
It may be suggested to replace the affected object with an alternative product. There is no information about possible countermeasures known. The current price for an exploit might be approx. There are neither technical details nor an exploit publicly available. Successful exploitation requires user interaction by the victim. This vulnerability is handled as CVE-2023-27329 since. Impacted is confidentiality, integrity, and availability.


Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code. Using CWE to declare the problem leads to CWE-416. The manipulation with an unknown input leads to a use after free vulnerability. Affected by this issue is some unknown functionality of the component Annotation Handler. If those are important to you, then Foxit. Overall, it’s a fairly basic PDF reader with some added functionality for annotation and security. It also has a few security features, like password protection and document encryption. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability was found in Foxit PDF Reader ( Document Reader Software) ( affected version not known). Conclusion paragraph: Foxit Reader is a PDF reader that allows you to annotate and edit PDFs. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time.

Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks. In this section, you can download user manuals in PDF format for each product listed below.
