📦 Foxit Reader
by Foxitsoftware
🔍 What is Foxit Reader?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows SQL injection attacks in Foxit Reader and PhantomPDF through crafted data appended to strings. Attackers can execute arbitrary SQL commands, potentially compromising data int...
This vulnerability in Foxit Reader and PhantomPDF allows memory corruption when converting PDF documents to other formats, potentially enabling remote code execution. Attackers could exploit this by t...
This vulnerability in Foxit Reader and PhantomPDF allows attackers to delete arbitrary files during uninstallation via symbolic link manipulation. It affects users running vulnerable versions of these...
This vulnerability in Foxit Reader and PhantomPDF allows attackers to write arbitrary files due to insufficient validation of the extractPages pathname. Attackers can exploit this to potentially execu...
This CVE describes a use-after-free vulnerability in Foxit Reader and PhantomPDF's AcroForm JavaScript engine. Attackers can exploit this by crafting malicious PDF files to execute arbitrary code on v...
CVE-2020-26537 is a critical memory corruption vulnerability in Foxit Reader and PhantomPDF that allows attackers to execute arbitrary code by exploiting an out-of-bounds write during PDF shading calc...
This vulnerability in Foxit Reader and PhantomPDF allows attackers to execute arbitrary code on affected systems by exploiting a use-after-free memory error when processing PDF files with malformed /V...
A type confusion vulnerability in Foxit Reader 12.1.2.15356 allows arbitrary code execution when processing malicious PDF files containing JavaScript. Attackers can exploit this by tricking users into...
This vulnerability in Foxit Reader's JavaScript saveAs API allows arbitrary file creation when a user opens a malicious PDF file or visits a malicious website with the browser plugin enabled. Successf...
This vulnerability in Foxit Reader allows attackers to create arbitrary files on a victim's system through a malicious PDF file or website. When exploited, it can lead to arbitrary code execution. Use...
This vulnerability allows attackers to execute arbitrary code by exploiting an out-of-bounds write vulnerability in Foxit Reader and PhantomPDF when processing PDF files with a crafted /Size key in th...
A use-after-free vulnerability in Foxit PDF Reader's JavaScript engine allows arbitrary code execution when users open malicious PDF files. This affects Foxit PDF Reader version 10.1.3.37598 users, pa...
This vulnerability in Foxit Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U3D objects. The flaw is a double-f...
This vulnerability in Foxit Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files or visiting malicious web pages. The flaw exists in how Annotati...
This is a use-after-free vulnerability in Foxit Reader's XFA Forms handling that allows remote code execution. Attackers can exploit it by tricking users into opening malicious PDF files, potentially ...
This is a use-after-free vulnerability in Foxit Reader's XFA form handling that allows remote code execution when users open malicious PDF files. Attackers can exploit this to execute arbitrary code w...
This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U3D objects. It affects Foxit PhantomPDF users runn...
This vulnerability allows remote attackers to execute arbitrary code on Foxit PhantomPDF installations by tricking users into opening malicious PDF files containing specially crafted U3D objects. The ...
This vulnerability in Foxit PhantomPDF allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U3D objects. The flaw is an out...
This vulnerability in Foxit PhantomPDF allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted U3D objects. The flaw exists du...