Логотип exploitDog
bind:CVE-2021-40420
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-40420

Количество 3

Количество 3

nvd логотип

CVE-2021-40420

около 4 лет назад

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-fp63-vpqm-jj5g

почти 4 года назад

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-00098

около 4 лет назад

Уязвимость обработчика JavaScript-сценариев программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-40420

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
1%
Низкий
около 4 лет назад
github логотип
GHSA-fp63-vpqm-jj5g

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
1%
Низкий
почти 4 года назад
fstec логотип
BDU:2023-00098

Уязвимость обработчика JavaScript-сценариев программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 8.8
1%
Низкий
около 4 лет назад

Уязвимостей на страницу