The host is installed with Foxit Reader before 7.3.4 or Foxit PhantomPDF before 7.3.4.311 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted content stream. Successful exploitation allow remote attackers to cause a denial of service (application crash).
The host is installed with Foxit Reader before 7.3.4 or Foxit PhantomPDF before 7.3.4.311 and is prone to a denial of service vulnerability. A flaw is present in the application, which improperly reports format errors recursively. Successful exploitation allow remote attackers to cause a denial of service (application hang).
The host is installed with Foxit Reader before 7.3.4 or Foxit PhantomPDF before 7.3.4.311 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted FlateDecode stream in a PDF document. Successful exploitation allow remote attackers to execute arbitrary code.
The host is installed with Foxit Reader before 7.3.4 or Foxit PhantomPDF before 7.3.4.311 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle an object with a revision number of -1 in a PDF document. Successful exploitation allow remote attackers to execute arbitrary code.
The host is installed with Foxit Reader before 7.3.4 or Foxit PhantomPDF before 7.3.4.311 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a crafted remerge call. Successful exploitation allow remote attackers to execute arbitrary code.
The host is installed with Foxit Reader before 7.3.4 or Foxit PhantomPDF before 7.3.4.311 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted (1) JPEG, (2) GIF or (3) BMP image. Successful exploitation allow remote attackers to cause a denial of service (out-of-bounds read and application crash).
The host is installed with Foxit Reader before 8.2.1.6871 or Foxit PhantomPDF before 8.2.1.6871 and is prone to an out-of-bound read vulnerability. A flaw is present in the application, which fails to properly handle a crafted font in a PDF document. Successful exploitation allow remote attackers to obtain sensitive information or possibly execute arbitrary code.
The host is installed with Foxit Reader before 8.2.1.6871 or Foxit PhantomPDF before 8.2.1.6871 and is prone to an out-of-bound read vulnerability. A flaw is present in the application, which fails to properly handle a crafted font in a PDF document. Successful exploitation allow remote attackers to obtain sensitive information or possibly execute arbitrary code.
The host is installed with Foxit Reader before 8.2.1.6871 or Foxit PhantomPDF before 8.2.1.6871 and is prone to an out-of-bound read vulnerability. A flaw is present in the application, which fails to properly handle a crafted font in a PDF document. Successful exploitation allow remote attackers to obtain sensitive information or possibly execute arbitrary code.
The host is installed with Foxit Reader before 8.3.1.21155 or Foxit PhantomPDF before 8.3.1.21155 and is prone to an arbitrary write vulnerability. A flaw is present in the application, which fails to properly handle a crafted document. Successful exploitation allow remote attackers to execute arbitrary code.