Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
phantompdf vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2018-17638
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17642
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17643
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17646
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17648
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17649
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17650
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17652
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17658
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
6.8
CVSSv2
CVE-2018-17665
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6267
XML injection
CVE-2024-37673
CVE-2024-6266
CVE-2024-30078
arbitrary
CVE-2024-36886
CVE-2024-5346
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »