Vulnerabilities > Foxitsoftware > Foxit Reader > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-12-20 | CVE-2017-10958 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-12-20 | CVE-2017-10957 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.1.21155 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. | 8.8 |
2017-10-31 | CVE-2017-10953 | Improper Input Validation vulnerability in Foxitsoftware Foxit Reader 8.3.0.14878 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878. | 8.8 |
2017-10-31 | CVE-2017-10948 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.2.1.6871 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. | 8.8 |
2017-10-31 | CVE-2017-10947 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.2.1.6871 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. | 8.8 |
2017-10-31 | CVE-2017-10946 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.2.1.6871 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. | 8.8 |
2017-10-31 | CVE-2017-10945 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.0.14878 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878. | 8.8 |
2017-10-31 | CVE-2017-10941 | Use After Free vulnerability in Foxitsoftware Foxit Reader 8.3.0.14878 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878. | 8.8 |
2017-09-22 | CVE-2017-14694 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Foxitsoftware Foxit Reader 8.3.2.25013 Foxit Reader 8.3.2.25013 and earlier and Foxit PhantomPDF 8.3.2.25013 and earlier, when running in single instance mode, allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at tiptsf!CPenInputPanel::FinalRelease+0x000000000000002f.". | 7.8 |
2017-08-29 | CVE-2017-10952 | Improper Input Validation vulnerability in Foxitsoftware Foxit Reader 8.2.0.2051 This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.0.2051. | 8.8 |