Kaspersky ID:
KLA60004
Erkennungsdatum:
09/12/2023
Aktualisiert:
03/28/2025

Beschreibung

Multiple vulnerabilities were found in Foxit PDF Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Code execution vulnerability can be exploited remotely to execute arbitrary code.
  2. Use after free vulnerability in Annotation can be exploited to obtain sensitive information.
  3. Out of bounds read vulnerability in AcroForm can be exploited to obtain sensitive information.
  4. Use after free vulnerability in Annotation can be exploited to execute arbitrary code.
  5. Use after free vulnerability in templates can be exploited to obtain sensitive information.
  6. Use after free vulnerability in PDF File Parsing can be exploited to execute arbitrary code.
  7. Out of bounds read vulnerability in XFA Doc Object can be exploited to obtain sensitive information.
  8. Use after free vulnerability in XFA Doc Object can be exploited to execute arbitrary code.
  9. Use after free vulnerability in Doc Object can be exploited to execute arbitrary code.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Betroffene Produkte

CVE Liste

  • CVE-2023-39542
    critical
  • CVE-2023-42093
    warning
  • CVE-2023-42095
    warning
  • CVE-2023-42094
    critical
  • CVE-2023-42089
    critical
  • CVE-2023-42096
    critical
  • CVE-2023-42090
    high
  • CVE-2023-42097
    critical
  • CVE-2023-42098
    warning
  • CVE-2023-42091
    critical
  • CVE-2023-42092
    critical

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.