July 19, 2023, 2:15 p.m. |

National Vulnerability Database web.nvd.nist.gov

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension …

code code execution corruption cve document engine file foxit free javascript malicious memory memory corruption pdf pdf reader reader reuse software trigger use-after-free version vulnerability

Enterprise Threat Intel Analyst

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

IT Security Engineer III

@ Mitsubishi Heavy Industries | Houston, TX, US, 77046

Cyber Intelligence Vice President, Threat Intelligence

@ JPMorgan Chase & Co. | Singapore, Singapore

Assistant Manager, Digital Forensics

@ Interpath Advisory | Manchester, England, United Kingdom

Tier 3 - Forensic Analyst, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

Incident Response, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States