Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jrcm-4657-67wp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

Out-of-Bounds read vulnerability in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to execute arbitrary code via a crafted BMP image embedded in the XFA stream in a PDF document, aka "Data from Faulting Address may be used as a return value starting at FOXITREADER."

Out-of-Bounds read vulnerability in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to execute arbitrary code via a crafted BMP image embedded in the XFA stream in a PDF document, aka "Data from Faulting Address may be used as a return value starting at FOXITREADER."

EPSS

Процентиль: 58%
0.00361
Низкий

8.8 High

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 8.8
nvd
больше 9 лет назад

Out-of-Bounds read vulnerability in Foxit Reader and PhantomPDF before 8.1 on Windows, when the gflags app is enabled, allows remote attackers to execute arbitrary code via a crafted BMP image embedded in the XFA stream in a PDF document, aka "Data from Faulting Address may be used as a return value starting at FOXITREADER."

EPSS

Процентиль: 58%
0.00361
Низкий

8.8 High

CVSS3

Дефекты

CWE-125