First published: Mon Aug 29 2022(Updated: )
Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit PDF Editor | >=11.0<11.1 | |
Foxit PDF Reader | >=11.0<11.1 | |
Foxit PhantomPDF | <10.1.6 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-41781.
The severity of this vulnerability is high (7.8).
Foxit PDF Reader versions before 11.1, Foxit PDF Editor versions before 11.1, and Foxit PhantomPDF versions before 10.1.6 are affected by this vulnerability.
This vulnerability allows attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled.
No, Microsoft Windows is not affected by this vulnerability.
You can find more information about this vulnerability in the official security bulletins released by Foxit at: [https://www.foxit.com/support/security-bulletins.html]