Foxit Reader vulnerabilities

247 known vulnerabilities affecting foxit/foxit_reader.

Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49

Vulnerabilities

Page 2 of 13
CVE-2022-37332HIGHCVSS 7.8v12.0.1.124302022-11-21
CVE-2022-37332 [HIGH] CWE-416 CVE-2022-37332: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, versi A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing media player API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger
cvelistv5nvd
CVE-2022-32774HIGHCVSS 7.8v12.0.1.124302022-11-21
CVE-2022-32774 [HIGH] CWE-416 CVE-2022-32774: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, versi A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely deleting objects associated with pages, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the m
cvelistv5nvd
CVE-2022-40129HIGHCVSS 7.8v12.0.1.124302022-11-21
CVE-2022-40129 [HIGH] CWE-416 CVE-2022-40129: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, versi A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. A specially-crafted PDF document can trigger the reuse of previously freed memory via misusing Optional Content Group API, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file t
cvelistv5nvd
CVE-2022-38097HIGHCVSS 7.8v12.0.1.124302022-11-21
CVE-2022-38097 [HIGH] CWE-416 CVE-2022-38097: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, versi A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious
cvelistv5nvd
CVE-2018-17624HIGHCVSS 8.8v9.1.0.50962018-10-29
CVE-2018-17624 [HIGH] CWE-416 CVE-2018-17624: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of OCG objects. The issue results from the lack of v
cvelistv5nvd
CVE-2018-17615HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17615 [HIGH] CWE-416 CVE-2018-17615: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Mouse Exit events. The issue results from the lac
cvelistv5nvd
CVE-2018-17623HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17623 [HIGH] CWE-416 CVE-2018-17623: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Link objects. The issue results from the lack of
cvelistv5nvd
CVE-2018-17621HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17621 [HIGH] CWE-416 CVE-2018-17621: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format events. The issue results from the lack of
cvelistv5nvd
CVE-2018-17619HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17619 [HIGH] CWE-416 CVE-2018-17619: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Validate events. The issue results from the lack
cvelistv5nvd
CVE-2018-17618HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17618 [HIGH] CWE-416 CVE-2018-17618: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Selection Change events. The issue results from t
cvelistv5nvd
CVE-2018-17616HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17616 [HIGH] CWE-416 CVE-2018-17616: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of onBlur events. The issue results from the lack of
cvelistv5nvd
CVE-2018-17617HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17617 [HIGH] CWE-416 CVE-2018-17617: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of onFocus events. The issue results from the lack o
cvelistv5nvd
CVE-2018-17620HIGHCVSS 8.8v9.0.1.50962018-10-29
CVE-2018-17620 [HIGH] CWE-416 CVE-2018-17620: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Calculate events. The issue results from the lack
cvelistv5nvd
CVE-2018-17622MEDIUMCVSS 6.5v9.1.0.50962018-10-29
CVE-2018-17622 [MEDIUM] CWE-125 CVE-2018-17622: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Calculate events. The issue results fr
cvelistv5nvd
CVE-2018-14317HIGHCVSS 8.8v9.1.0.50962018-08-30
CVE-2018-14317 [HIGH] CWE-843 CVE-2018-14317: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of p
cvelistv5nvd
CVE-2018-11619HIGHCVSS 8.8v9.0.0.299352018-07-31
CVE-2018-11619 [HIGH] CWE-416 CVE-2018-11619: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setFocus method. The issue results from the
cvelistv5nvd
CVE-2018-14247HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14247 [HIGH] CWE-843 CVE-2018-14247: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsFDF method. By performing actions in JavaScript, an a
cvelistv5nvd
CVE-2018-14314HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14314 [HIGH] CWE-416 CVE-2018-14314: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of annotations. The issue results from the lack of v
cvelistv5nvd
CVE-2018-14265HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14265 [HIGH] CWE-843 CVE-2018-14265: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the importAnXFDX method. By performing actions in JavaScript, an
cvelistv5nvd
CVE-2018-14281HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14281 [HIGH] CWE-693 CVE-2018-14281: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportData XFA function. The issue results from the lack of p
cvelistv5nvd