Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware foxit phantom vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2018-17706
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The...
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-14295
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit PhantomPDF Phantom PDF 9.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
NA
CVE-2011-0332
Integer overflow in Foxit Reader prior to 4.3.1.0218 and Foxit Phantom prior to 2.3.3.1112 allows remote malicious users to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow.
Foxitsoftware Foxit Reader 4.1.1
Foxitsoftware Foxit Reader
Foxitsoftware Foxit Reader 3.1
Foxitsoftware Foxit Reader 2.2
Foxitsoftware Foxit Reader 2.0
Foxitsoftware Foxit Reader 3.3.1
Foxitsoftware Foxit Reader 3.1.4
Foxitsoftware Foxit Reader 3.1.1
Foxitsoftware Foxit Reader 2.3
Foxitsoftware Foxit Reader 3.1.3
Foxitsoftware Foxit Reader 3.2
Foxitsoftware Foxit Reader 3.0
Foxitsoftware Foxit Reader 3.2.1
Foxitsoftware Foxit Reader 4.0
Foxitsoftware Foxit Phantom 2.2.3
Foxitsoftware Foxit Phantom
Foxitsoftware Foxit Phantom 1.0.2
Foxitsoftware Foxit Phantom 2.1
Foxitsoftware Foxit Phantom 2.1.1
Foxitsoftware Foxit Phantom 2.2.4
Foxitsoftware Foxit Phantom 2.2
Foxitsoftware Foxit Phantom 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started