Foxit Reader vulnerabilities
155 known vulnerabilities affecting foxit/reader.
Total CVEs
155
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH129MEDIUM14LOW12
Vulnerabilities
Page 5 of 8
CVE-2019-6772MEDIUMCVSS 5.5v2019.010.200982019-06-03
CVE-2019-6772 [MEDIUM] CWE-416 CVE-2019-6772: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. Th
cvelistv5nvd
CVE-2019-6773MEDIUMCVSS 5.5v9.4.1.168282019-06-03
CVE-2019-6773 [MEDIUM] CWE-416 CVE-2019-6773: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field objec
cvelistv5nvd
CVE-2019-6730HIGHCVSS 8.8v9.3.0.108262019-03-21
CVE-2019-6730 [HIGH] CWE-416 CVE-2019-6730: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the popUpMenu method. The issue results from the lack of validating the existe
cvelistv5nvd
CVE-2019-6729HIGHCVSS 8.8v9.3.0.108262019-03-21
CVE-2019-6729 [HIGH] CWE-125 CVE-2019-6729: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of proper validat
cvelistv5nvd
CVE-2019-6727HIGHCVSS 8.8v9.3.0.108262019-03-21
CVE-2019-6727 [HIGH] CWE-416 CVE-2019-6727: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA remerge method. The issue results from the lack of validating the exis
cvelistv5nvd
CVE-2019-6735MEDIUMCVSS 6.5v9.3.0.108262019-03-21
CVE-2019-6735 [MEDIUM] CWE-125 CVE-2019-6735: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of pro
cvelistv5nvd
CVE-2019-6728MEDIUMCVSS 6.5v9.3.0.108262019-03-21
CVE-2019-6728 [MEDIUM] CWE-125 CVE-2019-6728: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of pro
cvelistv5nvd
CVE-2018-17651HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17651 [HIGH] CWE-416 CVE-2018-17651: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the getItemState method of a TimeField. The issue
cvelistv5nvd
CVE-2018-17655HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17655 [HIGH] CWE-416 CVE-2018-17655: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the moveInstance method of a Form object. The iss
cvelistv5nvd
CVE-2018-17649HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17649 [HIGH] CWE-416 CVE-2018-17649: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setAttribute method of a TimeField. The issue
cvelistv5nvd
CVE-2018-17627HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17627 [HIGH] CWE-416 CVE-2018-17627: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the XFA mouseUp event. The issue results from the
cvelistv5nvd
CVE-2018-17673HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17673 [HIGH] CWE-416 CVE-2018-17673: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the subtype property of a Annotation object. The
cvelistv5nvd
CVE-2018-17625HIGHCVSS 8.8v9.1.0.50962019-01-24
CVE-2018-17625 [HIGH] CWE-416 CVE-2018-17625: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setInterval() method. The issue results from
cvelistv5nvd
CVE-2018-17665HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17665 [HIGH] CWE-416 CVE-2018-17665: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the currentPage property of a Host object. The is
cvelistv5nvd
CVE-2018-17632HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17632 [HIGH] CWE-416 CVE-2018-17632: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNode event. The issue results from the
cvelistv5nvd
CVE-2018-17652HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17652 [HIGH] CWE-416 CVE-2018-17652: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the mandatory property of a TimeField. The issue
cvelistv5nvd
CVE-2018-17697HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17697 [HIGH] CWE-416 CVE-2018-17697: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of templates. The issue results from the lack of val
cvelistv5nvd
CVE-2018-17657HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17657 [HIGH] CWE-416 CVE-2018-17657: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the gotoURL method of a host object. The issue re
cvelistv5nvd
CVE-2018-17640HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17640 [HIGH] CWE-416 CVE-2018-17640: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Form count property. The issue results from t
cvelistv5nvd
CVE-2018-17672HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17672 [HIGH] CWE-416 CVE-2018-17672: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of array indices. The issue results from the lack of
cvelistv5nvd