Use-After-Free Vulnerability in Foxit PDF Reader Software
CVE-2018-3965
8HIGH
Summary
An exploitable use-after-free vulnerability in the JavaScript engine of Foxit Software's Foxit PDF Reader allows attackers to execute arbitrary code by tricking users into opening specially crafted PDF files. This could occur through direct file interaction or via a browser extension when visiting compromised websites.
Affected Version(s)
Foxit PDF Reader 9.1.0.5096
References
EPSS Score
16% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved