Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware phantompdf vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2016-8875
The ConvertToPDF plugin in Foxit Reader and PhantomPDF prior to 8.1 on Windows, when the gflags app is enabled, allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image, aka "Data from Faulting Address is ...
Foxitsoftware Reader
Foxitsoftware Phantompdf
605
VMScore
CVE-2016-8877
Heap buffer overflow (Out-of-Bounds write) vulnerability in Foxit Reader and PhantomPDF prior to 8.1 on Windows allows remote malicious users to execute arbitrary code via a crafted JPEG2000 image embedded in a PDF document, aka a "corrupted suffix pattern" issue.
Foxitsoftware Reader
Foxitsoftware Phantompdf
383
VMScore
CVE-2016-8879
The thumbnail shell extension plugin (FoxitThumbnailHndlr_x86.dll) in Foxit Reader and PhantomPDF prior to 8.1 on Windows allows remote malicious users to cause a denial of service (out-of-bounds write and application crash) via a crafted JPEG2000 image embedded in a PDF document...
Foxitsoftware Reader
Foxitsoftware Phantompdf
605
VMScore
CVE-2018-16296
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Reader prior to 9.3 and PhantomPDF prior to 9.3, a different vulnerability than CVE-2018-16291, CVE-2018-16292, CVE-2018-16293, CVE-2018-16294, CVE-2018-16295, and CVE-2018-16297. A specially cra...
Foxitsoftware Phantompdf
Foxitsoftware Reader
668
VMScore
CVE-2018-17609
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Phantompdf
Foxitsoftware Reader
668
VMScore
CVE-2018-17610
Foxit PhantomPDF and Reader prior to 9.3 allow remote malicious users to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
Foxitsoftware Phantompdf
Foxitsoftware Reader
605
VMScore
CVE-2018-17625
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
605
VMScore
CVE-2018-17626
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
605
VMScore
CVE-2018-17627
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
605
VMScore
CVE-2018-17632
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »