Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware foxit reader vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2018-17611
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Phantompdf
Foxitsoftware Reader
668
VMScore
CVE-2018-14442
Foxit Reader prior to 9.2 and PhantomPDF prior to 9.2 have a Use-After-Free that leads to Remote Code Execution, aka V-88f4smlocs.
Foxitsoftware Phantompdf
Foxitsoftware Foxit Reader
1 Github repository
641
VMScore
CVE-2020-17414
This vulnerability allows local malicious users to escalate privileges on affected installations of Foxit Reader 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw e...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
641
VMScore
CVE-2020-17415
This vulnerability allows local malicious users to escalate privileges on affected installations of Foxit PhantomPDF 10.0.0.35798. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific fl...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
614
VMScore
CVE-2015-8843
The Foxit Cloud Update Service (FoxitCloudUpdateService) in Foxit Reader 6.1 up to and including 6.2.x and 7.x prior to 7.2.2, when an update to the Cloud plugin is available, allows local users to gain privileges by writing crafted data to a shared memory region, which triggers ...
Foxitsoftware Foxit Reader 7.0
Foxitsoftware Foxit Reader 7.0.6
Foxitsoftware Foxit Reader 7.2
Foxitsoftware Foxit Reader 6.2
Foxitsoftware Foxit Reader 6.1.2
Foxitsoftware Foxit Reader 6.1.4
Foxitsoftware Foxit Reader 7.0.1
Foxitsoftware Foxit Reader 6.2.1
Foxitsoftware Foxit Reader 7.1.5
Foxitsoftware Foxit Reader 6.1
614
VMScore
CVE-2012-4759
Untrusted search path vulnerability in facebook_plugin.fpi in the Facebook plug-in in Foxit Reader 5.3.1.0606 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .pdf file. NOTE:...
Foxitsoftware Foxit Reader 5.3.1.0606
607
VMScore
CVE-2020-8844
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw ...
Foxitsoftware Reader
Foxitsoftware Phantompdf
607
VMScore
CVE-2019-13330
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw ...
Foxitsoftware Reader
607
VMScore
CVE-2019-13331
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw ...
Foxitsoftware Reader
605
VMScore
CVE-2021-34831
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.4.37651. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxit Pdf Reader
Foxitsoftware Pdf Editor
Foxitsoftware Pdf Editor 11.0.0.49893
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »