Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5q58-xhg6-989p

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.3

Описание

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the CreationDate property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the CreationDate property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

EPSS

Процентиль: 44%
0.0022
Низкий

7.3 High

CVSS3

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 7.3
nvd
больше 7 лет назад

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A use-after-free condition can occur when accessing the CreationDate property of the this.info object. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.

EPSS

Процентиль: 44%
0.0022
Низкий

7.3 High

CVSS3

Дефекты

CWE-416