An exploitable use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 9.1.0.5096. A specially crafted PDF document can trigger a previously freed object in memory to be reused, resulting in arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability.
| Software | From | Fixed in |
|---|---|---|
| foxitsoftware / phantompdf | - | 9.2.0.9297.x |
| foxitsoftware / reader | - | 9.2.0.9297.x |