Foxitsoftware Phantompdf vulnerabilities

549 known vulnerabilities affecting foxitsoftware/phantompdf.

Total CVEs
549
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL26HIGH438MEDIUM68LOW17

Vulnerabilities

Page 13 of 28
CVE-2018-17705HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17705 [HIGH] CWE-416 CVE-2018-17705: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the display property of CheckBox objects. The iss
nvd
CVE-2018-17692HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17692 [HIGH] CWE-787 CVE-2018-17692: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from t
nvd
CVE-2018-17651HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17651 [HIGH] CWE-416 CVE-2018-17651: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the getItemState method of a TimeField. The issue
nvd
CVE-2018-17664HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17664 [HIGH] CWE-416 CVE-2018-17664: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the isCompatibleNS method of a XFA object. The is
nvd
CVE-2018-17685HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17685 [HIGH] CWE-843 CVE-2018-17685: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF files. The issue results from the lack of pro
nvd
CVE-2018-17636HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17636 [HIGH] CWE-416 CVE-2018-17636: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the id property of a aliasNode. The issue results
nvd
CVE-2018-17637HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17637 [HIGH] CWE-416 CVE-2018-17637: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the loadXML method. The issue results from the la
nvd
CVE-2018-17698HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17698 [HIGH] CWE-416 CVE-2018-17698: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a text field. The i
nvd
CVE-2018-17701HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17701 [HIGH] CWE-125 CVE-2018-17701: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of JSON objects. The issue results from the lack
nvd
CVE-2018-17628HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17628 [HIGH] CWE-416 CVE-2018-17628: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA setInterval method. The issue results from the lack of va
nvd
CVE-2018-17671HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17671 [HIGH] CWE-125 CVE-2018-17671: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Lower method of a XFA object. The is
nvd
CVE-2018-17657HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17657 [HIGH] CWE-416 CVE-2018-17657: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the gotoURL method of a host object. The issue re
nvd
CVE-2018-17665HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17665 [HIGH] CWE-416 CVE-2018-17665: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the currentPage property of a Host object. The is
nvd
CVE-2018-17674HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17674 [HIGH] CWE-416 CVE-2018-17674: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the name property of Annotation objects. The issu
nvd
CVE-2018-17688HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17688 [HIGH] CWE-416 CVE-2018-17688: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setItems method of a ComboBox. The issue
nvd
CVE-2018-17650HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17650 [HIGH] CWE-416 CVE-2018-17650: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNodes method of a TimeField. The issue
nvd
CVE-2018-17642HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17642 [HIGH] CWE-416 CVE-2018-17642: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the colSpan property of a TimeField. The issue re
nvd
CVE-2018-17683HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17683 [HIGH] CWE-416 CVE-2018-17683: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the createIcon method of an app object. The issue
nvd
CVE-2018-17676HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17676 [HIGH] CWE-416 CVE-2018-17676: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeField property of a app object. The iss
nvd
CVE-2018-17654HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17654 [HIGH] CWE-416 CVE-2018-17654: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the insertInstance method of a Form object. The i
nvd