Foxitsoftware Phantompdf vulnerabilities
549 known vulnerabilities affecting foxitsoftware/phantompdf.
Total CVEs
549
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL26HIGH438MEDIUM68LOW17
Vulnerabilities
Page 9 of 28
CVE-2019-5131HIGHCVSS 8.8≤ 9.7.0.294352020-01-16
CVE-2019-5131 [HIGH] CWE-416 CVE-2019-5131: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnera
nvd
CVE-2019-5145HIGHCVSS 8.8≤ 9.7.0.294352020-01-16
CVE-2019-5145 [HIGH] CWE-416 CVE-2019-5145: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, ver
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit PDF Reader, version 9.7.0.29435. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the br
nvd
CVE-2019-17144HIGHCVSS 8.8v9.6.0.251142019-10-25
CVE-2019-17144 [HIGH] CWE-787 CVE-2019-17144: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DWG files to PDF. The issue results from th
nvd
CVE-2019-17139HIGHCVSS 8.8≤ 9.6.0.251142019-10-25
CVE-2019-17139 [HIGH] CWE-787 CVE-2019-17139: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Javascript in the HTML2PDF plugin. The issu
nvd
CVE-2019-17140HIGHCVSS 8.8v9.6.0.251142019-10-25
CVE-2019-17140 [HIGH] CWE-416 CVE-2019-17140: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the OnFocus event. The issue results from the
nvd
CVE-2019-17145HIGHCVSS 8.8v9.6.0.251142019-10-25
CVE-2019-17145 [HIGH] CWE-121 CVE-2019-17145: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from th
nvd
CVE-2019-17141HIGHCVSS 8.8v9.6.0.251142019-10-25
CVE-2019-17141 [HIGH] CWE-416 CVE-2019-17141: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Calculate action of a text
nvd
CVE-2019-17142HIGHCVSS 8.8v9.6.0.251142019-10-25
CVE-2019-17142 [HIGH] CWE-416 CVE-2019-17142: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Keystroke action of a listb
nvd
CVE-2019-17143MEDIUMCVSS 4.3v9.6.0.251142019-10-25
CVE-2019-17143 [MEDIUM] CWE-416 CVE-2019-17143: This vulnerability allows remote attackers to disclose sensitive information on affected installatio
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from th
nvd
CVE-2019-13315HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-13315 [HIGH] CWE-416 CVE-2019-13315: This vulnerability allows remote atackers to execute arbitrary code on affected installations of Fox
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. The issue results from the lack of validat
nvd
CVE-2019-13319HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-13319 [HIGH] CWE-416 CVE-2019-13319: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA forms. The issue results from the lack of v
nvd
CVE-2019-6775HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-6775 [HIGH] CWE-416 CVE-2019-6775: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportValues method within a AcroForm. The issue results from t
nvd
CVE-2019-6774HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-6774 [HIGH] CWE-416 CVE-2019-6774: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deleteItemAt method when processing AcroForms. The issue result
nvd
CVE-2019-13316HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-13316 [HIGH] CWE-416 CVE-2019-13316: This vulnerability allows remote atackers to execute arbitrary code on affected installations of Fox
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Calculate actions. The issue results from the
nvd
CVE-2019-6776HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-6776 [HIGH] CWE-416 CVE-2019-6776: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing watermarks within AcroFo
nvd
CVE-2019-13320HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-13320 [HIGH] CWE-416 CVE-2019-13320: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of AcroForms. The issue results from the lack of v
nvd
CVE-2019-13317HIGHCVSS 7.8≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-13317 [HIGH] CWE-416 CVE-2019-13317: This vulnerability allows remote atackers to execute arbitrary code on affected installations of Fox
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Calculate actions. The issue results from the
nvd
CVE-2019-13318MEDIUMCVSS 5.5≤ 8.3.10.42705≥ 9.0, ≤ 9.5.0.207232019-10-04
CVE-2019-13318 [MEDIUM] CWE-134 CVE-2019-13318: This vulnerability allows remote attackers to disclose sensitive information on affected installatio
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of the util.printf Javascript method. Th
nvd
CVE-2019-5031HIGHCVSS 8.8≤ 9.4.1.168282019-10-02
CVE-2019-5031 [HIGH] CWE-703 CVE-2019-5031: An exploitable memory corruption vulnerability exists in the JavaScript engine of Foxit Software's F
An exploitable memory corruption vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.4.1.16828. A specially crafted PDF document can trigger an out-of-memory condition which isn't handled properly, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger th
nvd
CVE-2019-14209CRITICALCVSS 9.8fixed in 8.3.102019-07-21
CVE-2019-14209 [CRITICAL] CWE-787 CVE-2019-14209: An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Heap
An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Heap Corruption due to data desynchrony when adding AcroForm.
nvd