A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.3.37598. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: talos
Published: 2021-05-10T15:02:51
Updated: 2024-08-03T18:23:29.522Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21822
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-05-10T16:15:07.447
Modified: 2024-11-21T05:49:02.730
Link: CVE-2021-21822
Redhat
No data.