Description

A use-after-free vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a checkbox field object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

INFO

Published Date :

2024-10-02T20:51:44.661Z

Last Modified :

2025-09-23T14:17:01.678Z

Source :

talos
AFFECTED PRODUCTS

The following products are affected by CVE-2024-28888 vulnerability.

Vendors Products
Foxit
  • Pdf Reader
Foxitsoftware
  • Foxit Reader
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact