Логотип exploitDog
bind:CVE-2023-35985
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-35985

Количество 3

Количество 3

nvd логотип

CVE-2023-35985

около 2 лет назад

An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-9gj5-q54r-hcpr

около 2 лет назад

An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2024-01223

около 2 лет назад

Уязвимость компонента exportDataObject API программы для просмотра текста Foxit Reader, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-35985

An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-9gj5-q54r-hcpr

An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-01223

Уязвимость компонента exportDataObject API программы для просмотра текста Foxit Reader, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу