Lucene search

K

Joaquín Ruiz Security Vulnerabilities

zdi
zdi

Foxit Reader XFA host beep Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.5AI Score

0.012EPSS

2018-10-11 12:00 AM
7
zdi
zdi

Foxit Reader XFA host importData Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.9AI Score

0.012EPSS

2018-10-11 12:00 AM
6
zdi
zdi

Foxit Reader XFA isCompatibleNS Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2.3AI Score

0.012EPSS

2018-10-11 12:00 AM
6
zdi
zdi

Foxit Reader XFA host currentPage Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.6AI Score

0.012EPSS

2018-10-11 12:00 AM
7
zdi
zdi

Foxit Reader XFA host print Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.7AI Score

0.012EPSS

2018-10-11 12:00 AM
5
zdi
zdi

Foxit Reader XFA TimeField colSpan Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.9AI Score

0.012EPSS

2018-10-11 12:00 AM
10
zdi
zdi

Foxit Reader XFA TimeField vAlign Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.7AI Score

0.012EPSS

2018-10-11 12:00 AM
6
zdi
zdi

Foxit Reader XFA TimeField rotate Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
10
zdi
zdi

Foxit Reader XFA TimeField mandatory Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.7AI Score

0.012EPSS

2018-10-11 12:00 AM
8
zdi
zdi

Foxit Reader XFA Form Model insertInstance Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
9
zdi
zdi

Foxit Reader XFA mouseUp Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
4
zdi
zdi

Foxit Reader XFA setInterval Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA setInterval.....

8.8CVSS

2.7AI Score

0.012EPSS

2018-10-11 12:00 AM
5
zdi
zdi

Foxit Reader XFA TimeField boundItem Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.9AI Score

0.012EPSS

2018-10-11 12:00 AM
8
zdi
zdi

Foxit Reader XFA TimeField setAttribute Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.9AI Score

0.012EPSS

2018-10-11 12:00 AM
7
zdi
zdi

Foxit Reader XFA Form Model moveInstance Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
6
zdi
zdi

Foxit Reader XFA host title Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.8AI Score

0.012EPSS

2018-10-11 12:00 AM
8
zdi
zdi

Foxit Reader XFA xmpmeta content Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2.3AI Score

0.012EPSS

2018-10-11 12:00 AM
15
zdi
zdi

Foxit Reader Field style Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.8AI Score

0.012EPSS

2018-10-11 12:00 AM
6
zdi
zdi

Foxit Reader XFA isPropertySpecified Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
7
zdi
zdi

Foxit Reader XFA desc Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.6AI Score

0.012EPSS

2018-10-11 12:00 AM
5
zdi
zdi

Foxit Reader XFA TimeField editValue Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.7AI Score

0.012EPSS

2018-10-11 12:00 AM
8
zdi
zdi

Foxit Reader XFA TimeField deleteItem Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.7AI Score

0.012EPSS

2018-10-11 12:00 AM
12
zdi
zdi

Foxit Reader XFA host resetData Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
6
zdi
zdi

Foxit Reader XFA host exportData Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.9AI Score

0.012EPSS

2018-10-11 12:00 AM
9
zdi
zdi

Foxit Reader XFA xfdf removeAttribute Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2.3AI Score

0.012EPSS

2018-10-11 12:00 AM
8
zdi
zdi

Foxit Reader XFA localeSet name Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
9
zdi
zdi

Foxit Reader TextBox Validate Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.8AI Score

0.012EPSS

2018-10-11 12:00 AM
7
zdi
zdi

Foxit Reader XFA aliasNode Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2.8AI Score

0.012EPSS

2018-10-11 12:00 AM
10
zdi
zdi

Foxit Reader XFA loadXML Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
8
zdi
zdi

Foxit Reader XFA Form count Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2.2AI Score

0.012EPSS

2018-10-11 12:00 AM
6
zdi
zdi

Foxit Reader XFA TimeField addItem Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.9AI Score

0.012EPSS

2018-10-11 12:00 AM
5
zdi
zdi

Foxit Reader XFA TimeField fillColor Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.9AI Score

0.012EPSS

2018-10-11 12:00 AM
9
zdi
zdi

Foxit Reader XFA getAttribute Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.012EPSS

2018-10-11 12:00 AM
8
zdi
zdi

Foxit Reader XFA setElement Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2.1AI Score

0.012EPSS

2018-10-11 12:00 AM
7
zdi
zdi

Foxit Reader XFA TimeField resolveNodes Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.6AI Score

0.012EPSS

2018-10-11 12:00 AM
5
zdi
zdi

Foxit Reader XFA TimeField getItemState Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.7AI Score

0.012EPSS

2018-10-11 12:00 AM
7
zdi
zdi

Foxit Reader XFA TimeField resolveNode Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

1.8AI Score

0.012EPSS

2018-10-11 12:00 AM
4
zdi
zdi

Adobe Acrobat Pro DC ImageConversion EMF EMR_COMMENT Out-Of-Bounds Read Information Disclosure Vulnerability

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the.....

5.5CVSS

2.7AI Score

0.022EPSS

2018-10-03 12:00 AM
11
zdi
zdi

Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing.....

7.8CVSS

3.3AI Score

0.003EPSS

2018-10-03 12:00 AM
7
zdi
zdi

Foxit Reader setInterval Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2.1AI Score

0.012EPSS

2018-09-28 12:00 AM
10
threatpost
threatpost

Privacy Advocates Say Kelsey Smith Act Gives Police Too Much Power

The delicate balancing act between security and privacy is once again being tested. A bill making its way through Congress seeks to allow law enforcement to more easily uncover location data for cell phones from mobile carriers. The Kelsey Smith Act (H.R. 5983 and S. 2973) would allow police and...

-0.6AI Score

2018-07-19 11:00 AM
6
zdi
zdi

Foxit Reader Button buttonSetIcon Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of...

8.8CVSS

3.3AI Score

0.022EPSS

2018-07-19 12:00 AM
6
zdi
zdi

Foxit Reader Field object signatureSetSeedValue Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the.....

8.8CVSS

2AI Score

0.022EPSS

2018-07-19 12:00 AM
9
zdi
zdi

Foxit Reader PolyLine Annotation addAdLayer Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of...

8.8CVSS

3.5AI Score

0.022EPSS

2018-07-19 12:00 AM
7
zdi
zdi

Foxit Reader Event Handling Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of...

8.8CVSS

1.9AI Score

0.022EPSS

2018-07-19 12:00 AM
7
zdi
zdi

Foxit Reader Link borderWidth Use-After-Free Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of...

8.8CVSS

2.7AI Score

0.022EPSS

2018-07-19 12:00 AM
9
srcincite
srcincite

SRC-2018-0028 : Adobe Acrobat Pro DC HTML2PDF HTML Parsing Use-After-Free Remote Code Execution Vulnerability

Vulnerability Details: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...

7.8CVSS

7.8AI Score

0.011EPSS

2018-06-06 12:00 AM
9
threatpost
threatpost

Senate Gives Nod To Controversial Cross-Border Data Access Bill

The United States Senate on Thursday approved a controversial cross-border data access act, dubbed the CLOUD Act, that was part of the overall omnibus government spending bill. Buried on page 2,201 of the government spending bill is the Clarifying Lawful Overseas Use of Data Act (the CLOUD Act), a....

-0.2AI Score

2018-03-23 04:54 PM
6
packetstorm

0.3AI Score

0.002EPSS

2017-07-27 12:00 AM
17
drupal
drupal

Bootstrap - Critical - Information Disclosure - SA-CONTRIB-2017-048

This theme enables you to bridge the gap between the Bootstrap Framework and Drupal. The theme does not sufficiently exclude the submitted password value when an incorrect value has been submitted Versions affected bootstrap 8.x-3.x versions prior to 8.x-3.5. Drupal core is not affected. If you...

7AI Score

2017-05-17 12:00 AM
4
Total number of security vulnerabilities509