Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-114v-k7y4-vuev
Summary
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22800.
Aliases
0
alias CVE-2024-30352
Fixed_packages
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-30352
reference_id
reference_type
scores
0
value 0.02223
scoring_system epss
scoring_elements 0.84511
published_at 2026-04-13T12:55:00Z
1
value 0.02223
scoring_system epss
scoring_elements 0.84496
published_at 2026-04-08T12:55:00Z
2
value 0.02223
scoring_system epss
scoring_elements 0.84502
published_at 2026-04-09T12:55:00Z
3
value 0.02223
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-11T12:55:00Z
4
value 0.02223
scoring_system epss
scoring_elements 0.84515
published_at 2026-04-12T12:55:00Z
5
value 0.02223
scoring_system epss
scoring_elements 0.84453
published_at 2026-04-02T12:55:00Z
6
value 0.02223
scoring_system epss
scoring_elements 0.84472
published_at 2026-04-04T12:55:00Z
7
value 0.02223
scoring_system epss
scoring_elements 0.84474
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-30352
1
reference_url https://www.foxit.com/support/security-bulletins.html
reference_id security-bulletins.html
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-03T13:19:53Z/
url https://www.foxit.com/support/security-bulletins.html
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-24-335/
reference_id ZDI-24-335
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-03T13:19:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-24-335/
Weaknesses
0
cwe_id 416
name Use After Free
description Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Exploits
Severity_range_score7.8 - 7.8
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-114v-k7y4-vuev