CVE-2013-10068
Foxit Reader <= 5.4.5.0114 Plugin URL Processing Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Foxit Reader Plugin version 2.2.1.530, bundled with Foxit Reader 5.4.4.11281, contains a stack-based buffer overflow vulnerability in the npFoxitReaderPlugin.dll module. When a PDF file is loaded from a remote host, an overly long query string in the URL can overflow a buffer, allowing remote attackers to execute arbitrary code.
| CWE | CWE-121 |
| Vendor | foxit |
| Product | foxit reader |
| Published | Aug 5, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for foxit foxit reader
Be the first to know when new unknown vulnerabilities affecting foxit foxit reader are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Foxit / Foxit Reader
* โค 5.4.5.0114
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/browser/foxit_reader_plugin_url_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/23944 exploit-db.com: https://www.exploit-db.com/exploits/24502 tenable.com: https://www.tenable.com/plugins/nessus/64094 vulncheck.com: https://www.vulncheck.com/advisories/foxit-reader-plugin-url-processing-buffer-overflow
Credits
rgod