Foxit Software Foxit Pdf Reader vulnerabilities

17 known vulnerabilities affecting foxit_software/foxit_pdf_reader.

Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH17

Vulnerabilities

Page 1 of 1
CVE-2010-20010HIGHCVSS 8.4≥ *, < 4.2.0.09282025-08-20
CVE-2010-20010 [HIGH] CWE-121 CVE-2010-20010: Foxit PDF Reader before 4.2.0.0928 does not properly bound-check the /Title entry in the PDF Info di Foxit PDF Reader before 4.2.0.0928 does not properly bound-check the /Title entry in the PDF Info dictionary. A specially crafted PDF with an overlong Title string can overflow a fixed-size stack buffer, corrupt the Structured Exception Handler (SEH) chain, and lead to arbitrary code execution in the context of the user who opens the file.
cvelistv5nvd
CVE-2011-10030HIGHCVSS 8.4≥ *, < 4.3.1.02182025-08-20
CVE-2011-10030 [HIGH] CWE-73 CVE-2011-10030: Foxit PDF Reader <  4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows un Foxit PDF Reader < 4.3.1.0218 exposes a JavaScript API function, createDataObject(), that allows untrusted PDF content to write arbitrary files anywhere on disk. By embedding a malicious PDF that calls this API, an attacker can drop executables or scripts into privileged folders, leading to code execution the next time the system boots or the user logs
cvelistv5nvd
CVE-2018-3997HIGHCVSS 8.8v9.2.0.92972018-10-08
CVE-2018-3997 [HIGH] CWE-416 CVE-2018-3997: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerab
cvelistv5nvd
CVE-2018-3992HIGHCVSS 8.8v9.2.0.92972018-10-08
CVE-2018-3992 [HIGH] CWE-416 CVE-2018-3992: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader, version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerab
cvelistv5nvd
CVE-2018-3945HIGHCVSS 8.8v9.1.0.50962018-10-08
CVE-2018-3945 [HIGH] CWE-416 CVE-2018-3945: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd
CVE-2018-3940HIGHCVSS 8.8v9.1.0.50962018-10-08
CVE-2018-3940 [HIGH] CWE-416 CVE-2018-3940: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused. An attacker needs to trick the user to open the malicious file to trigger.
cvelistv5nvd
CVE-2018-3941HIGHCVSS 8.8v9.1.0.50962018-10-08
CVE-2018-3941 [HIGH] CWE-416 CVE-2018-3941: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd
CVE-2018-3996HIGHCVSS 8.8v9.2.0.92972018-10-08
CVE-2018-3996 [HIGH] CWE-416 CVE-2018-3996: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
cvelistv5nvd
CVE-2018-3942HIGHCVSS 8.8v9.1.0.50962018-10-08
CVE-2018-3942 [HIGH] CWE-416 CVE-2018-3942: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
cvelistv5nvd
CVE-2018-3966HIGHCVSS 7.8v9.1.0.50962018-10-03
CVE-2018-3966 [HIGH] CWE-416 CVE-2018-3966: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd
CVE-2018-3967HIGHCVSS 7.8v9.1.0.50962018-10-03
CVE-2018-3967 [HIGH] CWE-416 CVE-2018-3967: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd
CVE-2018-3995HIGHCVSS 8.8v9.2.0.92972018-10-03
CVE-2018-3995 [HIGH] CWE-416 CVE-2018-3995: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
cvelistv5nvd
CVE-2018-3946HIGHCVSS 8.8v9.1.0.50962018-10-03
CVE-2018-3946 [HIGH] CWE-416 CVE-2018-3946: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. I
cvelistv5nvd
CVE-2018-3993HIGHCVSS 8.8v9.2.0.92972018-10-03
CVE-2018-3993 [HIGH] CWE-416 CVE-2018-3993: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd
CVE-2018-3965HIGHCVSS 7.8v9.1.0.50962018-10-03
CVE-2018-3965 [HIGH] CWE-416 CVE-2018-3965: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd
CVE-2018-3964HIGHCVSS 7.8v9.1.0.50962018-10-03
CVE-2018-3964 [HIGH] CWE-416 CVE-2018-3964: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd
CVE-2018-3994HIGHCVSS 8.8v9.2.0.92972018-10-03
CVE-2018-3994 [HIGH] CWE-416 CVE-2018-3994: An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxi An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.2.0.9297. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerabi
cvelistv5nvd