Vulnerabilities > Foxitsoftware > Foxit Reader > 8.2.0.2051
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-04-23 | CVE-2018-10302 | Use After Free vulnerability in Foxitsoftware Phantompdf A use-after-free in Foxit Reader before 9.1 and PhantomPDF before 9.1 allows remote attackers to execute arbitrary code, aka iDefense ID V-jyb51g3mv9. | 7.8 |
2017-08-29 | CVE-2017-10952 | Improper Input Validation vulnerability in Foxitsoftware Foxit Reader 8.2.0.2051 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. | 8.8 |
2017-07-07 | CVE-2017-10994 | Write-what-where Condition vulnerability in Foxitsoftware Foxit Reader Foxit Reader before 8.3.1 and PhantomPDF before 8.3.1 have an Arbitrary Write vulnerability, which allows remote attackers to execute arbitrary code via a crafted document. | 7.3 |
2017-05-03 | CVE-2017-8455 | Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 have an out-of-bounds read that allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted font in a PDF document. | 7.8 |
2017-05-03 | CVE-2017-8454 | Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 have an out-of-bounds read that allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted font in a PDF document. | 8.8 |
2017-05-03 | CVE-2017-8453 | Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 have an out-of-bounds read that allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted font in a PDF document. | 8.8 |
2017-03-14 | CVE-2017-6883 | Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader The ConvertToPDF plugin in Foxit Reader before 8.2.1 and PhantomPDF before 8.2.1 on Windows, when the gflags app is enabled, allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image. | 4.7 |