mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
19 lines
1017 B
Markdown
19 lines
1017 B
Markdown
![]() |
### [CVE-2018-3850](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3850)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An exploitable use-after-free vulnerability exists in the JavaScript engine Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If a browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0532
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xCyberY/CVE-T4PDF
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
|