Foxitsoftware Reader vulnerabilities

259 known vulnerabilities affecting foxitsoftware/reader.

Total CVEs
259
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL11HIGH228MEDIUM13LOW7

Vulnerabilities

Page 9 of 13
CVE-2018-17696HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17696 [HIGH] CWE-416 CVE-2018-17696: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the dataObjects. The issue results from the lack
nvd
CVE-2018-17669HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17669 [HIGH] CWE-416 CVE-2018-17669: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the name property of a XFA object. The issue resu
nvd
CVE-2018-17663HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17663 [HIGH] CWE-416 CVE-2018-17663: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the importData method of a Host object. The issue
nvd
CVE-2018-17644HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17644 [HIGH] CWE-416 CVE-2018-17644: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the addItem method of a TimeField. The issue resu
nvd
CVE-2018-17635HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17635 [HIGH] CWE-416 CVE-2018-17635: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the desc property. The issue results from the lac
nvd
CVE-2018-17633HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17633 [HIGH] CWE-416 CVE-2018-17633: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the subject property of Annotation objects. The i
nvd
CVE-2018-17631HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17631 [HIGH] CWE-416 CVE-2018-17631: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeInstance event. The issue results from
nvd
CVE-2018-17627HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17627 [HIGH] CWE-416 CVE-2018-17627: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the XFA mouseUp event. The issue results from the
nvd
CVE-2018-17666HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17666 [HIGH] CWE-416 CVE-2018-17666: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the exportData method of a host object. The issue
nvd
CVE-2018-17648HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17648 [HIGH] CWE-416 CVE-2018-17648: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the rotate property of a TimeField. The issue res
nvd
CVE-2018-17700HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17700 [HIGH] CWE-125 CVE-2018-17700: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Array.prototype.concat. The issue results fro
nvd
CVE-2018-17645HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17645 [HIGH] CWE-416 CVE-2018-17645: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the vAlign property of a TimeField. The issue res
nvd
CVE-2018-17638HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17638 [HIGH] CWE-416 CVE-2018-17638: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the getAttribute method. The issue results from t
nvd
CVE-2018-17641HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17641 [HIGH] CWE-416 CVE-2018-17641: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the deleteItem method of a TimeField. The issue r
nvd
CVE-2018-17675HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17675 [HIGH] CWE-416 CVE-2018-17675: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeDataObject method of a document. The is
nvd
CVE-2018-17659HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17659 [HIGH] CWE-416 CVE-2018-17659: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the title property of a Host object. The issue re
nvd
CVE-2018-17658HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17658 [HIGH] CWE-416 CVE-2018-17658: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the respose property of a host object. The issue
nvd
CVE-2018-17653HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17653 [HIGH] CWE-416 CVE-2018-17653: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNode method of a TimeField. The issue
nvd
CVE-2018-17678HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17678 [HIGH] CWE-416 CVE-2018-17678: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the gotoNamedDest method of a app object. The iss
nvd
CVE-2018-17662HIGHCVSS 8.8≤ 9.2.0.92972019-01-24
CVE-2018-17662 [HIGH] CWE-416 CVE-2018-17662: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the beep method of a Host object. The issue resul
nvd