Vulnerabilities > Foxitsoftware > Foxit Reader > 2.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-05-01 | CVE-2015-3633 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Enterprise Reader, Foxit Reader and Phantompdf Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allow remote attackers to cause a denial of service (memory corruption and crash) via vectors related to digital signatures. | 5.0 |
2015-05-01 | CVE-2015-3632 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Enterprise Reader, Foxit Reader and Phantompdf Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted GIF in a PDF file. | 4.3 |
2015-03-30 | CVE-2015-2790 | Improper Input Validation vulnerability in Foxitsoftware Enterprise Reader, Foxit Reader and Phantompdf Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image. | 4.3 |
2012-08-23 | CVE-2012-4337 | Memory Corruption vulnerability in Foxit Reader Foxit Reader before 5.3 on Windows XP and Windows 7 allows remote attackers to execute arbitrary code via a PDF document with a crafted attachment that triggers calculation of a negative number during processing of cross references. | 9.3 |
2011-09-27 | CVE-2011-3691 | Untrusted Search Path vulnerability in Foxitsoftware Foxit Reader Untrusted search path vulnerability in Foxit Reader before 5.0.2.0718 allows local users to gain privileges via a Trojan horse dwmapi.dll, dwrite.dll, or msdrm.dll in the current working directory. | 9.3 |
2011-06-24 | CVE-2011-1908 | Numeric Errors vulnerability in Foxitsoftware Foxit Reader Integer overflow in the Type 1 font decoder in the FreeType engine in Foxit Reader before 4.0.0.0619 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted font in a PDF document. | 9.3 |
2011-02-25 | CVE-2011-0332 | Numeric Errors vulnerability in Foxitsoftware Foxit Phantom and Foxit Reader Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow. | 9.3 |
2010-04-05 | CVE-2010-1239 | Code Injection vulnerability in Foxitsoftware Foxit Reader Foxit Reader before 3.2.1.0401 allows remote attackers to (1) execute arbitrary local programs via a certain "/Type /Action /S /Launch" sequence, and (2) execute arbitrary programs embedded in a PDF document via an unspecified "/Launch /Action" sequence, a related issue to CVE-2009-0836. | 9.3 |
2009-03-10 | CVE-2009-0191 | Code Injection vulnerability in Foxitsoftware Foxit Reader 2.3/3.0/3.0.2009.1301 Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 3.0.2009.1301, does not properly handle a JBIG2 symbol dictionary segment with zero new symbols, which allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a dereference of an uninitialized memory location. | 9.3 |
2008-05-21 | CVE-2008-1104 | Buffer Errors vulnerability in Foxitsoftware Foxit Reader 2.0/2.2/2.3 Stack-based buffer overflow in Foxit Reader before 2.3 build 2912 allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file, related to the util.printf JavaScript function and floating point specifiers in format strings. | 9.3 |