
blog.exodusintel.com/2021/08/23/foxit-phantompdf-loadhtmlview-context-level-bypass-vulnerability
Preview meta tags from the blog.exodusintel.com website.
Linked Hostnames
5- 9 links toblog.exodusintel.com
- 8 links towww.exodusintel.com
- 4 links toexodusintel.com
- 1 link torsp.exodusintel.com
- 1 link towww.foxit.com
Search Engine Appearance
Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability - Exodus Intelligence
EIP-617871b4 The vulnerability exists within the JavaScript PDF API exposed by Foxit PhantomPDF. The loadHtmlView method of the app object invokes attacker-controlled JavaScript code in a privileged context. An attacker can create a specially crafted PDF file that will abuse this vulnerability to bypass the context based security mechanism of the JS PDF API. Vulnerability ... Read more Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability
Bing
Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability - Exodus Intelligence
EIP-617871b4 The vulnerability exists within the JavaScript PDF API exposed by Foxit PhantomPDF. The loadHtmlView method of the app object invokes attacker-controlled JavaScript code in a privileged context. An attacker can create a specially crafted PDF file that will abuse this vulnerability to bypass the context based security mechanism of the JS PDF API. Vulnerability ... Read more Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability
DuckDuckGo

Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability - Exodus Intelligence
EIP-617871b4 The vulnerability exists within the JavaScript PDF API exposed by Foxit PhantomPDF. The loadHtmlView method of the app object invokes attacker-controlled JavaScript code in a privileged context. An attacker can create a specially crafted PDF file that will abuse this vulnerability to bypass the context based security mechanism of the JS PDF API. Vulnerability ... Read more Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability
General Meta Tags
8- titleFoxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability - Exodus Intelligence
- charsetUTF-8
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- article:published_time2021-08-23T21:03:21+00:00
- article:modified_time2021-12-02T23:19:23+00:00
Open Graph Meta Tags
6og:locale
en_US- og:typearticle
- og:titleFoxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability - Exodus Intelligence
- og:descriptionEIP-617871b4 The vulnerability exists within the JavaScript PDF API exposed by Foxit PhantomPDF. The loadHtmlView method of the app object invokes attacker-controlled JavaScript code in a privileged context. An attacker can create a specially crafted PDF file that will abuse this vulnerability to bypass the context based security mechanism of the JS PDF API. Vulnerability ... Read more Foxit PhantomPDF loadHtmlView Context Level Bypass Vulnerability
- og:urlhttps://blog.exodusintel.com/2021/08/23/foxit-phantompdf-loadhtmlview-context-level-bypass-vulnerability/
Twitter Meta Tags
6- twitter:cardsummary_large_image
- twitter:creator@xi_research
- twitter:label1Written by
- twitter:data1Exodus Intel VRT
- twitter:label2Est. reading time
Link Tags
35- EditURIhttps://blog.exodusintel.com/xmlrpc.php?rsd
- alternatehttps://blog.exodusintel.com/feed/
- alternatehttps://blog.exodusintel.com/comments/feed/
- alternatehttps://blog.exodusintel.com/wp-json/wp/v2/posts/1811
- alternatehttps://blog.exodusintel.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fblog.exodusintel.com%2F2021%2F08%2F23%2Ffoxit-phantompdf-loadhtmlview-context-level-bypass-vulnerability%2F
Emails
1Links
23- https://blog.exodusintel.com
- https://blog.exodusintel.com/2021/08/23
- https://blog.exodusintel.com/advisories
- https://blog.exodusintel.com/category/advisories
- https://blog.exodusintel.com/category/exploit-techniques