Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

PDF-XChange — Vulnerabilities & Security Advisories 280

Browse all 280 CVE security advisories affecting PDF-XChange. AI-powered Chinese analysis, POCs, and references for each vulnerability.

PDF-XChange is a widely used document management suite primarily designed for viewing, editing, and annotating PDF files across Windows environments. Despite its utility, the software has accumulated approximately 280 Common Vulnerabilities and Exposures (CVEs), reflecting a significant historical security debt. The majority of these flaws involve remote code execution (RCE) and buffer overflow vulnerabilities, often triggered by malformed or maliciously crafted PDF documents. Additionally, instances of cross-site scripting (XSS) and privilege escalation have been documented, allowing attackers to bypass security controls or execute arbitrary code with elevated permissions. While no single catastrophic incident has defined the product’s public history, the sheer volume of disclosed vulnerabilities indicates persistent issues in input validation and memory management. Users are advised to maintain strict patching schedules to mitigate these known risks associated with the application’s parsing engine.

Top products by PDF-XChange: PDF-XChange Editor
CVE IDTitleCVSSSeverityPublished
CVE-2023-42083 PDF-XChange Editor JPG File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — PDF-XChange EditorCWE-122 7.8 -2024-05-03
CVE-2023-42081 PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42082 PDF-XChange Editor JPG File Parsing Use-After-Free Remote Code Execution Vulnerability — PDF-XChange EditorCWE-416 7.8 -2024-05-03
CVE-2023-42080 PDF-XChange Editor EMF File Parsing Use-After-Free Remote Code Execution Vulnerability — PDF-XChange EditorCWE-416 7.8 -2024-05-03
CVE-2023-42079 PDF-XChange Editor J2K File Parsing Uninitialized Variable Information Disclosure Vulnerability — PDF-XChange EditorCWE-457 5.5 -2024-05-03
CVE-2023-42078 PDF-XChange Editor JP2 File Parsing Memory Corruption Remote Code Execution Vulnerability — PDF-XChange EditorCWE-119 7.8 -2024-05-03
CVE-2023-42077 PDF-XChange Editor EMF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — PDF-XChange EditorCWE-122 7.8 -2024-05-03
CVE-2023-42076 PDF-XChange Editor PDF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — PDF-XChange EditorCWE-122 7.8 -2024-05-03
CVE-2023-42075 PDF-XChange Editor JPG File Parsing Use-After-Free Remote Code Execution Vulnerability — PDF-XChange EditorCWE-416 7.8 -2024-05-03
CVE-2023-42073 PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42074 PDF-XChange Editor addScript Type Confusion Remote Code Execution Vulnerability — PDF-XChange EditorCWE-843 7.8 -2024-05-03
CVE-2023-42072 PDF-XChange Editor JPC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42071 PDF-XChange Editor PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability — PDF-XChange EditorCWE-787 7.8 -2024-05-03
CVE-2023-42070 PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42069 PDF-XChange Editor PDF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability — PDF-XChange EditorCWE-121 7.8 -2024-05-03
CVE-2023-42068 PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42067 PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42065 PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42066 PDF-XChange Editor J2K File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03
CVE-2023-42064 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability — PDF-XChange EditorCWE-125 7.8 -2024-05-03
CVE-2023-42063 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability — PDF-XChange EditorCWE-125 7.8 -2024-05-03
CVE-2023-42061 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability — PDF-XChange EditorCWE-125 7.8 -2024-05-03
CVE-2023-42062 PDF-XChange Editor U3D File Parsing Uninitialized Variable Remote Code Execution Vulnerability — PDF-XChange EditorCWE-457 7.8 -2024-05-03
CVE-2023-42060 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability — PDF-XChange EditorCWE-125 7.8 -2024-05-03
CVE-2023-42059 PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability — PDF-XChange EditorCWE-416 7.8 -2024-05-03
CVE-2023-42058 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability — PDF-XChange EditorCWE-125 7.8 -2024-05-03
CVE-2023-42057 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability — PDF-XChange EditorCWE-125 7.8 -2024-05-03
CVE-2023-42056 PDF-XChange Editor U3D File Parsing Uninitialized Variable Information Disclosure Vulnerability — PDF-XChange EditorCWE-457 5.5 -2024-05-03
CVE-2023-42055 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability — PDF-XChange EditorCWE-125 7.8 -2024-05-03
CVE-2023-42054 PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability — PDF-XChange EditorCWE-125 5.5 -2024-05-03

This page lists every published CVE security advisory associated with PDF-XChange. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.