Lucene search

K
cvelistTalosCVELIST:CVE-2021-21822
HistoryMay 10, 2021 - 3:02 p.m.

CVE-2021-21822

2021-05-1015:02:51
CWE-416
talos
www.cve.org
6
vulnerability
pdf reader
arbitrary code execution
javascript engine
memory reuse

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.007

Percentile

80.2%

A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.3.37598. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled.

CNA Affected

[
  {
    "product": "Foxit",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Foxit Reader 10.1.3.37598"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.007

Percentile

80.2%

Related for CVELIST:CVE-2021-21822