Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Foxit Software Inc. | pdfonline.foxit.com | before 2025‑12‑01 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-13941 | 8.8 HIGH | Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation |
| CVE-2025-66495 | 7.8 HIGH | Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability |
| CVE-2025-66493 | 7.8 HIGH | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability |
| CVE-2025-66494 | 7.8 HIGH | Foxit PDF Reader PDF File Parsing Use-After-Free Remote Code Execution Vulnerability |
| CVE-2025-66499 | 7.8 HIGH | Foxit PDF Reader PDF Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerabilit |
| CVE-2025-66500 | 6.3 MEDIUM | Foxit webplugins.foxit.com Stored Cross-Site Scripting via postMessage Vulnerability |
| CVE-2025-66501 | 6.3 MEDIUM | Foxit pdfonline.foxit.com Stored Cross-Site Scripting in eSign Predefined Text Feature |
| CVE-2025-66521 | 6.3 MEDIUM | Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature |
| CVE-2025-66502 | 6.3 MEDIUM | Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Page Templates Feature |
| CVE-2025-66519 | 6.3 MEDIUM | Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Layer Import Functionality |
| CVE-2025-66522 | 6.3 MEDIUM | Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field |
| CVE-2025-66497 | 5.3 MEDIUM | Foxit PDF Reader 3D Annotation Out-of-Bounds Memory Access Vulnerability |
| CVE-2025-66496 | 5.3 MEDIUM | Foxit PDF Reader 3D Annotation Out-of-Bounds Memory Access Vulnerability |
| CVE-2025-66498 | 5.3 MEDIUM | Foxit PDF Reader 3D Annotation Out-of-Bounds Memory Access Vulnerability |
No comments yet