Foxit Reader vulnerabilities
155 known vulnerabilities affecting foxit/reader.
Total CVEs
155
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH129MEDIUM14LOW12
Vulnerabilities
Page 3 of 8
CVE-2020-10900HIGHCVSS 7.8v9.7.1.295112020-04-22
CVE-2020-10900 [HIGH] CWE-416 CVE-2020-10900: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of AcroForms. The issue results from the lack of v
cvelistv5nvd
CVE-2020-10899HIGHCVSS 7.8v9.7.1.295112020-04-22
CVE-2020-10899 [HIGH] CWE-416 CVE-2020-10899: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA templates. The issue results from the lack
cvelistv5nvd
CVE-2020-10907HIGHCVSS 7.8v9.7.1.295112020-04-22
CVE-2020-10907 [HIGH] CWE-416 CVE-2020-10907: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of widgets in XFA forms. The issue results from the
cvelistv5nvd
CVE-2020-8849HIGHCVSS 7.8v9.7.0.294552020-02-14
CVE-2020-8849 [HIGH] CWE-787 CVE-2020-8849: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the lack o
cvelistv5nvd
CVE-2020-8857HIGHCVSS 7.8v9.7.0.294552020-02-14
CVE-2020-8857 [HIGH] CWE-416 CVE-2020-8857: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of form Annotation objects within AcroForms. The issue
cvelistv5nvd
CVE-2020-8850HIGHCVSS 7.8v9.7.0.294552020-02-14
CVE-2020-8850 [HIGH] CWE-787 CVE-2020-8850: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the lack o
cvelistv5nvd
CVE-2020-8848HIGHCVSS 7.8v9.7.0.294552020-02-14
CVE-2020-8848 [HIGH] CWE-787 CVE-2020-8848: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPG2000 images. The issue results from the lack o
cvelistv5nvd
CVE-2020-8844HIGHCVSS 7.8v9.6.0.251142020-02-14
CVE-2020-8844 [HIGH] CWE-190 CVE-2020-8844: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG files within CovertToPDF. The issue results fro
cvelistv5nvd
CVE-2020-8851HIGHCVSS 7.8v9.7.0.294552020-02-14
CVE-2020-8851 [HIGH] CWE-787 CVE-2020-8851: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPG2000 images. The issue results from the lack o
cvelistv5nvd
CVE-2020-8847HIGHCVSS 7.8v9.7.0.294552020-02-14
CVE-2020-8847 [HIGH] CWE-787 CVE-2020-8847: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the lack o
cvelistv5nvd
CVE-2020-8852LOWCVSS 3.3v9.7.0.294552020-02-14
CVE-2020-8852 [LOW] CWE-125 CVE-2020-8852: This vulnerability allows remote attackers to disclose sensitive information on affected installatio
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the
cvelistv5nvd
CVE-2019-13315HIGHCVSS 7.8v9.5.0.207232019-10-04
CVE-2019-13315 [HIGH] CWE-416 CVE-2019-13315: This vulnerability allows remote atackers to execute arbitrary code on affected installations of Fox
This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. The issue results from the lack of validat
cvelistv5nvd
CVE-2019-13319HIGHCVSS 7.8v9.5.0.207232019-10-04
CVE-2019-13319 [HIGH] CWE-416 CVE-2019-13319: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XFA forms. The issue results from the lack of v
cvelistv5nvd
CVE-2019-6775HIGHCVSS 7.8v9.5.0.207232019-10-04
CVE-2019-6775 [HIGH] CWE-416 CVE-2019-6775: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportValues method within a AcroForm. The issue results from t
cvelistv5nvd
CVE-2019-6774HIGHCVSS 7.8v9.4.1.168282019-10-04
CVE-2019-6774 [HIGH] CWE-416 CVE-2019-6774: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the deleteItemAt method when processing AcroForms. The issue result
cvelistv5nvd
CVE-2019-13320HIGHCVSS 7.8v9.5.0.207232019-10-04
CVE-2019-13320 [HIGH] CWE-416 CVE-2019-13320: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of AcroForms. The issue results from the lack of v
cvelistv5nvd
CVE-2019-13318MEDIUMCVSS 5.5v9.5.0.207232019-10-04
CVE-2019-13318 [MEDIUM] CWE-134 CVE-2019-13318: This vulnerability allows remote attackers to disclose sensitive information on affected installatio
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of the util.printf Javascript method. Th
cvelistv5nvd
CVE-2019-13330HIGHCVSS 7.8v9.5.0.207232019-10-03
CVE-2019-13330 [HIGH] CWE-843 CVE-2019-13330: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPG files. The issue results from the lack of p
cvelistv5nvd
CVE-2019-13326HIGHCVSS 7.8v9.5.0.207232019-10-03
CVE-2019-13326 [HIGH] CWE-416 CVE-2019-13326: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of fields within Acroform objects. The issue resul
cvelistv5nvd
CVE-2019-13327HIGHCVSS 7.8v9.5.0.207232019-10-03
CVE-2019-13327 [HIGH] CWE-416 CVE-2019-13327: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fo
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of fields within Acroform objects. The issue resul
cvelistv5nvd