Nov. 21, 2022, 4:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.0.1.12430. By prematurely destroying annotation objects, a specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.

cve cve-2022-38097

Technical Product Manager, Electronic Warfare - Active Clearance

@ Anduril | Costa Mesa, California, United States

Specialist Operations and Support/ Entry Professional - IT Security, Cyber Security & Governance

@ Norsk Hydro | Jaipur, IN

Embedded Software Engineer, Electronic Warfare

@ Anduril | Costa Mesa, California, United States

Cyber Security Analyst

@ Peraton | Chantilly, VA, United States

Principal Consultant, Proactive Security - Unit 42

@ Palo Alto Networks | Sydney, Australia

Penetration Tester Consultant

@ RSI Security | United States - Remote