Foxit PDF Reader Remote Code Execution Exploit# CVE-2022-28672
[](https://twitter.com/HackSysTeam)
[](https://infosec.exchange/@hacksysteam)
[](https://discord.com/invite/ns32uNhaq7)
This bug was `Use after Free` caused by improper handling of javascript object memory references.
## Blog
- [Foxit PDF Reader - UaF - RCE - JIT Spraying](https://hacksys.io/blogs/foxit-reader-uaf-rce-jit-spraying-cve-2022-28672)
## Advisory
- [CVE-2022-28672](https://hacksys.io/advisories/HI-2022-002)
## Demo
[](https://www.youtube.com/watch?v=5K44TxWPKCQ)
[4.0K] /data/pocs/39cd9087da992a5fb2d726cc982bb4d1b1ad40a3
├── [7.6K] exploit.pdf
├── [ 34K] LICENSE
├── [5.3K] rce.js
└── [ 904] README.md
0 directories, 4 files