Use after free vulnerability in Foxit PDF Reader and Foxit PDF Editor - CVE-2023-33876ID: oval:org.secpod.oval:def:91348 | Date: (C)2023-07-25 (M)2023-11-10 |
Class: VULNERABILITY | Family: windows |
The host is installed with Foxit PDF Reader through 12.1.2.15332 or Foxit PDF Editor through 10.1.12.37872 or 11.x through 11.2.6.53790 or 12.x through 12.1.2.15332 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to cause memory corruption and execute remote code.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Foxit PDF Reader |
Foxit PDF Editor |