Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware foxit reader 9.0.0.29935 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2018-9947
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
6.8
CVSSv2
CVE-2018-9936
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
6.8
CVSSv2
CVE-2018-9938
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
6.8
CVSSv2
CVE-2018-9940
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
6.8
CVSSv2
CVE-2018-9942
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
4.3
CVSSv2
CVE-2018-9946
This vulnerability allows remote malicious users to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The spec...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
6.8
CVSSv2
CVE-2018-9949
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
6.8
CVSSv2
CVE-2018-9951
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
1 Github repository
6.8
CVSSv2
CVE-2018-9977
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
4.3
CVSSv2
CVE-2018-1175
This vulnerability allows remote malicious users to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The spec...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »