Foxit PDF Reader Remote Code Execution Vulnerability
CVE-2024-30333

7.8HIGH

Key Information:

Vendor

Foxit

Vendor
CVE Published:
3 April 2024

What is CVE-2024-30333?

Foxit PDF Reader is affected by a use-after-free vulnerability that arises during the handling of Doc objects. This flaw can be exploited by remote attackers who can execute arbitrary code on systems where the vulnerable versions of Foxit PDF Reader are installed. User interaction is necessary, as the targeted victim must either access a malicious webpage or open a specifically crafted file that triggers the exploit. Due to the inadequate validation of object existence, attackers can manipulate the application's behavior, allowing unauthorized actions within the security context of the current process linked to the PDF reader.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

PDF Reader 2023.2.0.21408

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

.