CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
259 results Clear all
CVE-2021-31473 7.8 HIGH EPSS 0.06
Foxitsoftware Phantompdf < 9.7.5.29616 - Out-of-Bounds Write
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the browseForDoc function. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13523.
CWE-787 May 21, 2021
CVE-2021-31461 7.8 HIGH EPSS 0.00
Foxitsoftware Phantompdf < 9.7.5.29616 - Type Confusion
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the the handling of app.media objects. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process Was ZDI-CAN-13333.
CWE-843 May 07, 2021
CVE-2021-31460 7.8 HIGH EPSS 0.01
Foxitsoftware Phantompdf < 9.7.5.29616 - Use After Free
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA templates. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13096.
CWE-416 May 07, 2021
CVE-2021-31459 7.8 HIGH EPSS 0.01
Foxitsoftware Phantompdf < 9.7.5.29616 - Use After Free
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13162.
CWE-416 May 07, 2021
CVE-2021-31458 7.8 HIGH EPSS 0.01
Foxitsoftware Phantompdf < 9.7.5.29616 - Use After Free
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13150.
CWE-416 May 07, 2021
CVE-2021-31457 7.8 HIGH EPSS 0.01
Foxitsoftware Phantompdf < 9.7.5.29616 - Use After Free
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13147.
CWE-416 May 07, 2021
CVE-2021-31456 7.8 HIGH EPSS 0.01
Foxitsoftware Phantompdf < 9.7.5.29616 - Use After Free
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13102.
CWE-416 May 07, 2021
CVE-2018-20316 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10 & 9.x <9.5 - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyDoAction race condition that can cause a stack-based buffer overflow or an out-of-bounds read, a different issue than CVE-2018-20310 because of a different opcode.
CWE-125 Jan 07, 2021
CVE-2018-20315 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10 & 9.x <9.5 - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a race condition that can cause a stack-based buffer overflow or an out-of-bounds read.
CWE-362 Jan 07, 2021
CVE-2018-20314 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10 & 9.x <9.5 - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyCheckLicence race condition that can cause a stack-based buffer overflow or an out-of-bounds read.
CWE-125 Jan 07, 2021
CVE-2018-20313 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10/9.x - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyPreviewAction race condition that can cause a stack-based buffer overflow or an out-of-bounds read.
CWE-125 Jan 07, 2021
CVE-2018-20312 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10 & 9.x <9.5 - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyDoAction race condition that can cause a stack-based buffer overflow or an out-of-bounds read, a different issue than CVE-2018-20310 because of a different opcode.
CWE-125 Jan 07, 2021
CVE-2018-20311 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10 & 9.x <9.5 - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyCPDFAction race condition that can cause a stack-based buffer overflow or an out-of-bounds read.
CWE-125 Jan 07, 2021
CVE-2018-20310 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10 & 9.x <9.5 - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyDoAction race condition that can cause a stack-based buffer overflow or an out-of-bounds read.
CWE-125 Jan 07, 2021
CVE-2018-20309 8.1 HIGH EPSS 0.00
Foxit Reader <9.5 & PhantomPDF <8.3.10 & 9.x <9.5 - Buffer Overflow
Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyGetAppEdition race condition that can cause a stack-based buffer overflow or an out-of-bounds read.
CWE-125 Jan 07, 2021
CVE-2020-12248 8.8 HIGH EPSS 0.01
Foxitsoftware Phantompdf < 9.7.2.29539 - Out-of-Bounds Write
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.
CWE-787 Sep 04, 2020
CVE-2020-12247 7.1 HIGH EPSS 0.00
Foxitsoftware Phantompdf < 9.7.2.29539 - Out-of-Bounds Read
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information from an out-of-bounds read because a text-string index continues to be used after splitting a string into two parts. A crash may also occur.
CWE-125 Sep 04, 2020
CVE-2020-11493 8.1 HIGH 1 PoC Analysis EPSS 0.00
Foxitsoftware Phantompdf < 9.7.2.29539 - Data Authenticity Bypass
In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.
CWE-345 Sep 04, 2020
CVE-2020-15638 7.8 HIGH EPSS 0.01
Foxitsoftware Phantompdf < 10.0.0.35798 - Type Confusion
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.2.29539. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the NodeProperties::InferReceiverMapsUnsafe method. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10950.
CWE-843 Aug 20, 2020
CVE-2020-15637 3.3 LOW EPSS 0.02
Foxitsoftware Phantompdf < 10.0.0.35798 - Use After Free
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the SetLocalDescription method. By performing actions in JavaScript, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-10972.
CWE-416 Aug 20, 2020