Brief |
Acknowledgement |
Fixed a security issue where the application could be exposed to the Font Parsing Use-After-Free Remote Code Execution Vulnerability. |
Mario Gomes(@NetFuzzer), working with HP's Zero Day Initiative |
Fixed a security issue where the application could be exposed to the Global setPersistent Use-After-Free Remote Code Execution Vulnerability. |
AbdulAziz Hariri, HPE Zero Day Initiative, working with HP's Zero Day Initiative |
Fixed a security issue where the application could be exposed to the WillClose Action Use-After-Free Remote Code Execution Vulnerability. |
AbdulAziz Hariri, HPE Zero Day Initiative, working with HP's Zero Day Initiative |
Fixed a security issue where the application could be exposed to remote code execution vulnerability when opening certain PDF file with images. |
Rocco Calvi, working with HP's Zero Day Initiative |
Fixed a security issue where the application could be exposed to XFA FormCalc Replace Integer Overflow Vulnerability. |
HPE Zero Day Initiative, working with HP's Zero Day Initiative |
Fixed a security issue where the application could be exposed to Remote Code Execution Vulnerability due to JBIG2 Out-of-Bounds Read. |
kdot, working with HP's Zero Day Initiative |
Fixed a security issue where the application could crash unexpectedly when parsing certain PDF files that contain malformed images. |
Francis Provencher, COSIG |
Fixed a security issue where the application could crash unexpectedly when converting certain image with incorrect image data. |
kdot, working with HP's Zero Day Initiative |
Fixed the Microsoft Windows Gdiplus GpRuntime::GpLock::GpLock Use-After-Free Remote Code Execution Vulnerability. |
Jaanus Kp, Clarified Security, working with HP's Zero Day Initiative |
Fixed a security issue where the application could be exposed to DLL hijacking vulnerability when trying to load xpsp2res.dll or phoneinfo.dll. |
Ke Liu of Tencent’s Xuanwu LAB |