
Cloud Vulnerability DB
A community-led vulnerabilities database
Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, were affected by a security vulnerability discovered in September 2021. The vulnerability allows attackers to trigger a use-after-free condition and potentially execute arbitrary code through mishandled JavaScript (MITRE CVE).
The vulnerability is classified as a use-after-free condition that occurs when JavaScript is mishandled in the affected Foxit software versions. This type of vulnerability typically happens when a program continues to use a pointer after it has been freed, which can lead to program crashes or potential code execution (MITRE CVE).
The vulnerability could allow attackers to execute arbitrary code on affected systems, potentially leading to complete system compromise. The use-after-free condition could be exploited to crash the application or execute malicious code with the privileges of the user running the application (MITRE CVE).
Users should update to Foxit PDF Reader 11.1 or later, Foxit PDF Editor 11.1 or later, or PhantomPDF 10.1.6 or later to address this vulnerability. The fix is available through the official Foxit security bulletin (Foxit Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."