Логотип exploitDog
bind:CVE-2023-33866
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-33866

Количество 3

Количество 3

nvd логотип

CVE-2023-33866

больше 2 лет назад

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-gwxm-q3h3-f3mv

больше 2 лет назад

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-04185

больше 2 лет назад

Уязвимость программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader (ранее Foxit Reader) и программы редактирования PDF-файлов Foxit PDF Editor (ранее Foxit PhantomPDF), позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-33866

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-gwxm-q3h3-f3mv

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 12.1.2.15332. By prematurely deleting objects associated with pages, a specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-04185

Уязвимость программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader (ранее Foxit Reader) и программы редактирования PDF-файлов Foxit PDF Editor (ранее Foxit PhantomPDF), позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу