Foxit Reader vulnerabilities

247 known vulnerabilities affecting foxit/foxit_reader.

Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49

Vulnerabilities

Page 7 of 13
CVE-2018-9940HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-9940 [HIGH] CWE-704 CVE-2018-9940: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the layout sheet attribute. The issue results from
cvelistv5nvd
CVE-2018-9943HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-9943 [HIGH] CWE-704 CVE-2018-9943: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the openList method. The issue results from the la
cvelistv5nvd
CVE-2018-9944HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-9944 [HIGH] CWE-416 CVE-2018-9944: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addLink method. The issue results from the lack of validating
cvelistv5nvd
CVE-2018-9955HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9955 [HIGH] CWE-416 CVE-2018-9955: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA resolveNode method of Button elements. The issue results fr
cvelistv5nvd
CVE-2018-10477HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-10477 [HIGH] CWE-787 CVE-2018-10477: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D Chain Index objects. The issue results from t
cvelistv5nvd
CVE-2018-9962HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9962 [HIGH] CWE-416 CVE-2018-9962: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of Annotation's author attribute. The issue results fro
cvelistv5nvd
CVE-2018-9952HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9952 [HIGH] CWE-416 CVE-2018-9952: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Button elements. When setting the formattedValu
cvelistv5nvd
CVE-2018-9953HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9953 [HIGH] CWE-416 CVE-2018-9953: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA resolveNodes method of Button elements. The issue results f
cvelistv5nvd
CVE-2018-9964HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9964 [HIGH] CWE-416 CVE-2018-9964: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of the name attribute of OCG objects. The issue results
cvelistv5nvd
CVE-2018-9936HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-9936 [HIGH] CWE-704 CVE-2018-9936: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of field elements. The issue results from the lack of
cvelistv5nvd
CVE-2018-10495HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-10495 [HIGH] CWE-843 CVE-2018-10495: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. The issue results from the lack of
cvelistv5nvd
CVE-2018-9945HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-9945 [HIGH] CWE-416 CVE-2018-9945: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getField method. The issue results from the lack of validating
cvelistv5nvd
CVE-2018-10494HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-10494 [HIGH] CWE-121 CVE-2018-10494: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D 3DView objects. The issue results from the lac
cvelistv5nvd
CVE-2018-9935HIGHCVSS 8.8v8.3.2.250132018-05-17
CVE-2018-9935 [HIGH] CWE-416 CVE-2018-9935: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addField method. The issue results from the lack of validating
cvelistv5nvd
CVE-2018-9970HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9970 [HIGH] CWE-416 CVE-2018-9970: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA execEvent method of Button elements. The issue results from
cvelistv5nvd
CVE-2018-9969HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9969 [HIGH] CWE-416 CVE-2018-9969: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA boundItem method of Button elements. The issue results from
cvelistv5nvd
CVE-2018-1180HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-1180 [HIGH] CWE-416 CVE-2018-1180: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the AFSimple_Calculate method. The issue results from the lack of
cvelistv5nvd
CVE-2018-9977HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-9977 [HIGH] CWE-416 CVE-2018-9977: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of Modifier Chain objects in U3D files. The issue resu
cvelistv5nvd
CVE-2018-10489HIGHCVSS 8.8v9.0.0.299352018-05-17
CVE-2018-10489 [HIGH] CWE-787 CVE-2018-10489: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D Clod Progressive Mesh Declaration structures.
cvelistv5nvd
CVE-2018-9968HIGHCVSS 8.8v9.0.1.10492018-05-17
CVE-2018-9968 [HIGH] CWE-416 CVE-2018-9968: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Keystroke actions of TextBox objects. The issue res
cvelistv5nvd