Foxitsoftware Phantompdf vulnerabilities

549 known vulnerabilities affecting foxitsoftware/phantompdf.

Total CVEs
549
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL26HIGH438MEDIUM68LOW17

Vulnerabilities

Page 10 of 28
CVE-2019-14213HIGHCVSS 7.5fixed in 8.3.112019-07-21
CVE-2019-14213 [HIGH] CVE-2019-14213: An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash due to the re An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash due to the repeated release of the signature dictionary during CSG_SignatureF and CPDF_Document destruction.
nvd
CVE-2019-14212HIGHCVSS 7.5fixed in 8.3.112019-07-21
CVE-2019-14212 [HIGH] CWE-476 CVE-2019-14212: An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling certain XFA JavaScript due to the use of, or access to, a NULL pointer without proper validation on the object.
nvd
CVE-2019-14215HIGHCVSS 7.5fixed in 8.3.112019-07-21
CVE-2019-14215 [HIGH] CWE-119 CVE-2019-14215: An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling xfa.event.rest XFA JavaScript due to accessing a wild pointer.
nvd
CVE-2019-14211HIGHCVSS 7.5fixed in 8.3.112019-07-21
CVE-2019-14211 [HIGH] CWE-20 CVE-2019-14211: An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash due to the la An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash due to the lack of proper validation of the existence of an object prior to performing operations on that object when executing JavaScript.
nvd
CVE-2019-14207HIGHCVSS 7.5fixed in 8.3.112019-07-21
CVE-2019-14207 [HIGH] CWE-835 CVE-2019-14207: An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling An issue was discovered in Foxit PhantomPDF before 8.3.11. The application could crash when calling the clone function due to an endless loop resulting from confusing relationships between a child and parent object (caused by an append error).
nvd
CVE-2019-14208HIGHCVSS 7.5fixed in 8.3.102019-07-21
CVE-2019-14208 [HIGH] CWE-476 CVE-2019-14208: An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to a NUL An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to a NULL pointer dereference and crash when getting a PDF object from a document, or parsing a certain portfolio that contains a null dictionary.
nvd
CVE-2019-14214HIGHCVSS 7.5fixed in 8.3.102019-07-21
CVE-2019-14214 [HIGH] CVE-2019-14214: An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to a Jav An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to a JavaScript Denial of Service when deleting pages in a document that contains only one page by calling a "t.hidden = true" function.
nvd
CVE-2019-14210HIGHCVSS 7.5fixed in 8.3.102019-07-21
CVE-2019-14210 [HIGH] CWE-787 CVE-2019-14210: An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Memor An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Memory Corruption due to the use of an invalid pointer copy, resulting from a destructed string object.
nvd
CVE-2019-6760HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6760 [HIGH] CWE-787 CVE-2019-6760: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper vali
nvd
CVE-2019-6762HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6762 [HIGH] CWE-416 CVE-2019-6762: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from th
nvd
CVE-2019-6757HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6757 [HIGH] CWE-416 CVE-2019-6757: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of validating
nvd
CVE-2019-6759HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6759 [HIGH] CWE-787 CVE-2019-6759: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper vali
nvd
CVE-2019-6768HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6768 [HIGH] CWE-416 CVE-2019-6768: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue result
nvd
CVE-2019-6755HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6755 [HIGH] CWE-787 CVE-2019-6755: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper vali
nvd
CVE-2019-6761HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6761 [HIGH] CWE-416 CVE-2019-6761: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.0.16811. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA CXFA_FFDocView object. The issue results from the lack of
nvd
CVE-2019-6754HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6754 [HIGH] CWE-22 CVE-2019-6754: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.3.10826. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the localFileStorage method. The issue results from the lack of prope
nvd
CVE-2019-6769HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6769 [HIGH] CWE-416 CVE-2019-6769: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue result
nvd
CVE-2019-6763HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6763 [HIGH] CWE-416 CVE-2019-6763: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ToggleFormsDesign method of the Foxit.FoxitReader.Ctl ActiveX
nvd
CVE-2019-6765HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6765 [HIGH] CWE-125 CVE-2019-6765: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from th
nvd
CVE-2019-6764HIGHCVSS 7.8≤ 8.3.9.41099≥ 9.0.0, ≤ 9.4.1.168282019-06-03
CVE-2019-6764 [HIGH] CWE-787 CVE-2019-6764: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA Template objects. The issue results from the
nvd