Foxitsoftware Foxit Reader vulnerabilities

382 known vulnerabilities affecting foxitsoftware/foxit_reader.

Total CVEs
382
CISA KEV
0
Public exploits
7
Exploited in wild
0
Severity breakdown
CRITICAL22HIGH274MEDIUM75LOW11

Vulnerabilities

Page 16 of 20
CVE-2017-14823HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14823 [HIGH] CWE-843 CVE-2017-14823: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the signer method of XFA's Signature objects. The issue results
nvd
CVE-2017-14832HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14832 [HIGH] CWE-416 CVE-2017-14832: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the style attribute of Caret Annotation objects. The issue resul
nvd
CVE-2017-16572HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-16572 [HIGH] CWE-843 CVE-2017-16572: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within FormCalc's closeDoc method. The issue results from the lack of p
nvd
CVE-2017-16577HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-16577 [HIGH] CWE-416 CVE-2017-16577: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the alignment attribute of Field objects. The issue results from
nvd
CVE-2017-16582HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16582 [HIGH] CWE-843 CVE-2017-16582: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the clearItems XFA method. The issue results from the lack of pr
nvd
CVE-2017-10959HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-10959 [HIGH] CWE-416 CVE-2017-10959: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the setAction method of Link objects. The issue results from the
nvd
CVE-2017-16585HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16585 [HIGH] CWE-416 CVE-2017-16585: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the app.response method. The issue results from the lack of vali
nvd
CVE-2017-16583HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16583 [HIGH] CWE-416 CVE-2017-16583: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the datasets element of XFA forms. The issue results from the la
nvd
CVE-2017-14835HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14835 [HIGH] CWE-843 CVE-2017-14835: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the page method of XFA Layout objects. The issue results from th
nvd
CVE-2017-14825HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14825 [HIGH] CWE-843 CVE-2017-14825: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the remove method of XFAScriptObject objects. The issue results
nvd
CVE-2017-16575HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-16575 [HIGH] CWE-416 CVE-2017-16575: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the XFA's bind element. The issue results from the lack of valid
nvd
CVE-2017-14827HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14827 [HIGH] CWE-843 CVE-2017-14827: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the append method of XFA Node objects. The issue results from th
nvd
CVE-2017-16581HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16581 [HIGH] CWE-416 CVE-2017-16581: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the author attribute of the Document object. The issue results f
nvd
CVE-2017-16587HIGHCVSS 8.8v8.3.2.250132017-12-20
CVE-2017-16587 [HIGH] CWE-416 CVE-2017-16587: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. The issue results from the lack of valid
nvd
CVE-2017-10957HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-10957 [HIGH] CWE-416 CVE-2017-10957: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the arrowEnd attribute of Annotation objects. The issue results
nvd
CVE-2017-14828HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14828 [HIGH] CWE-843 CVE-2017-14828: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the w method of XFA Layout objects. The issue results from the l
nvd
CVE-2017-14831HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14831 [HIGH] CWE-416 CVE-2017-14831: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the author attribute of Circle Annotation objects. The issue res
nvd
CVE-2017-14834HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14834 [HIGH] CWE-416 CVE-2017-14834: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the style attribute of FileAttachment annotation objects. The is
nvd
CVE-2017-14837HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14837 [HIGH] CWE-843 CVE-2017-14837: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the pageSpan method of XFA Layout objects. The issue results fro
nvd
CVE-2017-14824HIGHCVSS 8.8v8.3.1.211552017-12-20
CVE-2017-14824 [HIGH] CWE-843 CVE-2017-14824: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.1.21155. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the insert method of XFAScriptObject objects. The issue results
nvd