37777 or 11.x through 11.2.1.53537 and is prone to a use after free vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. An attacker can leverage this vulnerability to execute code in the context of the current process.
The host is installed with Foxit Reader through 11.2.1.53537, Foxit PhantomPDF through 10.1.7.37777 or 11.x through 11.2.1.53537 and is prone to a use after free vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. An attacker can leverage this vulnerability to execute code in the context of the current process.
The host is installed with Foxit Reader through 11.2.1.53537, Foxit PhantomPDF through 10.1.7.37777 or 11.x through 11.2.1.53537 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fails to properly handle certain JavaScripts. An attacker can leverage this vulnerability to execute code in the context of the current process.
The host is installed with Foxit Reader through 11.2.1.53537, Foxit PhantomPDF through 10.1.7.37777 or 11.x through 11.2.1.53537 and is prone to a type confusion vulnerability. A flaw is present in the applications, which fails to properly handle certain JavaScripts. Successful exploitation could lead to application crash.
The host is installed with Foxit Reader through 11.2.2.53575, Foxit PhantomPDF through 10.1.8.37795 or 11.x through 11.2.2.53575 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current ...
The host is installed with Foxit Reader through 11.2.2.53575, Foxit PhantomPDF through 10.1.8.37795 or 11.x through 11.2.2.53575 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current ...
The host is installed with Foxit Reader through 11.2.2.53575, Foxit PhantomPDF through 10.1.8.37795 or 11.x through 11.2.2.53575 and is prone to an out-of-bounds read vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current ...
The host is installed with Foxit Reader through 12.0.0.12394, Foxit PhantomPDF through 10.1.8.37795 or 11.x through 11.2.2.53575, through 12.0.0.12394 and is prone to a null pointer dereference vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. Successful exploitation allows an attacker to cause a denial of service.
The host is installed with Foxit Reader through 12.0.0.12394, Foxit PhantomPDF through 10.1.8.37795 or 11.x through 11.2.2.53575, through 12.0.0.12394 and is prone to a null pointer dereference vulnerability. A flaw is present in the applications, which fails to properly handle annotation objects. Successful exploitation allows an attacker to cause a denial of service.