Foxitsoftware Phantompdf vulnerabilities
549 known vulnerabilities affecting foxitsoftware/phantompdf.
Total CVEs
549
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL26HIGH438MEDIUM68LOW17
Vulnerabilities
Page 21 of 28
CVE-2018-14245HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14245 [HIGH] CWE-843 CVE-2018-14245: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the closeDoc method. By performing actions in JavaScript, an atta
nvd
CVE-2018-14314HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14314 [HIGH] CWE-416 CVE-2018-14314: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of annotations. The issue results from the lack of v
nvd
CVE-2018-14304HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14304 [HIGH] CWE-416 CVE-2018-14304: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Text annotations. By manipulating a document's
nvd
CVE-2018-14242HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14242 [HIGH] CWE-843 CVE-2018-14242: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addField method. By performing actions in JavaScript, an atta
nvd
CVE-2018-11622HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-11622 [HIGH] CWE-787 CVE-2018-11622: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper v
nvd
CVE-2018-14246HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14246 [HIGH] CWE-843 CVE-2018-14246: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the convertTocPDF method. By performing actions in JavaScript, an
nvd
CVE-2018-14280HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14280 [HIGH] CWE-693 CVE-2018-14280: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsFDF XFA function. The issue results from the lack of
nvd
CVE-2018-14278HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14278 [HIGH] CWE-843 CVE-2018-14278: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNumWords method. By performing actions in JavaScript,
nvd
CVE-2018-14244HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14244 [HIGH] CWE-843 CVE-2018-14244: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the calculateNow method. By performing actions in JavaScript, an
nvd
CVE-2018-14269HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14269 [HIGH] CWE-843 CVE-2018-14269: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the print method. By performing actions in JavaScript, an attacke
nvd
CVE-2018-14283HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14283 [HIGH] CWE-416 CVE-2018-14283: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the highlightMode attribute. The issue results from the lack of v
nvd
CVE-2018-14282HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14282 [HIGH] CWE-665 CVE-2018-14282: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of FlateDecode streams. The issue results from the l
nvd
CVE-2018-14310HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14310 [HIGH] CWE-416 CVE-2018-14310: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of events. The issue results from the lack of valida
nvd
CVE-2018-14268HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14268 [HIGH] CWE-843 CVE-2018-14268: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mailForm method. By performing actions in JavaScript, an atta
nvd
CVE-2018-14301HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14301 [HIGH] CWE-416 CVE-2018-14301: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Sound annotations. By manipulating a document's
nvd
CVE-2018-14286HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14286 [HIGH] CWE-843 CVE-2018-14286: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arguments passed to the mailDoc function. The iss
nvd
CVE-2018-14302HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14302 [HIGH] CWE-416 CVE-2018-14302: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Square annotations. By manipulating a document'
nvd
CVE-2018-11618HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-11618 [HIGH] CWE-416 CVE-2018-11618: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resetForm method. The issue results from the
nvd
CVE-2018-14306HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14306 [HIGH] CWE-416 CVE-2018-14306: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of button objects. By manipulating a document's el
nvd
CVE-2018-11617HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-11617 [HIGH] CWE-416 CVE-2018-11617: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format events for ComboBox fields. The issue res
nvd