Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxit phantompdf vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2021-31459
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2021-31456
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2021-31458
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2021-31461
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2021-27261
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific ...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
4.3
CVSSv2
CVE-2021-27264
This vulnerability allows remote malicious users to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The s...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2021-27268
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific ...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2021-27270
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific ...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
4.3
CVSSv2
CVE-2021-27262
This vulnerability allows remote malicious users to disclose sensitive information on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The s...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2021-27271
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific ...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »