Foxit Reader vulnerabilities

155 known vulnerabilities affecting foxit/reader.

Total CVEs
155
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH129MEDIUM14LOW12

Vulnerabilities

Page 6 of 8
CVE-2018-17668HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17668 [HIGH] CWE-416 CVE-2018-17668: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeAttribute method of a XFA object. The i
cvelistv5nvd
CVE-2018-17646HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17646 [HIGH] CWE-416 CVE-2018-17646: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the fillColor property of a TimeField. The issue
cvelistv5nvd
CVE-2018-17683HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17683 [HIGH] CWE-416 CVE-2018-17683: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the createIcon method of an app object. The issue
cvelistv5nvd
CVE-2018-17643HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17643 [HIGH] CWE-416 CVE-2018-17643: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the editValue property of a TimeField. The issue
cvelistv5nvd
CVE-2018-17641HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17641 [HIGH] CWE-416 CVE-2018-17641: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the deleteItem method of a TimeField. The issue r
cvelistv5nvd
CVE-2018-17667HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17667 [HIGH] CWE-416 CVE-2018-17667: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the print method of a Host object. The issue resu
cvelistv5nvd
CVE-2018-17674HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17674 [HIGH] CWE-416 CVE-2018-17674: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the name property of Annotation objects. The issu
cvelistv5nvd
CVE-2018-17645HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17645 [HIGH] CWE-416 CVE-2018-17645: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the vAlign property of a TimeField. The issue res
cvelistv5nvd
CVE-2018-17630HIGHCVSS 8.8v9.1.0.50962019-01-24
CVE-2018-17630 [HIGH] CWE-416 CVE-2018-17630: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the openPlayer method. The issue results from the
cvelistv5nvd
CVE-2018-17647HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17647 [HIGH] CWE-416 CVE-2018-17647: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the boundItem method of a TimeField. The issue re
cvelistv5nvd
CVE-2018-17704HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17704 [HIGH] CWE-416 CVE-2018-17704: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the textColor property of RadioButton objects. Th
cvelistv5nvd
CVE-2018-17677HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17677 [HIGH] CWE-416 CVE-2018-17677: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the mailDoc method of a app object. The issue res
cvelistv5nvd
CVE-2018-17680HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17680 [HIGH] CWE-416 CVE-2018-17680: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the style property of a Field object. The issue r
cvelistv5nvd
CVE-2018-17626HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17626 [HIGH] CWE-416 CVE-2018-17626: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Validate events of TextBox objects. The issue
cvelistv5nvd
CVE-2018-17679HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17679 [HIGH] CWE-416 CVE-2018-17679: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elemen
cvelistv5nvd
CVE-2018-17703HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17703 [HIGH] CWE-416 CVE-2018-17703: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the defaultValue property of ComboBox objects. Th
cvelistv5nvd
CVE-2018-17666HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17666 [HIGH] CWE-416 CVE-2018-17666: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the exportData method of a host object. The issue
cvelistv5nvd
CVE-2018-17636HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17636 [HIGH] CWE-416 CVE-2018-17636: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the id property of a aliasNode. The issue results
cvelistv5nvd
CVE-2018-17702HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17702 [HIGH] CWE-416 CVE-2018-17702: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of button objects. The iss
cvelistv5nvd
CVE-2018-17635HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17635 [HIGH] CWE-416 CVE-2018-17635: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the desc property. The issue results from the lac
cvelistv5nvd