Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
Tue, 14 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos Foxit Foxit pdf Editor Foxit pdf Reader Microsoft Microsoft windows |
|
| CPEs | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apple
Apple macos Foxit Foxit pdf Editor Foxit pdf Reader Microsoft Microsoft windows |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
|
| Vendors & Products |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution. | |
| Title | Use after free of view cache in Foxit PDF Editor/Reader | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Foxit
Published:
Updated: 2026-04-02T02:12:55.076Z
Reserved: 2026-03-08T03:43:24.941Z
Link: CVE-2026-3777
Updated: 2026-04-01T14:19:06.703Z
Status : Analyzed
Published: 2026-04-01T02:16:02.737
Modified: 2026-04-14T17:54:52.200
Link: CVE-2026-3777
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:45:09Z