Vulnerabilities > Foxitsoftware > Foxit Reader
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-03-30 | CVE-2021-27266 | Out-of-bounds Read vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. | 3.3 |
2021-03-30 | CVE-2021-27265 | Unspecified vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. | 3.3 |
2021-03-30 | CVE-2021-27264 | Unspecified vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. | 3.3 |
2021-03-30 | CVE-2021-27263 | Unspecified vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. | 3.3 |
2021-03-30 | CVE-2021-27262 | Unspecified vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. | 3.3 |
2021-03-30 | CVE-2021-27261 | Unspecified vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. | 7.8 |
2021-02-12 | CVE-2020-27860 | Unspecified vulnerability in Foxitsoftware Foxit Reader This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.0.1.35811. | 7.8 |
2021-02-10 | CVE-2020-13548 | Use After Free vulnerability in Foxitsoftware Foxit Reader 10.1.0.37527 In Foxit Reader 10.1.0.37527, a specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. | 8.8 |
2021-01-07 | CVE-2018-18689 | Improper Verification of Cryptographic Signature vulnerability in multiple products The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. network low complexity avanquest foxitsoftware gonitro iskysoft pdf-xchange pdfforge qoppa sodapdf soft-xpansion tracker-software visagesoft CWE-347 | 5.3 |
2021-01-07 | CVE-2018-18688 | Improper Verification of Cryptographic Signature vulnerability in multiple products The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. network low complexity code-industry foxitsoftware gonitro iskysoft libreoffice nuance qoppa soft-xpansion CWE-347 | 5.3 |