7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
21.3%
Multiple vulnerabilities were found in Foxit PDF Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
Security updates available in Foxit PDF Reader 2024.1 and Foxit PDF Editor 2024.1
CVE-2024-25858 warning
CVE-2024-30328 warning
CVE-2024-30322 warning
CVE-2024-30333 warning
CVE-2024-30350 warning
CVE-2024-30346 warning
CVE-2024-30352 warning
CVE-2024-30366 warning
CVE-2024-30358 warning
CVE-2024-30323 warning
CVE-2024-30362 warning
CVE-2024-30325 warning
CVE-2024-30357 warning
CVE-2024-30344 warning
CVE-2024-30327 warning
CVE-2024-30339 warning
CVE-2024-30337 warning
CVE-2024-30329 warning
CVE-2024-30347 warning
CVE-2024-30351 warning
CVE-2024-30334 warning
CVE-2024-30367 warning
CVE-2024-30326 warning
CVE-2024-30335 warning
CVE-2024-30345 warning
CVE-2024-30341 warning
CVE-2024-30336 warning
CVE-2024-30338 warning
CVE-2024-30324 warning
CVE-2024-30371 warning
CVE-2024-30365 warning
CVE-2024-30343 warning
CVE-2024-30354 warning
CVE-2024-30349 warning
CVE-2024-30340 warning
CVE-2024-30330 warning
CVE-2024-30359 warning
CVE-2024-30355 warning
CVE-2024-30348 warning
CVE-2024-30363 warning
CVE-2024-30332 warning
CVE-2024-30356 warning
CVE-2024-30364 warning
CVE-2024-30353 warning
CVE-2024-30360 warning
CVE-2024-30331 warning
CVE-2024-30361 warning
CVE-2024-30342 warning
CVE-2024-32488 warning
Update to the latest version
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
21.3%