Foxitsoftware Foxit Reader vulnerabilities
382 known vulnerabilities affecting foxitsoftware/foxit_reader.
Total CVEs
382
CISA KEV
0
Public exploits
7
Exploited in wild
0
Severity breakdown
CRITICAL22HIGH274MEDIUM75LOW11
Vulnerabilities
Page 9 of 20
CVE-2018-14311HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14311 [HIGH] CWE-843 CVE-2018-14311: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA events. The issue results from the lack of proper valida
nvd
CVE-2018-14272HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14272 [HIGH] CWE-843 CVE-2018-14272: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeIcon method. By performing actions in JavaScript, an at
nvd
CVE-2018-14292HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14292 [HIGH] CWE-416 CVE-2018-14292: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF documents. By manipulating a document's elemen
nvd
CVE-2018-14285HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14285 [HIGH] CWE-843 CVE-2018-14285: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the oneOfChild attribute. The issue results from
nvd
CVE-2018-14266HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14266 [HIGH] CWE-843 CVE-2018-14266: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the importDataObject method. By performing actions in JavaScript,
nvd
CVE-2018-14299HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14299 [HIGH] CWE-416 CVE-2018-14299: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Line annotations. By manipulating a document's
nvd
CVE-2018-14297HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14297 [HIGH] CWE-416 CVE-2018-14297: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of FreeText annotations. By manipulating a documen
nvd
CVE-2018-14298HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14298 [HIGH] CWE-416 CVE-2018-14298: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Ink annotations. By manipulating a document's e
nvd
CVE-2018-14255HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14255 [HIGH] CWE-843 CVE-2018-14255: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getNthFieldName method. By performing actions in JavaScript,
nvd
CVE-2018-14263HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14263 [HIGH] CWE-843 CVE-2018-14263: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getVersionID method. By performing actions in JavaScript, an
nvd
CVE-2018-14294HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14294 [HIGH] CWE-416 CVE-2018-14294: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of FileAttachment annotations. By manipulating a d
nvd
CVE-2018-14309HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14309 [HIGH] CWE-416 CVE-2018-14309: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.1.0.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the SeedValue Generic Object parameter provided t
nvd
CVE-2018-14300HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14300 [HIGH] CWE-416 CVE-2018-14300: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Polygon annotations. By manipulating a document
nvd
CVE-2018-14271HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14271 [HIGH] CWE-843 CVE-2018-14271: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method. By performing actions in JavaScript, an a
nvd
CVE-2018-14245HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14245 [HIGH] CWE-843 CVE-2018-14245: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the closeDoc method. By performing actions in JavaScript, an atta
nvd
CVE-2018-14314HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14314 [HIGH] CWE-416 CVE-2018-14314: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of annotations. The issue results from the lack of v
nvd
CVE-2018-14304HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14304 [HIGH] CWE-416 CVE-2018-14304: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.5096. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Text annotations. By manipulating a document's
nvd
CVE-2018-14242HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14242 [HIGH] CWE-843 CVE-2018-14242: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addField method. By performing actions in JavaScript, an atta
nvd
CVE-2018-11622HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-11622 [HIGH] CWE-787 CVE-2018-11622: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ConvertToPDF_x86.dll. The issue results from the lack of proper v
nvd
CVE-2018-14246HIGHCVSS 8.8≤ 9.1.0.50962018-07-31
CVE-2018-14246 [HIGH] CWE-843 CVE-2018-14246: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the convertTocPDF method. By performing actions in JavaScript, an
nvd