Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.foxit.com/support/security-bulletins.html |
|
Wed, 29 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxit
Foxit pdf Editor Foxit pdf Reader |
|
| CPEs | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Foxit
Foxit pdf Editor Foxit pdf Reader |
Tue, 28 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
|
| Vendors & Products |
Foxitsoftware
Foxitsoftware foxit Pdf Editor Foxitsoftware foxit Reader |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 27 Apr 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insufficient parameter verification leads to the occurrence of format errors in files, which will trigger an unhandled "std::invalid_argument" exception, ultimately causing the program to terminate. | |
| Title | Foxit PDF Editor/Reader's insufficient parameter validation leads to denial-of-service vulnerability | |
| Weaknesses | CWE-248 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Foxit
Published:
Updated: 2026-04-27T13:42:51.578Z
Reserved: 2026-04-09T03:42:03.943Z
Link: CVE-2026-5937
Updated: 2026-04-27T13:40:16.406Z
Status : Analyzed
Published: 2026-04-27T12:16:24.030
Modified: 2026-04-29T17:31:29.453
Link: CVE-2026-5937
No data.
OpenCVE Enrichment
Updated: 2026-04-28T20:00:19Z