Описание
Multiple vulnerabilities were found in Foxit PDF Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- Code execution vulnerability can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in AcroForm can be exploited to execute arbitrary code.
- Use after free vulnerability in Doc Object can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in Annotation can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in template can be exploited to execute arbitrary code.
- Use after free vulnerability in File Parsing can be exploited to execute arbitrary code.
- Type confusion vulnerability in AcroForm Annotation can be exploited to execute arbitrary code.
- Use after free vulnerability in template can be exploited to execute arbitrary code.
- Use after free vulnerability in Annotation can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in U3D File Parsing can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in AcroForm Annotation can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in Doc Object can be exploited to execute arbitrary code.
- Use after free vulnerability in Annotation can be exploited to execute arbitrary code.
- Out of bounds memory write vulnerability in U3D File Parsing can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in AcroForm 3D can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in AcroForm can be exploited to execute arbitrary code.
- Out of bounds memory write vulnerability in U3D File Parsing can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in AcroForm can be exploited to obtain sensitive information.
- Use after free vulnerability in Annotation can be exploited to execute arbitrary code.
- Elevation of privilege vulnerability can be exploited remotely to gain privileges.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2024-25858 critical
- CVE-2024-30328 critical
- CVE-2024-30322 critical
- CVE-2024-30333 critical
- CVE-2024-30350 warning
- CVE-2024-30346 critical
- CVE-2024-30352 critical
- CVE-2024-30366 critical
- CVE-2024-30358 critical
- CVE-2024-30323 critical
- CVE-2024-30362 critical
- CVE-2024-30325 critical
- CVE-2024-30357 critical
- CVE-2024-30344 critical
- CVE-2024-30327 critical
- CVE-2024-30339 critical
- CVE-2024-30337 critical
- CVE-2024-30329 warning
- CVE-2024-30347 warning
- CVE-2024-30351 critical
- CVE-2024-30334 critical
- CVE-2024-30367 critical
- CVE-2024-30326 critical
- CVE-2024-30335 warning
- CVE-2024-30345 critical
- CVE-2024-30341 critical
- CVE-2024-30336 critical
- CVE-2024-30338 critical
- CVE-2024-30324 critical
- CVE-2024-30371 critical
- CVE-2024-30365 critical
- CVE-2024-30343 critical
- CVE-2024-30354 critical
- CVE-2024-30349 critical
- CVE-2024-30340 warning
- CVE-2024-30330 critical
- CVE-2024-30359 critical
- CVE-2024-30355 critical
- CVE-2024-30348 critical
- CVE-2024-30363 warning
- CVE-2024-30332 critical
- CVE-2024-30356 warning
- CVE-2024-30364 warning
- CVE-2024-30353 critical
- CVE-2024-30360 critical
- CVE-2024-30331 critical
- CVE-2024-30361 critical
- CVE-2024-30342 critical
- CVE-2024-32488 critical
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!