A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.4.37651. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: talos
Published: 2021-08-05T20:07:26
Updated: 2024-08-03T18:23:29.544Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21870
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-08-05T21:15:10.780
Modified: 2024-11-21T05:49:08.837
Link: CVE-2021-21870
Redhat
No data.