<![CDATA[ZDI: Published Advisories]]> http://www.zerodayinitiative.com/advisories/published/ Sat Apr 29 07:00:57 2017 +0000 zdi@hp.com (Author) Tippingpoint, all rights reserved ZDI Bird Feeder en http://blogs.law.harvard.edu/tech/rss <![CDATA[ZDI-17-313: Foxit Reader getAnnot Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/0nindIXogNY/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/0nindIXogNY" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-313/ <![CDATA[ZDI-17-312: Foxit Reader Annotations lock Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/GYId5tM9gno/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/GYId5tM9gno" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-312/ <![CDATA[ZDI-17-311: Foxit Reader Annotations style Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/TzmiL-4E6aE/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/TzmiL-4E6aE" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-311/ <![CDATA[ZDI-17-310: Foxit Reader Annotations opacity Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/iqAXX0W44uo/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/iqAXX0W44uo" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-310/ <![CDATA[ZDI-17-309: Foxit Reader Annotations arrowEnd Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/EbQX6Q_NBTo/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/EbQX6Q_NBTo" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-309/ <![CDATA[ZDI-17-308: Foxit Reader importAnXFDF Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/TN4MkezUE7w/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/TN4MkezUE7w" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-308/ <![CDATA[ZDI-17-307: Foxit Reader Field setAction Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/TnhbftGElTE/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/TnhbftGElTE" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-307/ <![CDATA[ZDI-17-306: Foxit Reader Link setAction Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/fOg_im0-h3A/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/fOg_im0-h3A" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-306/ <![CDATA[ZDI-17-305: Foxit Reader getURL Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/y9DMiWnamyg/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/y9DMiWnamyg" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-305/ <![CDATA[ZDI-17-304: Foxit Reader spawnPageFromTemplate Use-After-Free Remote Code Execution Vulnerability]]> http://feedproxy.google.com/~r/ZDI-Published-Advisories/~3/OzFlIGZx5lo/ This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.<img src="http://feeds.feedburner.com/~r/ZDI-Published-Advisories/~4/OzFlIGZx5lo" height="1" width="1" alt=""/> Fri, 21 Apr 2017 12:00:00 +0000 http://www.zerodayinitiative.com/advisories/ZDI-17-304/