Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware phantompdf vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2015-3633
Foxit Reader, Enterprise Reader, and PhantomPDF prior to 7.1.5 allow remote malicious users to cause a denial of service (memory corruption and crash) via vectors related to digital signatures.
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
Foxitsoftware Phantompdf 7.1.0.306
Foxitsoftware Foxit Reader 7.1.0.306
Foxitsoftware Enterprise Reader
Foxitsoftware Enterprise Reader 7.1.0.306
605
VMScore
CVE-2021-31441
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
383
VMScore
CVE-2021-31443
This vulnerability allows remote malicious users to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The speci...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
383
VMScore
CVE-2021-31446
This vulnerability allows remote malicious users to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The speci...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
605
VMScore
CVE-2021-31449
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
605
VMScore
CVE-2021-31460
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
605
VMScore
CVE-2021-31461
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
668
VMScore
CVE-2018-17609
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Phantompdf
Foxitsoftware Reader
605
VMScore
CVE-2018-17615
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
605
VMScore
CVE-2018-17634
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »