This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Foxitsoftware First view 2018-04-23
Product Foxit Reader Last view 2022-11-09
Version 9.0.1 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:foxitsoftware:foxit_reader

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.8 2022-11-09 CVE-2022-43310

An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path.

9.8 2021-08-11 CVE-2021-38574

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows SQL Injection via crafted data at the end of a string.

9.8 2021-08-11 CVE-2021-38573

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows writing to arbitrary files because a CombineFiles pathname is not validated.

9.8 2021-08-11 CVE-2021-38572

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows writing to arbitrary files because the extractPages pathname is not validated.

7.8 2021-08-11 CVE-2021-38571

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows DLL hijacking, aka CNVD-C-2021-68000 and CNVD-C-2021-68502.

9.1 2021-08-11 CVE-2021-38570

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows attackers to delete arbitrary files (during uninstallation) via a symlink.

7.5 2021-08-11 CVE-2021-38569

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows stack consumption via recursive function calls during the handling of XFA forms or link objects.

9.8 2021-08-11 CVE-2021-38568

An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows memory corruption during conversion of a PDF document to a different document format.

9.1 2021-08-11 CVE-2021-33794

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 allow information disclosure or an application crash after mishandling the Tab key during XFA form interaction.

9.8 2021-08-11 CVE-2021-33793

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write because the Cross-Reference table is mishandled during Office document conversion.

5.5 2021-07-09 CVE-2021-33795

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 produce incorrect PDF document signatures because the certificate name, document owner, and signature author are mishandled.

7.8 2021-07-09 CVE-2021-33792

Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write via a crafted /Size key in the Trailer dictionary.

7.8 2021-06-16 CVE-2021-31476

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA templates. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13531.

7.8 2021-05-07 CVE-2021-31455

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13100.

7.8 2021-05-07 CVE-2021-31454

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Decimal element. A crafted leadDigits value in a Decimal element can trigger an overflow of a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Was ZDI-CAN-13095.

7.8 2021-05-07 CVE-2021-31453

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13092.

7.8 2021-05-07 CVE-2021-31452

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13091.

7.8 2021-05-07 CVE-2021-31451

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13089.

7.8 2021-05-07 CVE-2021-31450

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13084.

7.8 2021-05-07 CVE-2021-31449

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13280.

3.3 2021-05-07 CVE-2021-31448

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13273.

3.3 2021-05-07 CVE-2021-31447

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13269.

3.3 2021-05-07 CVE-2021-31446

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13245.

3.3 2021-05-07 CVE-2021-31445

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13244.

3.3 2021-05-07 CVE-2021-31444

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13241.

CWE : Common Weakness Enumeration

%idName
33% (83) CWE-416 Use After Free
22% (56) CWE-704 Incorrect Type Conversion or Cast
17% (44) CWE-125 Out-of-bounds Read
10% (25) CWE-787 Out-of-bounds Write
2% (7) CWE-200 Information Exposure
2% (7) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
1% (4) CWE-476 NULL Pointer Dereference
1% (4) CWE-20 Improper Input Validation
1% (3) CWE-674 Uncontrolled Recursion
1% (3) CWE-427 Uncontrolled Search Path Element
0% (2) CWE-732 Incorrect Permission Assignment for Critical Resource
0% (2) CWE-190 Integer Overflow or Wraparound
0% (1) CWE-755 Improper Handling of Exceptional Conditions
0% (1) CWE-754 Improper Check for Unusual or Exceptional Conditions
0% (1) CWE-415 Double Free
0% (1) CWE-122 Heap-based Buffer Overflow
0% (1) CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('...
0% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')
0% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

Snort® IPS/IDS

Date Description
2018-11-27 Foxit PDF Reader JavaScript annotations use after free attempt
RuleID : 48227 - Type : FILE-PDF - Revision : 1
2018-11-27 Foxit PDF Reader JavaScript annotations use after free attempt
RuleID : 48226 - Type : FILE-PDF - Revision : 1
2018-11-10 Foxit Reader text annotations use after free attempt
RuleID : 48113 - Type : FILE-PDF - Revision : 1
2018-11-10 Foxit Reader uninitialized pointer leak attempt
RuleID : 48112 - Type : FILE-PDF - Revision : 1
2018-11-10 Foxit Reader text annotations use after free attempt
RuleID : 48111 - Type : FILE-PDF - Revision : 1
2018-11-10 Foxit Reader uninitialized pointer leak attempt
RuleID : 48110 - Type : FILE-PDF - Revision : 1
2020-12-05 TRUFFLEHUNTER TALOS-2018-0606 attack attempt
RuleID : 46865 - Type : FILE-PDF - Revision : 7
2020-12-05 TRUFFLEHUNTER TALOS-2018-0606 attack attempt
RuleID : 46864 - Type : FILE-PDF - Revision : 7
2020-12-05 TRUFFLEHUNTER TALOS-2018-0588 attack attempt
RuleID : 46458 - Type : FILE-PDF - Revision : 1
2020-12-05 TRUFFLEHUNTER TALOS-2018-0588 attack attempt
RuleID : 46457 - Type : FILE-PDF - Revision : 1

Nessus® Vulnerability Scanner

id Description
2018-12-21 Name: A PDF toolkit installed on the remote Windows host is affected by multiple vu...
File: foxit_phantom_8_3_6.nasl - Type: ACT_GATHER_INFO
2018-12-21 Name: A PDF toolkit installed on the remote Windows host is affected by multiple vu...
File: foxit_phantom_9_1_0.nasl - Type: ACT_GATHER_INFO
2018-08-22 Name: A PDF viewer installed on the remote Windows host is affected by multiple vul...
File: foxit_reader_8_3_7.nasl - Type: ACT_GATHER_INFO
2018-07-27 Name: A PDF toolkit installed on the remote Windows host is affected by multiple vu...
File: foxit_phantom_9_2.nasl - Type: ACT_GATHER_INFO
2018-07-27 Name: A PDF viewer installed on the remote Windows host is affected by multiple vul...
File: foxit_reader_9_2.nasl - Type: ACT_GATHER_INFO
2018-04-27 Name: A PDF toolkit installed on the remote Windows host is affected by multiple vu...
File: foxit_phantom_9_1_0_5096.nasl - Type: ACT_GATHER_INFO
2018-04-27 Name: A PDF viewer installed on the remote Windows host is affected by multiple vul...
File: foxit_reader_9_1_0_5096.nasl - Type: ACT_GATHER_INFO