Foxit Reader vulnerabilities
247 known vulnerabilities affecting foxit/foxit_reader.
Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49
Vulnerabilities
Page 3 of 13
CVE-2018-14250HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14250 [HIGH] CWE-843 CVE-2018-14250: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getAnnot method. By performing actions in JavaScript, an atta
cvelistv5nvd
CVE-2018-14260HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14260 [HIGH] CWE-843 CVE-2018-14260: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageRotation method. By performing actions in JavaScript,
cvelistv5nvd
CVE-2018-14284HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14284 [HIGH] CWE-416 CVE-2018-14284: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the newDoc function. The issue results from the l
cvelistv5nvd
CVE-2018-14313HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14313 [HIGH] CWE-843 CVE-2018-14313: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF files. The issue results from the lack of pro
cvelistv5nvd
CVE-2018-14257HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14257 [HIGH] CWE-843 CVE-2018-14257: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageBox method. By performing actions in JavaScript, an at
cvelistv5nvd
CVE-2018-14315HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14315 [HIGH] CWE-416 CVE-2018-14315: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of annotations. The issue results from the lack of v
cvelistv5nvd
CVE-2018-14243HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14243 [HIGH] CWE-843 CVE-2018-14243: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addPageOpenJSMessage method. By performing actions in JavaScr
cvelistv5nvd
CVE-2018-14298HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14298 [HIGH] CWE-416 CVE-2018-14298: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Ink annotations. By manipulating a document's e
cvelistv5nvd
CVE-2018-14241HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14241 [HIGH] CWE-843 CVE-2018-14241: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addAnnot method. By performing actions in JavaScript, an atta
cvelistv5nvd
CVE-2018-14251HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14251 [HIGH] CWE-843 CVE-2018-14251: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getDataObject method. By performing actions in JavaScript, an
cvelistv5nvd
CVE-2018-14277HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14277 [HIGH] CWE-843 CVE-2018-14277: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mailDoc method. By performing actions in JavaScript, an attac
cvelistv5nvd
CVE-2018-14253HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14253 [HIGH] CWE-843 CVE-2018-14253: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getIcon method. By performing actions in JavaScript, an attac
cvelistv5nvd
CVE-2018-14280HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14280 [HIGH] CWE-693 CVE-2018-14280: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsFDF XFA function. The issue results from the lack of
cvelistv5nvd
CVE-2018-14274HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14274 [HIGH] CWE-843 CVE-2018-14274: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the scroll method. By performing actions in JavaScript, an attack
cvelistv5nvd
CVE-2018-14245HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14245 [HIGH] CWE-843 CVE-2018-14245: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the closeDoc method. By performing actions in JavaScript, an atta
cvelistv5nvd
CVE-2018-14259HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14259 [HIGH] CWE-843 CVE-2018-14259: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNthWordQuads method. By performing actions in JavaScri
cvelistv5nvd
CVE-2018-14270HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14270 [HIGH] CWE-843 CVE-2018-14270: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeDataObject method. By performing actions in JavaScript,
cvelistv5nvd
CVE-2018-14256HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14256 [HIGH] CWE-843 CVE-2018-14256: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getOCGs method. By performing actions in JavaScript, an attac
cvelistv5nvd
CVE-2018-14290HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14290 [HIGH] CWE-122 CVE-2018-14290: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. The issue results from the lack of
cvelistv5nvd
CVE-2018-14293HIGHCVSS 8.8v9.1.0.50962018-07-31
CVE-2018-14293 [HIGH] CWE-416 CVE-2018-14293: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elemen
cvelistv5nvd