Foxit Reader vulnerabilities

247 known vulnerabilities affecting foxit/foxit_reader.

Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49

Vulnerabilities

Page 5 of 13
CVE-2018-14279HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14279 [HIGH] CWE-843 CVE-2018-14279: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the resetForm method. By performing actions in JavaScript, an att
cvelistv5nvd
CVE-2018-14286HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14286 [HIGH] CWE-843 CVE-2018-14286: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arguments passed to the mailDoc function. The iss
cvelistv5nvd
CVE-2018-14312HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14312 [HIGH] CWE-416 CVE-2018-14312: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the exportAsFDF function. The issue results from
cvelistv5nvd
CVE-2018-14246HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14246 [HIGH] CWE-843 CVE-2018-14246: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the convertTocPDF method. By performing actions in JavaScript, an
cvelistv5nvd
CVE-2018-14267HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14267 [HIGH] CWE-843 CVE-2018-14267: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the importTextData method. By performing actions in JavaScript, a
cvelistv5nvd
CVE-2018-14258HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14258 [HIGH] CWE-843 CVE-2018-14258: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNthWord method. By performing actions in JavaScript, a
cvelistv5nvd
CVE-2018-11618HIGHCVSS 8.8v9.0.0.299352018-07-31
CVE-2018-11618 [HIGH] CWE-416 CVE-2018-11618: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resetForm method. The issue results from the
cvelistv5nvd
CVE-2018-14248HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14248 [HIGH] CWE-843 CVE-2018-14248: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsXFDF method. By performing actions in JavaScript, an
cvelistv5nvd
CVE-2018-11623HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-11623 [HIGH] CWE-843 CVE-2018-11623: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addAdLayer method. By performing actions in JavaScript, an at
cvelistv5nvd
CVE-2018-14278HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14278 [HIGH] CWE-843 CVE-2018-14278: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNumWords method. By performing actions in JavaScript,
cvelistv5nvd
CVE-2018-14291HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14291 [HIGH] CWE-416 CVE-2018-14291: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elemen
cvelistv5nvd
CVE-2018-14272HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14272 [HIGH] CWE-843 CVE-2018-14272: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeIcon method. By performing actions in JavaScript, an at
cvelistv5nvd
CVE-2018-14302HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14302 [HIGH] CWE-416 CVE-2018-14302: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Square annotations. By manipulating a document'
cvelistv5nvd
CVE-2018-14292HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14292 [HIGH] CWE-416 CVE-2018-14292: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elemen
cvelistv5nvd
CVE-2018-14299HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14299 [HIGH] CWE-416 CVE-2018-14299: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Line annotations. By manipulating a document's
cvelistv5nvd
CVE-2018-14310HIGHCVSS 8.8v9.1.0.50962018-07-31
CVE-2018-14310 [HIGH] CWE-416 CVE-2018-14310: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of events. The issue results from the lack of valida
cvelistv5nvd
CVE-2018-14273HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14273 [HIGH] CWE-843 CVE-2018-14273: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeTemplate method. By performing actions in JavaScript, a
cvelistv5nvd
CVE-2018-14271HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14271 [HIGH] CWE-843 CVE-2018-14271: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. By performing actions in JavaScript, an a
cvelistv5nvd
CVE-2018-14263HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14263 [HIGH] CWE-843 CVE-2018-14263: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getVersionID method. By performing actions in JavaScript, an
cvelistv5nvd
CVE-2018-14294HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14294 [HIGH] CWE-416 CVE-2018-14294: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of FileAttachment annotations. By manipulating a d
cvelistv5nvd