Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Foxit Software Inc.
  4. Foxit PDF Editor for Mac (formerly PhantomPDF)
  5. 4.1.1.1123

Known Vulnerabilities in Foxit PDF Editor for Mac (formerly PhantomPDF) 4.1.1.1123

Show more ↓
2024.4.0.66473
2024.3.0.65538
2024.2.3.64402
2024.2.2.64388
2024.2.1.64379
2024.2.0.64371
2024.1.0.63682
2023.3.0.63083
2023.2.0.61611
2023.1.0.55583
13.1.5.63001
13.1.4.62748
13.1.2.62201
13.1.1.62190
13.1.0.62175
13.0.1.61866
13.0.0.61829
12.1.7.55606
12.1.6.55574
12.1.5.55449
12.1.4.55444
12.1.3.55436
12.1.2.55366
12.1.1.55342
12.1.0.1229
12.0.2.1028
12.0.1.0720
12.0.0.0601
11.1.11.1202
11.1.10.1010
11.1.9.0524
11.1.8.0513
11.1.7.0418
11.1.6.0109
11.1.5.0913
11.1.4.1121
11.1.3.0920
11.1.2.0420
11.1.1.0126
11.1.1.0119
11.1.0.0925
11.0.1.0917
11.0.1.0719
11.0.0.0510
4.1.3.0129
4.1.1.1123
4.1.0.0926
4.0.0.0430
3.4.0.1012
3.3.0.0709
3.2.0.0404
3.1.0.0111
3.0.1.1116
3.0.0.0818



Spoofing attack in Foxit PhantomPDF and Foxit Reader for Mac02 Feb, 2021
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Kosovo man extradited to US for running BlackDB.cc criminal marketplace
  • Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products
  • Chinese hackers exploit SAP NetWeaver in cyber campaigns targeting critical infrastructure
  • Chinese-speaking Earth Ammit APT linked to espionage campaigns targeting Taiwan and South Korea
  • Moldovan authorities arrest suspect tied to DoppelPaymer ransomware attacks
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.