Foxit PDF Reader print Method Use of Externally-Controlled Format String Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the implementation of the print method. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14849.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Aug 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Foxit pdf Editor
Microsoft Microsoft windows |
|
CPEs | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:11.0.0.49893:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_editor:11.0.1.49938:*:*:*:*:*:*:* cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Foxit pdf Editor
Microsoft Microsoft windows |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-04T00:26:55.785Z
Reserved: 2021-06-17T19:27:05.657Z
Link: CVE-2021-34970

Updated: 2024-08-04T00:26:55.785Z

Status : Analyzed
Published: 2024-05-07T23:15:11.797
Modified: 2025-08-13T15:59:00.297
Link: CVE-2021-34970

No data.