Use-after-free vulnerability in Foxit Reader and Foxit PhantomPDF - CVE-2020-13548ID: oval:org.secpod.oval:def:68069 | Date: (C)2021-01-04 (M)2023-10-18 |
Class: VULNERABILITY | Family: windows |
The host is installed with Foxit Reader through 10.1.0.37527 or Foxit PhantomPDF before 9.7.5 or 10.x through 10.1.0.37527 and is prone to a use-after-free vulnerability. A flaw is present in the applications which fails to properly handle access or use of pointer or object that has been removed after calling certain JavaScript functions. Successful exploitation allow attackers to cause arbitrary code execution.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Foxit Phantom |
Foxit Reader |