### [CVE-2018-3842](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3842) ![](https://img.shields.io/static/v1?label=Product&message=Foxit&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20of%20Uninitialized%20Variable&color=brighgreen) ### Description An exploitable use of an uninitialized pointer vulnerability exists in the JavaScript engine in Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can lead to a dereference of an uninitialized pointer which, if under attacker control, can result in arbitrary code execution. An attacker needs to trick the user to open a malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xCyberY/CVE-T4PDF - https://github.com/ARPSyndicate/cvemon