Foxit Reader vulnerabilities
247 known vulnerabilities affecting foxit/foxit_reader.
Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49
Vulnerabilities
Page 11 of 13
CVE-2017-14823HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14823 [HIGH] CWE-843 CVE-2017-14823: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the signer method of XFA's Signature objects. The issue results
cvelistv5nvd
CVE-2017-14826HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14826 [HIGH] CWE-843 CVE-2017-14826: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the formNodes method of XFA Node objects. The issue results from
cvelistv5nvd
CVE-2017-16583HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16583 [HIGH] CWE-416 CVE-2017-16583: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the datasets element of XFA forms. The issue results from the la
cvelistv5nvd
CVE-2017-14832HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14832 [HIGH] CWE-416 CVE-2017-14832: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the style attribute of Caret Annotation objects. The issue resul
cvelistv5nvd
CVE-2017-16572HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-16572 [HIGH] CWE-843 CVE-2017-16572: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within FormCalc's closeDoc method. The issue results from the lack of p
cvelistv5nvd
CVE-2017-16577HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-16577 [HIGH] CWE-416 CVE-2017-16577: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the alignment attribute of Field objects. The issue results from
cvelistv5nvd
CVE-2017-14831HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14831 [HIGH] CWE-416 CVE-2017-14831: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the author attribute of Circle Annotation objects. The issue res
cvelistv5nvd
CVE-2017-16582HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16582 [HIGH] CWE-843 CVE-2017-16582: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the clearItems XFA method. The issue results from the lack of pr
cvelistv5nvd
CVE-2017-14834HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14834 [HIGH] CWE-416 CVE-2017-14834: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the style attribute of FileAttachment annotation objects. The is
cvelistv5nvd
CVE-2017-14837HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14837 [HIGH] CWE-843 CVE-2017-14837: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the pageSpan method of XFA Layout objects. The issue results fro
cvelistv5nvd
CVE-2017-10959HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-10959 [HIGH] CWE-416 CVE-2017-10959: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the setAction method of Link objects. The issue results from the
cvelistv5nvd
CVE-2017-16581HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16581 [HIGH] CWE-416 CVE-2017-16581: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the author attribute of the Document object. The issue results f
cvelistv5nvd
CVE-2017-10957HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-10957 [HIGH] CWE-416 CVE-2017-10957: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the arrowEnd attribute of Annotation objects. The issue results
cvelistv5nvd
CVE-2017-14825HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14825 [HIGH] CWE-843 CVE-2017-14825: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the remove method of XFAScriptObject objects. The issue results
cvelistv5nvd
CVE-2017-14835HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14835 [HIGH] CWE-843 CVE-2017-14835: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the page method of XFA Layout objects. The issue results from th
cvelistv5nvd
CVE-2017-16575HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-16575 [HIGH] CWE-416 CVE-2017-16575: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA's bind element. The issue results from the lack of valid
cvelistv5nvd
CVE-2017-14827HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14827 [HIGH] CWE-843 CVE-2017-14827: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the append method of XFA Node objects. The issue results from th
cvelistv5nvd
CVE-2017-14828HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14828 [HIGH] CWE-843 CVE-2017-14828: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the w method of XFA Layout objects. The issue results from the l
cvelistv5nvd
CVE-2017-14830HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14830 [HIGH] CWE-843 CVE-2017-14830: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the setFocus method of XFAScriptObject objects. The issue result
cvelistv5nvd
CVE-2017-16587HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16587 [HIGH] CWE-416 CVE-2017-16587: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. The issue results from the lack of valid
cvelistv5nvd