📦 Pdf Editor
by Foxit
🔍 What is Pdf Editor?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
Foxit PDF Editor v11.3.1 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files to the system. This affects all users running the vulnerable version of Foxit P...
CVE-2022-24955 is a DLL hijacking vulnerability in Foxit PDF software that allows attackers to execute arbitrary code by placing malicious DLL files in directories searched by the application. This af...
A heap-based buffer overflow vulnerability in Foxit PDF Reader's JBIG2 image parsing allows remote code execution when opening malicious PDF files. This affects all users of vulnerable Foxit PDF Reade...
A use-after-free vulnerability in Foxit PDF Reader's PDF parsing allows remote code execution when opening malicious PDF files. This affects Windows users running vulnerable versions of Foxit PDF Read...
A use-after-free vulnerability in Foxit PDF Reader's annotation handling allows remote code execution when opening malicious PDF files containing crafted JavaScript. This affects Windows and MacOS use...
A use-after-free vulnerability in Foxit PDF software allows remote code execution when opening malicious PDF files containing crafted JavaScript. This affects Foxit PDF Reader and Foxit PDF Editor use...
A local privilege escalation vulnerability in Foxit PDF Reader/Editor Update Service allows low-privileged local attackers to modify plugin installation resources. When the service executes these reso...
This vulnerability in Foxit PDF Editor and Reader allows attackers to modify the visual content of digitally signed PDFs without invalidating the signature. By exploiting Optional Content Groups (OCG)...
This vulnerability allows attackers who can modify or replace static HTML files used by Foxit PDF's StartPage feature to inject malicious content that loads automatically when the application starts. ...
A memory corruption vulnerability in Foxit PDF and Editor allows attackers to execute arbitrary code by exploiting improper state updates when deleting PDF pages via JavaScript. This affects Windows u...
This vulnerability in Foxit PDF software allows arbitrary code execution when processing malicious PDF files. Attackers can exploit memory corruption by manipulating form field properties via JavaScri...
This vulnerability in Foxit PDF software allows memory corruption when pages are deleted via JavaScript, potentially enabling arbitrary code execution. It affects Windows and macOS users running Foxit...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PRC files. The flaw exists in PRC file parsing where improper data val...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PRC files. The flaw exists in PRC file parsing where improper data val...
This vulnerability in Foxit PDF Reader's Update Service allows local attackers to escalate privileges by loading a malicious library from an unsecured location. Attackers who already have low-privileg...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted AcroForms. The flaw is an out-o...
This vulnerability in Foxit PDF Reader allows local attackers to escalate privileges from low-privileged user accounts to SYSTEM level by exploiting a flaw in the installer through junction manipulati...
A use-after-free vulnerability in Foxit Reader 2024.3.0.26795 allows arbitrary code execution when processing malicious PDF files containing specially crafted JavaScript with 3D page objects. Attacker...
This CVE describes a use-after-free vulnerability in Foxit PDF Reader's annotation handling that allows information disclosure. Attackers can exploit it by tricking users into opening malicious PDF fi...
This vulnerability in Foxit PDF Reader allows remote attackers to read memory beyond allocated buffers when processing malicious PDF files with AcroForms. It can disclose sensitive information and pot...
This is a use-after-free vulnerability in Foxit PDF Reader's annotation handling that allows remote attackers to execute arbitrary code when users open malicious PDF files. Attackers can exploit this ...
This vulnerability in Foxit PDF Reader's Update Service allows local attackers to escalate privileges from a low-privileged user to SYSTEM by exploiting incorrect permissions on configuration files. I...
This vulnerability in Foxit PDF Reader allows attackers to read memory beyond allocated buffers when processing malicious PDF files with specially crafted annotations. It can disclose sensitive inform...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files. The flaw exists in PDF parsing where improper data validati...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files. The flaw exists in PDF parsing where improper data validati...
This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote attackers to execute arbitrary code when a user opens a malicious PDF file. It affects users of vulner...
This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm handling that allows remote code execution when users open malicious PDF files. Attackers can exploit this to run arbitrary code w...
This vulnerability allows remote attackers to execute arbitrary code on affected Foxit PDF Reader installations by tricking users into opening malicious PDF files containing specially crafted JPG2000 ...
This is a use-after-free vulnerability in Foxit PDF Reader's annotation handling that allows remote attackers to execute arbitrary code when a user opens a malicious PDF file. It affects Foxit PDF Rea...
This is a use-after-free vulnerability in Foxit PDF Editor's handling of FileAttachment annotations that allows remote code execution. Attackers can exploit it by tricking users into opening malicious...
This is a use-after-free vulnerability in Foxit PDF Editor's transitionToState method that allows remote attackers to execute arbitrary code. Attackers can exploit it by tricking users into opening ma...
This is a use-after-free vulnerability in Foxit PDF Editor's handling of Circle Annotation objects, allowing remote attackers to execute arbitrary code when a user opens a malicious PDF file or visits...
This is a use-after-free vulnerability in Foxit PDF Editor's handling of Caret Annotation objects that allows remote code execution. Attackers can exploit it by tricking users into opening malicious P...
This is a use-after-free vulnerability in Foxit PDF Editor's polygon annotation handling that allows remote code execution when users open malicious PDF files. Attackers can exploit this to run arbitr...
This is a use-after-free vulnerability in Foxit PDF Editor's handling of StrikeOut annotations that allows remote code execution. Attackers can exploit it by tricking users into opening malicious PDF ...
This is a use-after-free vulnerability in Foxit PDF Editor's underline annotation handling that allows remote attackers to execute arbitrary code. Users who open malicious PDF files or visit malicious...
This is a use-after-free vulnerability in Foxit PDF Editor's text annotation handling that allows remote attackers to execute arbitrary code when a user opens a malicious PDF file. Attackers can explo...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files. The flaw exists in how Annotation objects are handled, enab...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by exploiting a use-after-free flaw in Annotation object handling. It affects users who open malicious PDF file...
This vulnerability in Foxit PDF Reader allows attackers to execute arbitrary code by tricking users into opening malicious PDF files. It affects users running vulnerable versions of Foxit PDF Reader w...
This vulnerability in Foxit PDF Reader allows remote attackers to execute arbitrary code by tricking users into opening malicious PDF files. The flaw exists in how the software handles annotation obje...
This is a use-after-free vulnerability in Foxit PDF Reader's AcroForm signature handling that allows remote code execution. Attackers can exploit it by tricking users into opening malicious PDF files,...
A memory corruption vulnerability in Foxit PDF Reader's 3D annotation handling allows attackers to cause out-of-bounds memory access via specially crafted PRC content in PDF files. This could lead to ...
A memory corruption vulnerability in Foxit PDF Reader allows attackers to execute arbitrary code by tricking users into opening malicious PDF files containing specially crafted PRC content. This affec...
A memory corruption vulnerability in Foxit PDF Reader's 3D annotation handling allows attackers to execute arbitrary code or cause denial of service by tricking users into opening malicious PDF files....
Foxit PDF Editor and Reader versions before 2025.2.1 contain a signature spoofing vulnerability where attackers can embed triggers (like JavaScript) in PDF documents. These triggers execute during the...
A use-after-free vulnerability in Foxit PDF and Editor for Windows allows memory corruption when opening a malicious PDF containing JavaScript that calls closeDoc() prematurely. This could lead to inf...
A use-after-free vulnerability in Foxit PDF and Editor allows memory corruption or crashes when processing malicious PDF files containing specific JavaScript. Attackers could exploit this by tricking ...
This vulnerability in Foxit PDF software allows attackers to create malicious PDFs that use JavaScript to modify annotation content and clear modification status, bypassing digital signature verificat...
This vulnerability in Foxit PDF Reader allows remote attackers to disclose sensitive information by tricking users into opening malicious JP2 files. The flaw exists in JP2 file parsing where improper ...
Foxit PDF Reader contains an out-of-bounds read vulnerability when parsing PRC files, allowing attackers to disclose sensitive information from affected systems. This affects users who open malicious ...
This vulnerability in Foxit PDF Reader allows attackers to read memory beyond allocated bounds when parsing malicious PRC files, potentially disclosing sensitive information. Users who open malicious ...
A use-after-free vulnerability in Foxit PDF Reader's Doc object handling allows remote attackers to disclose sensitive information. Attackers can exploit this by tricking users into opening malicious ...
CVE-2021-34976 is a use-after-free vulnerability in Foxit PDF Reader's PDF file parsing that allows remote attackers to disclose sensitive information. Users who open malicious PDF files or visit mali...
CVE-2021-34973 is a use-after-free vulnerability in Foxit PDF Reader's PDF file parsing that allows attackers to disclose sensitive information. Users who open malicious PDF files or visit malicious w...
This is a format string vulnerability in Foxit PDF Reader's print method that allows information disclosure. Attackers can exploit it by tricking users into opening malicious PDF files or visiting mal...
This vulnerability in Foxit PDF Reader allows attackers to read sensitive information from memory by tricking users into opening malicious PDF files. The flaw exists in how annotation objects are proc...
CVE-2022-43640 is an out-of-bounds read vulnerability in Foxit PDF Reader that allows attackers to disclose sensitive information from affected systems. Users who open malicious PDF files or visit mal...
This vulnerability in Foxit PDF Reader allows remote attackers to read sensitive information from memory by exploiting a JavaScript flaw in Doc object handling. Users who open malicious PDF files or v...
This vulnerability in Foxit PDF Reader allows remote attackers to read sensitive information from memory by exploiting an out-of-bounds read in the resetForm method. Attackers can combine this with ot...
This vulnerability in Foxit PDF Reader allows remote attackers to disclose sensitive information by exploiting improper object validation in the AFSpecial_KeystrokeEx method. Users who open malicious ...
This vulnerability in Foxit PDF software allows attackers to trigger an out-of-bounds read by tricking users into opening malicious PDF files containing crafted JavaScript. The flaw could lead to info...