Foxitsoftware Phantompdf vulnerabilities
549 known vulnerabilities affecting foxitsoftware/phantompdf.
Total CVEs
549
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL26HIGH438MEDIUM68LOW17
Vulnerabilities
Page 8 of 28
CVE-2020-8845HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8845 [HIGH] CWE-416 CVE-2020-8845: This vulnerability allows remote atackers to execute arbitrary code on affected installations of Fox
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of watermarks in AcroForms. The issue results from
nvd
CVE-2020-8856HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8856 [HIGH] CWE-416 CVE-2020-8856: This vulnerability allows remote atackers to execute arbitrary code on affected installations of Fox
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25608. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of watermarks. The issue results from the lack of v
nvd
CVE-2020-8850HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8850 [HIGH] CWE-787 CVE-2020-8850: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the lack o
nvd
CVE-2020-8853HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8853 [HIGH] CWE-787 CVE-2020-8853: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from the
nvd
CVE-2020-8848HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8848 [HIGH] CWE-787 CVE-2020-8848: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPG2000 images. The issue results from the lack o
nvd
CVE-2020-8849HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8849 [HIGH] CWE-787 CVE-2020-8849: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the lack o
nvd
CVE-2020-8851HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8851 [HIGH] CWE-787 CVE-2020-8851: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPG2000 images. The issue results from the lack o
nvd
CVE-2020-8854HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8854 [HIGH] CWE-787 CVE-2020-8854: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of JPEG files to PDF. The issue results from the
nvd
CVE-2020-8846HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8846 [HIGH] CWE-416 CVE-2020-8846: This vulnerability allows remote atackers to execute arbitrary code on affected installations of Fox
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of text field objects. The issue results from the l
nvd
CVE-2020-8844HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8844 [HIGH] CWE-190 CVE-2020-8844: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG files within CovertToPDF. The issue results fro
nvd
CVE-2020-8857HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8857 [HIGH] CWE-416 CVE-2020-8857: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of form Annotation objects within AcroForms. The issue
nvd
CVE-2020-8847HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8847 [HIGH] CWE-787 CVE-2020-8847: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the lack o
nvd
CVE-2020-8855HIGHCVSS 7.8≤ 9.7.0.294552020-02-14
CVE-2020-8855 [HIGH] CWE-416 CVE-2020-8855: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.2947. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the fxhtml2pdf.exe module. The issue results from the lack of va
nvd
CVE-2020-8852LOWCVSS 3.3≤ 9.7.0.294552020-02-14
CVE-2020-8852 [LOW] CWE-125 CVE-2020-8852: This vulnerability allows remote attackers to disclose sensitive information on affected installatio
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the
nvd
CVE-2019-13333HIGHCVSS 7.8v9.5.0.207232020-02-08
CVE-2019-13333 [HIGH] CWE-787 CVE-2019-13333: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from th
nvd
CVE-2019-13334HIGHCVSS 7.8v9.5.0.207232020-02-08
CVE-2019-13334 [HIGH] CWE-822 CVE-2019-13334: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from th
nvd
CVE-2019-17136HIGHCVSS 7.8v9.5.0.207232020-02-08
CVE-2019-17136 [HIGH] CWE-125 CVE-2019-17136: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from th
nvd
CVE-2019-17135HIGHCVSS 7.8v9.5.0.207232020-02-08
CVE-2019-17135 [HIGH] CWE-119 CVE-2019-17135: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. The issue results from the lack of
nvd
CVE-2019-5130HIGHCVSS 8.8≤ 9.7.0.294352020-01-16
CVE-2019-5130 [HIGH] CWE-416 CVE-2019-5130: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerab
nvd
CVE-2019-5126HIGHCVSS 8.8≤ 9.7.0.294352020-01-16
CVE-2019-5126 [HIGH] CWE-416 CVE-2019-5126: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, ver
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the br
nvd