mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-01 11:10:36 +00:00
19 lines
933 B
Markdown
19 lines
933 B
Markdown
![]() |
### [CVE-2018-3941](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3941)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's Foxit PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0608
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xCyberY/CVE-T4PDF
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
|