Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Foxit Software Inc. | Foxit PDF Editor | Versions 2025.3 and earlier | - | |
| Foxit Software Inc. | Foxit PDF Reader | Versions 2025.3 and earlier | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-3779 | 7.8 HIGH | Foxit PDF Editor/Reader List Box Calculate Array Use-After-Free Vulnerability |
| CVE-2026-3780 | 7.3 HIGH | Foxit PDF Editor/Reader Installer Uncontrolled Search Path Privilege Escalation |
| CVE-2026-4947 | 7.1 HIGH | Insecure Direct Object Reference (IDOR) Leading to Signature Forgery in Foxit eSign |
| CVE-2026-3778 | 6.2 MEDIUM | Stack exhaustion caused by cyclic references in Foxit PDF Editor/Reader |
| CVE-2026-3776 | 5.5 MEDIUM | Null pointer dereference in Foxit PDF Editor/Reader when accessing stamp annotation |
| CVE-2026-3777 | 5.5 MEDIUM | Use after free of view cache in Foxit PDF Editor/Reader |
| CVE-2026-3774 | 4.7 MEDIUM | Self-Modifications Affecting Altered Printing and Redaction in Foxit PDF Editor |
No comments yet