Foxit Reader vulnerabilities

247 known vulnerabilities affecting foxit/foxit_reader.

Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49

Vulnerabilities

Page 4 of 13
CVE-2018-14296HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14296 [HIGH] CWE-416 CVE-2018-14296: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Circle annotations. By manipulating a document'
cvelistv5nvd
CVE-2018-14305HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14305 [HIGH] CWE-416 CVE-2018-14305: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PolyLine annotations. By manipulating a documen
cvelistv5nvd
CVE-2018-14301HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14301 [HIGH] CWE-416 CVE-2018-14301: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Sound annotations. By manipulating a document's
cvelistv5nvd
CVE-2018-14308HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14308 [HIGH] CWE-416 CVE-2018-14308: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the valueAsString function. The issue results fro
cvelistv5nvd
CVE-2018-14288HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14288 [HIGH] CWE-416 CVE-2018-14288: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arguments passed to the setFocus function. The is
cvelistv5nvd
CVE-2018-14264HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14264 [HIGH] CWE-843 CVE-2018-14264: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the importAnFDF method. By performing actions in JavaScript, an a
cvelistv5nvd
CVE-2018-14306HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14306 [HIGH] CWE-416 CVE-2018-14306: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of button objects. By manipulating a document's el
cvelistv5nvd
CVE-2018-14255HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14255 [HIGH] CWE-843 CVE-2018-14255: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getNthFieldName method. By performing actions in JavaScript,
cvelistv5nvd
CVE-2018-14303HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14303 [HIGH] CWE-416 CVE-2018-14303: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of StrikeOut annotations. By manipulating a docume
cvelistv5nvd
CVE-2018-14252HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14252 [HIGH] CWE-843 CVE-2018-14252: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getField method. By performing actions in JavaScript, an atta
cvelistv5nvd
CVE-2018-14261HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14261 [HIGH] CWE-843 CVE-2018-14261: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getTemplate method. By performing actions in JavaScript, an a
cvelistv5nvd
CVE-2018-14285HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14285 [HIGH] CWE-843 CVE-2018-14285: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the oneOfChild attribute. The issue results from
cvelistv5nvd
CVE-2018-14276HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14276 [HIGH] CWE-843 CVE-2018-14276: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the submitForm method. By performing actions in JavaScript, an at
cvelistv5nvd
CVE-2018-14249HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14249 [HIGH] CWE-843 CVE-2018-14249: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportDataObject method. By performing actions in JavaScript,
cvelistv5nvd
CVE-2018-14254HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14254 [HIGH] CWE-843 CVE-2018-14254: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getLinks method. By performing actions in JavaScript, an atta
cvelistv5nvd
CVE-2018-14282HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14282 [HIGH] CWE-665 CVE-2018-14282: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of FlateDecode streams. The issue results from the l
cvelistv5nvd
CVE-2018-14297HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14297 [HIGH] CWE-416 CVE-2018-14297: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of FreeText annotations. By manipulating a documen
cvelistv5nvd
CVE-2018-14287HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14287 [HIGH] CWE-843 CVE-2018-14287: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arguments passed to the instanceManager.nodes.app
cvelistv5nvd
CVE-2018-14307HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14307 [HIGH] CWE-416 CVE-2018-14307: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Link objects. By manipulating a document's elem
cvelistv5nvd
CVE-2018-14266HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14266 [HIGH] CWE-843 CVE-2018-14266: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the importDataObject method. By performing actions in JavaScript,
cvelistv5nvd