Описание
Multiple vulnerabilities were found in Foxit PDF Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- Code execution vulnerability can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in AcroForm can be exploited to execute arbitrary code.
- Use after free vulnerability in AcroForm can be exploited to execute arbitrary code.
- Use after free vulnerability in Doc Object can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in Annotation can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in template can be exploited to execute arbitrary code.
- Use after free vulnerability in File Parsing can be exploited to execute arbitrary code.
- Type confusion vulnerability in AcroForm Annotation can be exploited to execute arbitrary code.
- Use after free vulnerability in template can be exploited to execute arbitrary code.
- Use after free vulnerability in Annotation can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in U3D File Parsing can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in AcroForm Annotation can be exploited to obtain sensitive information.
- Out of bounds memory read vulnerability in Doc Object can be exploited to execute arbitrary code.
- Use after free vulnerability in Annotation can be exploited to execute arbitrary code.
- Out of bounds memory write vulnerability in U3D File Parsing can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in AcroForm 3D can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in AcroForm can be exploited to execute arbitrary code.
- Out of bounds memory write vulnerability in U3D File Parsing can be exploited to execute arbitrary code.
- Out of bounds memory read vulnerability in AcroForm can be exploited to obtain sensitive information.
- Use after free vulnerability in Annotation can be exploited to execute arbitrary code.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2024-25858 warning
- CVE-2024-30328 unknown
- CVE-2024-30322 unknown
- CVE-2024-30333 unknown
- CVE-2024-30350 unknown
- CVE-2024-30346 unknown
- CVE-2024-30352 unknown
- CVE-2024-30366 unknown
- CVE-2024-30358 unknown
- CVE-2024-30323 unknown
- CVE-2024-30362 unknown
- CVE-2024-30325 unknown
- CVE-2024-30357 unknown
- CVE-2024-30344 unknown
- CVE-2024-30327 unknown
- CVE-2024-30339 unknown
- CVE-2024-30337 unknown
- CVE-2024-30329 unknown
- CVE-2024-30347 unknown
- CVE-2024-30351 unknown
- CVE-2024-30334 unknown
- CVE-2024-30367 unknown
- CVE-2024-30326 unknown
- CVE-2024-30335 unknown
- CVE-2024-30345 unknown
- CVE-2024-30341 unknown
- CVE-2024-30336 unknown
- CVE-2024-30338 unknown
- CVE-2024-30324 unknown
- CVE-2024-30371 unknown
- CVE-2024-30365 unknown
- CVE-2024-30343 unknown
- CVE-2024-30354 unknown
- CVE-2024-30349 unknown
- CVE-2024-30340 unknown
- CVE-2024-30330 unknown
- CVE-2024-30359 unknown
- CVE-2024-30355 unknown
- CVE-2024-30348 unknown
- CVE-2024-30363 unknown
- CVE-2024-30332 unknown
- CVE-2024-30356 unknown
- CVE-2024-30364 unknown
- CVE-2024-30353 unknown
- CVE-2024-30360 unknown
- CVE-2024-30331 unknown
- CVE-2024-30361 unknown
- CVE-2024-30342 unknown
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!