mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-14 23:28:04 +02:00
19 lines
1017 B
Markdown
19 lines
1017 B
Markdown
### [CVE-2018-3850](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3850)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
An exploitable use-after-free vulnerability exists in the JavaScript engine Foxit Software Foxit PDF Reader version 9.0.1.1049. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If a browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0532
|
|
|
|
#### Github
|
|
- https://github.com/0xCyberY/CVE-T4PDF
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
|