Foxitsoftware Phantompdf vulnerabilities

549 known vulnerabilities affecting foxitsoftware/phantompdf.

Total CVEs
549
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL26HIGH438MEDIUM68LOW17

Vulnerabilities

Page 18 of 28
CVE-2018-3958HIGHCVSS 7.8≤ 9.2.0.92972018-10-02
CVE-2018-3958 [HIGH] CWE-416 CVE-2018-3958: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the Subject property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled,
nvd
CVE-2018-3944HIGHCVSS 8.8≤ 9.2.0.92972018-10-02
CVE-2018-3944 [HIGH] CWE-416 CVE-2018-3944: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
nvd
CVE-2018-17781HIGHCVSS 7.5≤ 9.2.0.92972018-09-29
CVE-2018-17781 [HIGH] CWE-200 CVE-2018-17781: Foxit PhantomPDF and Reader before 9.3 allow remote attackers to trigger Uninitialized Object Inform Foxit PhantomPDF and Reader before 9.3 allow remote attackers to trigger Uninitialized Object Information Disclosure because creation of ArrayBuffer and DataView objects is mishandled.
nvd
CVE-2018-17610CRITICALCVSS 9.8fixed in 9.32018-09-28
CVE-2018-17610 [CRITICAL] CWE-416 CVE-2018-17610: Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a d Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
nvd
CVE-2018-17607CRITICALCVSS 9.8fixed in 9.32018-09-28
CVE-2018-17607 [CRITICAL] CWE-416 CVE-2018-17607: Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a d Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
nvd
CVE-2018-17608CRITICALCVSS 9.8fixed in 9.32018-09-28
CVE-2018-17608 [CRITICAL] CWE-416 CVE-2018-17608: Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a d Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
nvd
CVE-2018-17609CRITICALCVSS 9.8fixed in 9.32018-09-28
CVE-2018-17609 [CRITICAL] CWE-416 CVE-2018-17609: Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a d Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
nvd
CVE-2018-17611CRITICALCVSS 9.8fixed in 9.32018-09-28
CVE-2018-17611 [CRITICAL] CWE-416 CVE-2018-17611: Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a d Foxit PhantomPDF and Reader before 9.3 allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) because properties of Annotation objects are mishandled. This relates to one of five distinct types of Annotation objects.
nvd
CVE-2018-3924HIGHCVSS 7.8≤ 9.1.0.50962018-08-01
CVE-2018-3924 [HIGH] CWE-416 CVE-2018-3924: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulner
nvd
CVE-2018-3939HIGHCVSS 8.8≤ 9.1.0.50962018-08-01
CVE-2018-3939 [HIGH] CWE-416 CVE-2018-3939: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
nvd
CVE-2018-14247HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14247 [HIGH] CWE-843 CVE-2018-14247: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsFDF method. By performing actions in JavaScript, an a
nvd
CVE-2018-14265HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14265 [HIGH] CWE-843 CVE-2018-14265: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the importAnXFDX method. By performing actions in JavaScript, an
nvd
CVE-2018-14260HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14260 [HIGH] CWE-843 CVE-2018-14260: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageRotation method. By performing actions in JavaScript,
nvd
CVE-2018-14313HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14313 [HIGH] CWE-843 CVE-2018-14313: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF files. The issue results from the lack of pro
nvd
CVE-2018-14284HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14284 [HIGH] CWE-416 CVE-2018-14284: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the newDoc function. The issue results from the l
nvd
CVE-2018-14315HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14315 [HIGH] CWE-416 CVE-2018-14315: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of annotations. The issue results from the lack of v
nvd
CVE-2018-14243HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14243 [HIGH] CWE-843 CVE-2018-14243: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addPageOpenJSMessage method. By performing actions in JavaScr
nvd
CVE-2018-14241HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14241 [HIGH] CWE-843 CVE-2018-14241: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addAnnot method. By performing actions in JavaScript, an atta
nvd
CVE-2018-14251HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14251 [HIGH] CWE-843 CVE-2018-14251: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getDataObject method. By performing actions in JavaScript, an
nvd
CVE-2018-14253HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14253 [HIGH] CWE-843 CVE-2018-14253: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getIcon method. By performing actions in JavaScript, an attac
nvd