CVE-2026-3777 in PDF Editor
要約 (英語)
The application does not properly validate the lifetime and validity of internal view cache pointers after JavaScript changes the document zoom and page state. When a script modifies the zoom property and then triggers a page change, the original view object may be destroyed while stale pointers are still kept and later dereferenced, which under crafted JavaScript and document structures can lead to a use-after-free condition and potentially allow arbitrary code execution.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
責任者
Foxit
予約する
2026年03月08日
公開
2026年04月01日
ステータス
確認済み
エントリ
VulDB provides additional information and datapoints for this CVE:
| 識別子 | 脆弱性 | CWE | 悪用可 | 対策 | CVE |
|---|---|---|---|---|---|
| 354540 | Foxit PDF Editor/PDF Reader JavaScript メモリ破損 | 416 | 未定義 | 未定義 | CVE-2026-3777 |