Vulnerabilities
Aggregated CVE / GHSA / KEV / OSV — filter by tag and category.
| ID | Title | |
|---|---|---|
| CVE-2017-16589 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-16589)
vulnerability in foxitsoftware (CVE-2017-16589). Confidential information can be exposed externally.
|
| CVE-2017-16588 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-16588)
vulnerability in foxitsoftware (CVE-2017-16588). Confidential information can be exposed externally.
|
| CVE-2017-16587 |
|
Use-After-Free in foxitsoftware (CVE-2017-16587)
vulnerability in foxitsoftware (CVE-2017-16587). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16586 |
|
Use-After-Free in foxitsoftware (CVE-2017-16586)
vulnerability in foxitsoftware (CVE-2017-16586). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16585 |
|
Use-After-Free in foxitsoftware (CVE-2017-16585)
vulnerability in foxitsoftware (CVE-2017-16585). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16584 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-16584)
vulnerability in foxitsoftware (CVE-2017-16584). Confidential information can be exposed externally.
|
| CVE-2017-16572 |
|
Vulnerability in foxitsoftware (CVE-2017-16572)
vulnerability in foxitsoftware (CVE-2017-16572). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16574 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-16574)
vulnerability in foxitsoftware (CVE-2017-16574). Confidential information can be exposed externally.
|
| CVE-2017-16571 |
|
Vulnerability in foxitsoftware (CVE-2017-16571)
vulnerability in foxitsoftware (CVE-2017-16571). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14837 |
|
Vulnerability in foxitsoftware (CVE-2017-14837)
vulnerability in foxitsoftware (CVE-2017-14837). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14836 |
|
Use-After-Free in foxitsoftware (CVE-2017-14836)
vulnerability in foxitsoftware (CVE-2017-14836). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14835 |
|
Vulnerability in foxitsoftware (CVE-2017-14835)
vulnerability in foxitsoftware (CVE-2017-14835). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14834 |
|
Use-After-Free in foxitsoftware (CVE-2017-14834)
vulnerability in foxitsoftware (CVE-2017-14834). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14833 |
|
Use-After-Free in foxitsoftware (CVE-2017-14833)
vulnerability in foxitsoftware (CVE-2017-14833). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14832 |
|
Use-After-Free in foxitsoftware (CVE-2017-14832)
vulnerability in foxitsoftware (CVE-2017-14832). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14831 |
|
Use-After-Free in foxitsoftware (CVE-2017-14831)
vulnerability in foxitsoftware (CVE-2017-14831). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14830 |
|
Vulnerability in foxitsoftware (CVE-2017-14830)
vulnerability in foxitsoftware (CVE-2017-14830). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16573 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-16573)
vulnerability in foxitsoftware (CVE-2017-16573). Confidential information can be exposed externally.
|
| CVE-2017-16575 |
|
Use-After-Free in foxitsoftware (CVE-2017-16575)
vulnerability in foxitsoftware (CVE-2017-16575). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16576 |
|
Use-After-Free in foxitsoftware (CVE-2017-16576)
vulnerability in foxitsoftware (CVE-2017-16576). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16577 |
|
Use-After-Free in foxitsoftware (CVE-2017-16577)
vulnerability in foxitsoftware (CVE-2017-16577). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16578 |
|
Vulnerability in foxitsoftware (CVE-2017-16578)
vulnerability in foxitsoftware (CVE-2017-16578). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16579 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-16579)
vulnerability in foxitsoftware (CVE-2017-16579). Confidential information can be exposed externally.
|
| CVE-2017-16580 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-16580)
vulnerability in foxitsoftware (CVE-2017-16580). Confidential information can be exposed externally.
|
| CVE-2017-16581 |
|
Use-After-Free in foxitsoftware (CVE-2017-16581)
vulnerability in foxitsoftware (CVE-2017-16581). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16582 |
|
Vulnerability in foxitsoftware (CVE-2017-16582)
vulnerability in foxitsoftware (CVE-2017-16582). Successful exploitation can lead to full system takeover.
|
| CVE-2017-16583 |
|
Use-After-Free in foxitsoftware (CVE-2017-16583)
vulnerability in foxitsoftware (CVE-2017-16583). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14829 |
|
Vulnerability in foxitsoftware (CVE-2017-14829)
vulnerability in foxitsoftware (CVE-2017-14829). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14828 |
|
Vulnerability in foxitsoftware (CVE-2017-14828)
vulnerability in foxitsoftware (CVE-2017-14828). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14827 |
|
Vulnerability in foxitsoftware (CVE-2017-14827)
vulnerability in foxitsoftware (CVE-2017-14827). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14826 |
|
Vulnerability in foxitsoftware (CVE-2017-14826)
vulnerability in foxitsoftware (CVE-2017-14826). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14825 |
|
Vulnerability in foxitsoftware (CVE-2017-14825)
vulnerability in foxitsoftware (CVE-2017-14825). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14824 |
|
Vulnerability in foxitsoftware (CVE-2017-14824)
vulnerability in foxitsoftware (CVE-2017-14824). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14823 |
|
Vulnerability in foxitsoftware (CVE-2017-14823)
vulnerability in foxitsoftware (CVE-2017-14823). Successful exploitation can lead to full system takeover.
|
| CVE-2017-14822 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-14822)
vulnerability in foxitsoftware (CVE-2017-14822). Confidential information can be exposed externally.
|
| CVE-2017-14821 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-14821)
vulnerability in foxitsoftware (CVE-2017-14821). Confidential information can be exposed externally.
|
| CVE-2017-14820 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-14820)
vulnerability in foxitsoftware (CVE-2017-14820). Confidential information can be exposed externally.
|
| CVE-2017-14819 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-14819)
vulnerability in foxitsoftware (CVE-2017-14819). Confidential information can be exposed externally.
|
| CVE-2017-14818 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-14818)
vulnerability in foxitsoftware (CVE-2017-14818). Confidential information can be exposed externally.
|
| CVE-2017-10959 |
|
Use-After-Free in foxitsoftware (CVE-2017-10959)
vulnerability in foxitsoftware (CVE-2017-10959). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10958 |
|
Use-After-Free in foxitsoftware (CVE-2017-10958)
vulnerability in foxitsoftware (CVE-2017-10958). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10957 |
|
Use-After-Free in foxitsoftware (CVE-2017-10957)
vulnerability in foxitsoftware (CVE-2017-10957). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10956 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-10956)
vulnerability in foxitsoftware (CVE-2017-10956). Confidential information can be exposed externally.
|
| CVE-2017-10944 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-10944)
vulnerability in foxitsoftware (CVE-2017-10944). Confidential information can be exposed externally.
|
| CVE-2017-10941 |
|
Use-After-Free in foxitsoftware (CVE-2017-10941)
vulnerability in foxitsoftware (CVE-2017-10941). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10942 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-10942)
vulnerability in foxitsoftware (CVE-2017-10942). Confidential information can be exposed externally.
|
| CVE-2017-10943 |
|
Out-of-Bounds Read in foxitsoftware (CVE-2017-10943)
vulnerability in foxitsoftware (CVE-2017-10943). Confidential information can be exposed externally.
|
| CVE-2017-10945 |
|
Use-After-Free in foxitsoftware (CVE-2017-10945)
vulnerability in foxitsoftware (CVE-2017-10945). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10946 |
|
Use-After-Free in foxitsoftware (CVE-2017-10946)
vulnerability in foxitsoftware (CVE-2017-10946). Successful exploitation can lead to full system takeover.
|
| CVE-2017-10947 |
|
Use-After-Free in foxitsoftware (CVE-2017-10947)
vulnerability in foxitsoftware (CVE-2017-10947). Successful exploitation can lead to full system takeover.
|