Foxit Reader vulnerabilities

247 known vulnerabilities affecting foxit/foxit_reader.

Total CVEs
247
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH197MEDIUM49

Vulnerabilities

Page 1 of 13
CVE-2025-32451HIGHCVSS 8.8v2025.1.0.279372025-08-13
CVE-2025-32451 [HIGH] CWE-824 CVE-2025-32451: A memory corruption vulnerability exists in Foxit Reader 2025.1.0.27937 due to the use of an uniniti A memory corruption vulnerability exists in Foxit Reader 2025.1.0.27937 due to the use of an uninitialized pointer. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the maliciou
cvelistv5nvd
CVE-2013-10068CRITICALCVSS 9.4≥ *, ≤ 5.4.5.01142025-08-05
CVE-2013-10068 [CRITICAL] CWE-121 CVE-2013-10068: Foxit Reader Plugin version 2.2.1.530, bundled with Foxit Reader 5.4.4.11281, contains a stack-based Foxit Reader Plugin version 2.2.1.530, bundled with Foxit Reader 5.4.4.11281, contains a stack-based buffer overflow vulnerability in the npFoxitReaderPlugin.dll module. When a PDF file is loaded from a remote host, an overly long query string in the URL can overflow a buffer, allowing remote attackers to execute arbitrary code.
cvelistv5nvd
CVE-2024-47810HIGHCVSS 8.8v2024.3.0.267952024-12-18
CVE-2024-47810 [HIGH] CWE-416 CVE-2024-47810: A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a 3D page objec A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a 3D page object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to tri
cvelistv5nvd
CVE-2024-49576HIGHCVSS 8.8v2024.3.0.267952024-12-18
CVE-2024-49576 [HIGH] CWE-416 CVE-2024-49576: A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a checkbox CBF_ A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a checkbox CBF_Widget object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious
cvelistv5nvd
CVE-2024-28888HIGHCVSS 8.8v2024.1.0.239972024-10-02
CVE-2024-28888 [HIGH] CWE-416 CVE-2024-28888: A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a checkbox fie A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a checkbox field object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file
cvelistv5nvd
CVE-2024-29072HIGHCVSS 8.2v2024.2.0.251382024-05-28
CVE-2024-29072 [HIGH] CWE-295 CVE-2024-29072: A privilege escalation vulnerability exists in the Foxit Reader 2024.2.0.25138. The vulnerability oc A privilege escalation vulnerability exists in the Foxit Reader 2024.2.0.25138. The vulnerability occurs due to improper certification validation of the updater executable before executing it. A low privilege user can trigger the update action which can result in unexpected elevation of privilege.
cvelistv5nvd
CVE-2024-25648HIGHCVSS 8.8v2024.1.0.239972024-04-30
CVE-2024-25648 [HIGH] CWE-416 CVE-2024-25648: A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widg A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a ComboBox widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the mali
cvelistv5nvd
CVE-2024-25938HIGHCVSS 8.8v2024.1.0.239972024-04-30
CVE-2024-25938 [HIGH] CWE-416 CVE-2024-25938: A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Barcode widge A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Barcode widget. A specially crafted JavaScript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malic
cvelistv5nvd
CVE-2024-25575HIGHCVSS 8.8v2024.1.0.239972024-04-30
CVE-2024-25575 [HIGH] CWE-843 CVE-2024-25575: A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious
cvelistv5nvd
CVE-2023-35985HIGHCVSS 8.8v12.1.3.153562023-11-27
CVE-2023-35985 [HIGH] CWE-73 CVE-2023-35985: An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Read An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the mali
cvelistv5nvd
CVE-2023-40194HIGHCVSS 8.8v12.1.3.153562023-11-27
CVE-2023-40194 [HIGH] CWE-73 CVE-2023-40194: An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Read An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to mistreatment of whitespace characters. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to t
cvelistv5nvd
CVE-2023-38573HIGHCVSS 8.8v12.1.3.153562023-11-27
CVE-2023-38573 [HIGH] CWE-416 CVE-2023-38573: A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malici
cvelistv5nvd
CVE-2023-39542HIGHCVSS 8.8v12.1.3.153562023-11-27
CVE-2023-39542 [HIGH] CWE-73 CVE-2023-39542: A code execution vulnerability exists in the Javascript saveAs API of Foxit Reader 12.1.3.15356. A s A code execution vulnerability exists in the Javascript saveAs API of Foxit Reader 12.1.3.15356. A specially crafted malformed file can create arbitrary files, which can lead to remote code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a speci
cvelistv5nvd
CVE-2023-41257HIGHCVSS 8.8v12.1.3.153562023-11-27
CVE-2023-41257 [HIGH] CWE-843 CVE-2023-41257: A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value prope A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to
cvelistv5nvd
CVE-2023-32616HIGHCVSS 8.8v12.1.3.153562023-11-27
CVE-2023-32616 [HIGH] CWE-416 CVE-2023-32616: A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles 3D annotations. A A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles 3D annotations. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious
cvelistv5nvd
CVE-2023-33866HIGHCVSS 8.8v12.1.2.153322023-07-19
CVE-2023-33866 [HIGH] CWE-416 CVE-2023-33866: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, versi A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the m
cvelistv5nvd
CVE-2023-28744HIGHCVSS 8.8v12.1.1.152892023-07-19
CVE-2023-28744 [HIGH] CWE-416 CVE-2023-28744: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, versi A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into
cvelistv5nvd
CVE-2023-33876HIGHCVSS 8.8v12.1.2.153322023-07-19
CVE-2023-33876 [HIGH] CWE-416 CVE-2023-33876: A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15332 handles destroying annota A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15332 handles destroying annotations. Specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the mal
cvelistv5nvd
CVE-2023-27379HIGHCVSS 8.8v12.1.2.153322023-07-19
CVE-2023-27379 [HIGH] CWE-416 CVE-2023-27379: A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, versi A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the m
cvelistv5nvd
CVE-2023-32664HIGHCVSS 7.8v12.1.2.153322023-07-19
CVE-2023-32664 [HIGH] CWE-843 CVE-2023-32664: A type confusion vulnerability exists in the Javascript checkThisBox method as implemented in Foxit A type confusion vulnerability exists in the Javascript checkThisBox method as implemented in Foxit Reader 12.1.2.15332. Specially crafted Javascript code inside a malicious PDF document can cause memory corruption and lead to remote code execution. User would need to open a malicious file to trigger the vulnerability.
cvelistv5nvd
1 / 13Next →