Vulnerabilities > Foxitsoftware > Foxit Reader > 4.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-05-01 | CVE-2015-3632 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Enterprise Reader, Foxit Reader and Phantompdf Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted GIF in a PDF file. | 4.3 |
2015-03-30 | CVE-2015-2790 | Improper Input Validation vulnerability in Foxitsoftware Enterprise Reader, Foxit Reader and Phantompdf Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image. | 4.3 |
2012-08-23 | CVE-2012-4337 | Memory Corruption vulnerability in Foxit Reader Foxit Reader before 5.3 on Windows XP and Windows 7 allows remote attackers to execute arbitrary code via a PDF document with a crafted attachment that triggers calculation of a negative number during processing of cross references. | 9.3 |
2011-09-27 | CVE-2011-3691 | Untrusted Search Path vulnerability in Foxitsoftware Foxit Reader Untrusted search path vulnerability in Foxit Reader before 5.0.2.0718 allows local users to gain privileges via a Trojan horse dwmapi.dll, dwrite.dll, or msdrm.dll in the current working directory. | 9.3 |
2011-02-25 | CVE-2011-0332 | Numeric Errors vulnerability in Foxitsoftware Foxit Phantom and Foxit Reader Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow. | 9.3 |