Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rgqj-5wh6-ppp7

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.

EPSS

Процентиль: 67%
0.00527
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
больше 5 лет назад

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can execute arbitrary code via a heap-based buffer overflow because dirty image-resource data is mishandled.

EPSS

Процентиль: 67%
0.00527
Низкий