Foxit Reader vulnerabilities

155 known vulnerabilities affecting foxit/reader.

Total CVEs
155
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH129MEDIUM14LOW12

Vulnerabilities

Page 7 of 8
CVE-2018-17705HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17705 [HIGH] CWE-416 CVE-2018-17705: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the display property of CheckBox objects. The iss
cvelistv5nvd
CVE-2018-17664HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17664 [HIGH] CWE-416 CVE-2018-17664: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the isCompatibleNS method of a XFA object. The is
cvelistv5nvd
CVE-2018-17685HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17685 [HIGH] CWE-843 CVE-2018-17685: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PDF files. The issue results from the lack of pro
cvelistv5nvd
CVE-2018-17629HIGHCVSS 8.8v9.1.0.50962019-01-24
CVE-2018-17629 [HIGH] CWE-416 CVE-2018-17629: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of template objects. The issue results from the lack
cvelistv5nvd
CVE-2018-17637HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17637 [HIGH] CWE-416 CVE-2018-17637: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the loadXML method. The issue results from the la
cvelistv5nvd
CVE-2018-17671HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17671 [HIGH] CWE-125 CVE-2018-17671: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Lower method of a XFA object. The is
cvelistv5nvd
CVE-2018-17678HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17678 [HIGH] CWE-416 CVE-2018-17678: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the gotoNamedDest method of a app object. The iss
cvelistv5nvd
CVE-2018-17661HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17661 [HIGH] CWE-416 CVE-2018-17661: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the messageBox method of a Host object. The issue
cvelistv5nvd
CVE-2018-17670HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17670 [HIGH] CWE-416 CVE-2018-17670: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the content property of a XFA object. The issue r
cvelistv5nvd
CVE-2018-17682HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17682 [HIGH] CWE-416 CVE-2018-17682: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the delay property of Annotation objects. The iss
cvelistv5nvd
CVE-2018-17650HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17650 [HIGH] CWE-416 CVE-2018-17650: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNodes method of a TimeField. The issue
cvelistv5nvd
CVE-2018-17642HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17642 [HIGH] CWE-416 CVE-2018-17642: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the colSpan property of a TimeField. The issue re
cvelistv5nvd
CVE-2018-17675HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17675 [HIGH] CWE-416 CVE-2018-17675: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeDataObject method of a document. The is
cvelistv5nvd
CVE-2018-17676HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17676 [HIGH] CWE-416 CVE-2018-17676: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeField property of a app object. The iss
cvelistv5nvd
CVE-2018-17654HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17654 [HIGH] CWE-416 CVE-2018-17654: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the insertInstance method of a Form object. The i
cvelistv5nvd
CVE-2018-17656HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17656 [HIGH] CWE-416 CVE-2018-17656: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the getDisplayItem method of a TimeField. The iss
cvelistv5nvd
CVE-2018-17631HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17631 [HIGH] CWE-416 CVE-2018-17631: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeInstance event. The issue results from
cvelistv5nvd
CVE-2018-17634HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17634 [HIGH] CWE-416 CVE-2018-17634: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the attachIcon property of Annotation objects. Th
cvelistv5nvd
CVE-2018-17696HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17696 [HIGH] CWE-416 CVE-2018-17696: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the dataObjects. The issue results from the lack
cvelistv5nvd
CVE-2018-17669HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17669 [HIGH] CWE-416 CVE-2018-17669: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the name property of a XFA object. The issue resu
cvelistv5nvd