A use after free vulnerability in Foxit PDF Reader allows arbitrary code executio
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | CVE-2020-13560 | 22 Dec 202018:15 | – | nvd |
![]() | Foxit Reader Memory Misreference Vulnerability (CNVD-2021-26397) | 15 Dec 202000:00 | – | cnvd |
![]() | CVE-2020-13560 | 22 Dec 202017:58 | – | cvelist |
![]() | Foxit Reader JavaScript choice field format event use-after-free vulnerability | 9 Dec 202000:00 | – | talos |
![]() | Design/Logic Flaw | 22 Dec 202018:15 | – | prion |
![]() | CVE-2020-13560 | 5 Feb 202513:47 | – | redhatcve |
![]() | Foxit Reader < 10.1.1 Multiple Vulnerabilities | 23 Dec 202000:00 | – | nessus |
![]() | Foxit PhantomPDF < 10.1.1 Multiple Vulnerabilities | 23 Dec 202000:00 | – | nessus |
![]() | Foxit PhantomPDF < 9.7.5 Multiple Vulnerabilities | 30 Dec 202000:00 | – | nessus |
![]() | KLA12028 Multiple vulnerabilities in Foxit Reader and Foxit PhantomPDF | 9 Dec 202000:00 | – | kaspersky |
[
{
"product": "Foxit",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Foxit Reader Version: 10.1.0.37527"
}
]
}
]
Source | Link |
---|---|
talosintelligence | www.talosintelligence.com/vulnerability_reports/TALOS-2020-1175 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo