First published: Mon Aug 29 2022(Updated: )
Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Editor | >=11.0<11.1 | |
Foxit PDF Reader | >=11.0<11.1 | |
Foxit PhantomPDF | <10.1.6 | |
Microsoft Windows | ||
All of | ||
Any of | ||
Foxit PDF Editor | >=11.0<11.1 | |
Foxit PDF Reader | >=11.0<11.1 | |
Foxit PhantomPDF | <10.1.6 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41780 is a vulnerability in Foxit PDF Reader, PDF Editor, and PhantomPDF that allows attackers to trigger a use-after-free and execute arbitrary code.
CVE-2021-41780 allows attackers to trigger a use-after-free vulnerability in Foxit PDF Reader, PDF Editor, and PhantomPDF, which can lead to arbitrary code execution.
The severity of CVE-2021-41780 is high with a CVSSv3 score of 7.8.
To fix CVE-2021-41780, it is recommended to update Foxit PDF Reader, PDF Editor, and PhantomPDF to version 11.1 for PDF Reader and PDF Editor, and version 10.1.6 for PhantomPDF. Additionally, make sure to apply any security patches provided by the vendor.
For more information about CVE-2021-41780, you can refer to the Foxit security bulletins available at the following link: [https://www.foxit.com/support/security-bulletins.html](https://www.foxit.com/support/security-bulletins.html)