Foxit Reader vulnerabilities
247 known vulnerabilities affecting foxit/foxit_reader.
Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49
Vulnerabilities
Page 6 of 13
CVE-2018-14269HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14269 [HIGH] CWE-843 CVE-2018-14269: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the print method. By performing actions in JavaScript, an attacke
cvelistv5nvd
CVE-2018-14309HIGHCVSS 8.8v9.1.0.50962018-07-31
CVE-2018-14309 [HIGH] CWE-416 CVE-2018-14309: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the SeedValue Generic Object parameter provided t
cvelistv5nvd
CVE-2018-14268HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14268 [HIGH] CWE-843 CVE-2018-14268: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mailForm method. By performing actions in JavaScript, an atta
cvelistv5nvd
CVE-2018-14262HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14262 [HIGH] CWE-843 CVE-2018-14262: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getURL method. By performing actions in JavaScript, an attack
cvelistv5nvd
CVE-2018-14304HIGHCVSS 8.8v9.0.1.50962018-07-31
CVE-2018-14304 [HIGH] CWE-416 CVE-2018-14304: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Text annotations. By manipulating a document's
cvelistv5nvd
CVE-2018-14242HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14242 [HIGH] CWE-843 CVE-2018-14242: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addField method. By performing actions in JavaScript, an atta
cvelistv5nvd
CVE-2018-11622HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-11622 [HIGH] CWE-787 CVE-2018-11622: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper v
cvelistv5nvd
CVE-2018-14275HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14275 [HIGH] CWE-843 CVE-2018-14275: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the spawnPageFromTemplate method. By performing actions in JavaSc
cvelistv5nvd
CVE-2018-14244HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14244 [HIGH] CWE-843 CVE-2018-14244: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the calculateNow method. By performing actions in JavaScript, an
cvelistv5nvd
CVE-2018-14283HIGHCVSS 8.8v9.0.1.10492018-07-31
CVE-2018-14283 [HIGH] CWE-416 CVE-2018-14283: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the highlightMode attribute. The issue results from the lack of v
cvelistv5nvd
CVE-2018-11617HIGHCVSS 8.8v9.0.0.299352018-07-31
CVE-2018-11617 [HIGH] CWE-416 CVE-2018-11617: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format events for ComboBox fields. The issue res
cvelistv5nvd
CVE-2018-14289MEDIUMCVSS 6.5v9.0.1.50962018-07-31
CVE-2018-14289 [MEDIUM] CWE-125 CVE-2018-14289: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. The issue results from t
cvelistv5nvd
CVE-2018-14316MEDIUMCVSS 6.5v9.0.1.50962018-07-31
CVE-2018-14316 [MEDIUM] CWE-125 CVE-2018-14316: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF documents. The issue results fro
cvelistv5nvd
CVE-2018-11620MEDIUMCVSS 6.5v9.0.1.10492018-07-31
CVE-2018-11620 [MEDIUM] CWE-125 CVE-2018-11620: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack
cvelistv5nvd
CVE-2018-11621MEDIUMCVSS 6.5v9.0.1.10492018-07-31
CVE-2018-11621 [MEDIUM] CWE-125 CVE-2018-11621: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack
cvelistv5nvd
CVE-2018-10473HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-10473 [HIGH] CWE-787 CVE-2018-10473: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D CLOD Base Mesh Continuation structures. The i
cvelistv5nvd
CVE-2018-9975HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9975 [HIGH] CWE-416 CVE-2018-9975: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of shift events. The issue results from the lack of va
cvelistv5nvd
CVE-2018-10490HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-10490 [HIGH] CWE-119 CVE-2018-10490: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG images embedded inside U3D files. The issue
cvelistv5nvd
CVE-2018-1177HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-1177 [HIGH] CWE-416 CVE-2018-1177: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the addAnnot method. The issue results from the la
cvelistv5nvd
CVE-2018-9965HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9965 [HIGH] CWE-416 CVE-2018-9965: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setAction method of Link objects. The issue res
cvelistv5nvd