Foxit Reader vulnerabilities

155 known vulnerabilities affecting foxit/reader.

Total CVEs
155
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH129MEDIUM14LOW12

Vulnerabilities

Page 8 of 8
CVE-2018-17663HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17663 [HIGH] CWE-416 CVE-2018-17663: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the importData method of a Host object. The issue
cvelistv5nvd
CVE-2018-17644HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17644 [HIGH] CWE-416 CVE-2018-17644: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the addItem method of a TimeField. The issue resu
cvelistv5nvd
CVE-2018-17633HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17633 [HIGH] CWE-416 CVE-2018-17633: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the subject property of Annotation objects. The i
cvelistv5nvd
CVE-2018-17648HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17648 [HIGH] CWE-416 CVE-2018-17648: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the rotate property of a TimeField. The issue res
cvelistv5nvd
CVE-2018-17658HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17658 [HIGH] CWE-416 CVE-2018-17658: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the respose property of a host object. The issue
cvelistv5nvd
CVE-2018-17638HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17638 [HIGH] CWE-416 CVE-2018-17638: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the getAttribute method. The issue results from t
cvelistv5nvd
CVE-2018-17659HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17659 [HIGH] CWE-416 CVE-2018-17659: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the title property of a Host object. The issue re
cvelistv5nvd
CVE-2018-17684HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17684 [HIGH] CWE-416 CVE-2018-17684: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the isPropertySpecified method. The issue results
cvelistv5nvd
CVE-2018-17653HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17653 [HIGH] CWE-416 CVE-2018-17653: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNode method of a TimeField. The issue
cvelistv5nvd
CVE-2018-17662HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17662 [HIGH] CWE-416 CVE-2018-17662: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the beep method of a Host object. The issue resul
cvelistv5nvd
CVE-2018-17660HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17660 [HIGH] CWE-416 CVE-2018-17660: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resetData method of a Host object. The issue
cvelistv5nvd
CVE-2018-17681HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17681 [HIGH] CWE-416 CVE-2018-17681: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the getPageBox method of a Form. The issue result
cvelistv5nvd
CVE-2018-17639HIGHCVSS 8.8v9.2.0.92972019-01-24
CVE-2018-17639 [HIGH] CWE-416 CVE-2018-17639: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setElement method. The issue results from the
cvelistv5nvd
CVE-2018-17699MEDIUMCVSS 6.5v9.2.0.92972019-01-24
CVE-2018-17699 [MEDIUM] CWE-125 CVE-2018-17699: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from th
cvelistv5nvd
CVE-2018-17686MEDIUMCVSS 6.5v9.2.0.92972019-01-24
CVE-2018-17686 [MEDIUM] CWE-125 CVE-2018-17686: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installat This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of BMP images. The issue results from t
cvelistv5nvd