Browse all 34 CVE security advisories affecting Foxit Software Inc.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Foxit Software Inc. develops PDF viewing and editing tools widely used in enterprise environments for document management and collaboration. The company’s software has historically been associated with thirty-four recorded Common Vulnerabilities and Exposures, primarily stemming from its complex PDF parsing engine. These vulnerabilities frequently involve remote code execution, buffer overflows, and cross-site scripting, allowing attackers to compromise system integrity or execute arbitrary commands through maliciously crafted documents. Notable security characteristics include the software’s deep integration into Windows systems, which amplifies the impact of privilege escalation flaws. While no single catastrophic incident has defined the company’s public record, the consistent pattern of memory corruption bugs highlights challenges in maintaining robust input validation across diverse document formats. This ongoing vulnerability landscape necessitates rigorous patch management for organizations relying on Foxit’s suite for critical document workflows.
This page lists every published CVE security advisory associated with Foxit Software Inc.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.