Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware foxit reader 9.0.1.1049 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2018-3842
An exploitable use of an uninitialized pointer vulnerability exists in the JavaScript engine in Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can lead to a dereference of an uninitialized pointer which, if under attacker control, can result in arbitrary co...
Foxitsoftware Foxit Reader 9.0.1.1049
8.8
CVSSv3
CVE-2018-3843
An exploitable type confusion vulnerability exists in the way Foxit PDF Reader version 9.0.1.1049 parses files with associated file annotations. A specially crafted PDF document can lead to an object of invalid type to be dereferenced, which can potentially lead to sensitive memo...
Foxitsoftware Foxit Reader 9.0.1.1049
8.8
CVSSv3
CVE-2018-3853
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused resulting in arbitrary code execution. An attacker need...
Foxitsoftware Foxit Reader 9.0.1.1049
8.8
CVSSv3
CVE-2018-9958
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
2 EDB exploits
1 Github repository
6.5
CVSSv3
CVE-2018-9948
This vulnerability allows remote malicious users to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The spec...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
2 EDB exploits
1 Github repository
8.8
CVSSv3
CVE-2018-9954
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-9956
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
8.8
CVSSv3
CVE-2018-9964
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-9974
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
8.8
CVSSv3
CVE-2018-9952
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »