Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware foxit reader vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2018-9942
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2018-9944
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2018-9945
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
4.3
CVSSv2
CVE-2018-9946
This vulnerability allows remote malicious users to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The spec...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
6.8
CVSSv2
CVE-2018-9947
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2018-9949
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
4.3
CVSSv2
CVE-2018-9950
This vulnerability allows remote malicious users to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The spec...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
1 Github repository
6.8
CVSSv2
CVE-2018-9951
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
1 Github repository
6.8
CVSSv2
CVE-2018-9952
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2018-9954
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »