Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
foxitsoftware vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2018-17655
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-17656
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-17664
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-17666
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Phantompdf
Foxitsoftware Reader
8.8
CVSSv3
CVE-2018-17672
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-17681
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
Foxitsoftware Reader
Foxitsoftware Phantompdf
8.8
CVSSv3
CVE-2018-17688
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific ...
Foxitsoftware Phantompdf
Foxitsoftware Reader
8.8
CVSSv3
CVE-2018-17695
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific ...
Foxitsoftware Phantompdf
Foxitsoftware Reader
8.8
CVSSv3
CVE-2018-17698
This vulnerability allows remote malicious users to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific ...
Foxitsoftware Phantompdf
Foxitsoftware Reader
4.7
CVSSv3
CVE-2017-6883
The ConvertToPDF plugin in Foxit Reader prior to 8.2.1 and PhantomPDF prior to 8.2.1 on Windows, when the gflags app is enabled, allows remote malicious users to cause a denial of service (out-of-bounds read and application crash) via a crafted TIFF image. The vulnerability could...
Foxitsoftware Foxit Reader
Foxitsoftware Phantompdf
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »