Foxitsoftware Foxit Reader vulnerabilities
382 known vulnerabilities affecting foxitsoftware/foxit_reader.
Total CVEs
382
CISA KEV
0
Public exploits
7
Exploited in wild
0
Severity breakdown
CRITICAL22HIGH274MEDIUM75LOW11
Vulnerabilities
Page 10 of 20
CVE-2018-14280HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14280 [HIGH] CWE-693 CVE-2018-14280: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsFDF XFA function. The issue results from the lack of
nvd
CVE-2018-14278HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14278 [HIGH] CWE-843 CVE-2018-14278: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getPageNumWords method. By performing actions in JavaScript,
nvd
CVE-2018-14244HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14244 [HIGH] CWE-843 CVE-2018-14244: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the calculateNow method. By performing actions in JavaScript, an
nvd
CVE-2018-14269HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14269 [HIGH] CWE-843 CVE-2018-14269: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the print method. By performing actions in JavaScript, an attacke
nvd
CVE-2018-14283HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14283 [HIGH] CWE-416 CVE-2018-14283: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the highlightMode attribute. The issue results from the lack of v
nvd
CVE-2018-14282HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14282 [HIGH] CWE-665 CVE-2018-14282: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of FlateDecode streams. The issue results from the l
nvd
CVE-2018-14310HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14310 [HIGH] CWE-416 CVE-2018-14310: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of events. The issue results from the lack of valida
nvd
CVE-2018-14268HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14268 [HIGH] CWE-843 CVE-2018-14268: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mailForm method. By performing actions in JavaScript, an atta
nvd
CVE-2018-14301HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14301 [HIGH] CWE-416 CVE-2018-14301: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Sound annotations. By manipulating a document's
nvd
CVE-2018-14286HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14286 [HIGH] CWE-843 CVE-2018-14286: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arguments passed to the mailDoc function. The iss
nvd
CVE-2018-14302HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14302 [HIGH] CWE-416 CVE-2018-14302: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Square annotations. By manipulating a document'
nvd
CVE-2018-11618HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-11618 [HIGH] CWE-416 CVE-2018-11618: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resetForm method. The issue results from the
nvd
CVE-2018-14306HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14306 [HIGH] CWE-416 CVE-2018-14306: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of button objects. By manipulating a document's el
nvd
CVE-2018-11617HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-11617 [HIGH] CWE-416 CVE-2018-11617: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Format events for ComboBox fields. The issue res
nvd
CVE-2018-14252HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14252 [HIGH] CWE-843 CVE-2018-14252: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getField method. By performing actions in JavaScript, an atta
nvd
CVE-2018-14262HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14262 [HIGH] CWE-843 CVE-2018-14262: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getURL method. By performing actions in JavaScript, an attack
nvd
CVE-2018-14249HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14249 [HIGH] CWE-843 CVE-2018-14249: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportDataObject method. By performing actions in JavaScript,
nvd
CVE-2018-14277HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14277 [HIGH] CWE-843 CVE-2018-14277: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mailDoc method. By performing actions in JavaScript, an attac
nvd
CVE-2018-14273HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14273 [HIGH] CWE-843 CVE-2018-14273: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeTemplate method. By performing actions in JavaScript, a
nvd
CVE-2018-14276HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14276 [HIGH] CWE-843 CVE-2018-14276: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the submitForm method. By performing actions in JavaScript, an at
nvd