Foxitsoftware Phantompdf vulnerabilities

549 known vulnerabilities affecting foxitsoftware/phantompdf.

Total CVEs
549
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL26HIGH438MEDIUM68LOW17

Vulnerabilities

Page 20 of 28
CVE-2018-14296HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14296 [HIGH] CWE-416 CVE-2018-14296: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Circle annotations. By manipulating a document'
nvd
CVE-2018-14258HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14258 [HIGH] CWE-843 CVE-2018-14258: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNthWord method. By performing actions in JavaScript, a
nvd
CVE-2018-14248HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14248 [HIGH] CWE-843 CVE-2018-14248: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsXFDF method. By performing actions in JavaScript, an
nvd
CVE-2018-14288HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14288 [HIGH] CWE-416 CVE-2018-14288: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arguments passed to the setFocus function. The is
nvd
CVE-2018-11623HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-11623 [HIGH] CWE-843 CVE-2018-11623: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addAdLayer method. By performing actions in JavaScript, an at
nvd
CVE-2018-14291HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14291 [HIGH] CWE-416 CVE-2018-14291: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elemen
nvd
CVE-2018-14311HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14311 [HIGH] CWE-843 CVE-2018-14311: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA events. The issue results from the lack of proper valida
nvd
CVE-2018-14272HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14272 [HIGH] CWE-843 CVE-2018-14272: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeIcon method. By performing actions in JavaScript, an at
nvd
CVE-2018-14292HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14292 [HIGH] CWE-416 CVE-2018-14292: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elemen
nvd
CVE-2018-14285HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14285 [HIGH] CWE-843 CVE-2018-14285: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the oneOfChild attribute. The issue results from
nvd
CVE-2018-14266HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14266 [HIGH] CWE-843 CVE-2018-14266: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the importDataObject method. By performing actions in JavaScript,
nvd
CVE-2018-14299HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14299 [HIGH] CWE-416 CVE-2018-14299: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Line annotations. By manipulating a document's
nvd
CVE-2018-14297HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14297 [HIGH] CWE-416 CVE-2018-14297: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of FreeText annotations. By manipulating a documen
nvd
CVE-2018-14298HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14298 [HIGH] CWE-416 CVE-2018-14298: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Ink annotations. By manipulating a document's e
nvd
CVE-2018-14255HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14255 [HIGH] CWE-843 CVE-2018-14255: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getNthFieldName method. By performing actions in JavaScript,
nvd
CVE-2018-14263HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14263 [HIGH] CWE-843 CVE-2018-14263: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getVersionID method. By performing actions in JavaScript, an
nvd
CVE-2018-14294HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14294 [HIGH] CWE-416 CVE-2018-14294: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of FileAttachment annotations. By manipulating a d
nvd
CVE-2018-14309HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14309 [HIGH] CWE-416 CVE-2018-14309: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the SeedValue Generic Object parameter provided t
nvd
CVE-2018-14300HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14300 [HIGH] CWE-416 CVE-2018-14300: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Polygon annotations. By manipulating a document
nvd
CVE-2018-14271HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14271 [HIGH] CWE-843 CVE-2018-14271: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. By performing actions in JavaScript, an a
nvd