Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware phantompdf vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2018-17607
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Reader
Foxitsoftware Phantompdf
7.5
CVSSv2
CVE-2018-17608
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Reader
Foxitsoftware Phantompdf
7.5
CVSSv2
CVE-2018-17609
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Phantompdf
Foxitsoftware Reader
7.5
CVSSv2
CVE-2018-17610
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Reader
Foxitsoftware Phantompdf
7.5
CVSSv2
CVE-2018-17611
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2018-17615
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17616
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2018-17618
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
6.8
CVSSv2
CVE-2018-17620
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
4.3
CVSSv2
CVE-2018-17622
This vulnerability allows remote malicious users to disclose sensitive information on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The speci...
Foxitsoftware Reader
Foxitsoftware Phantompdf
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-25525
CVE-2024-4652
CVE-2024-1438
CVE-2024-4671
CVE-2024-34351
arbitrary
CVE-2024-4650
SQL injection
overflow
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »