Логотип exploitDog
bind:CVE-2023-39495
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-39495

Количество 3

Количество 3

nvd логотип

CVE-2023-39495

почти 2 года назад

PDF-XChange Editor readFileIntoStream Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the readFileIntoStream method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-19657.

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-hqpm-5797-2gxf

почти 2 года назад

PDF-XChange Editor readFileIntoStream Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the readFileIntoStream method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-19657.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2023-06426

около 3 лет назад

Уязвимость метода readFileIntoStream программы просмотра и редактирования PDF документов PDF-XChange Editor, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-39495

PDF-XChange Editor readFileIntoStream Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the readFileIntoStream method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-19657.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-hqpm-5797-2gxf

PDF-XChange Editor readFileIntoStream Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the readFileIntoStream method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-19657.

CVSS3: 5.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-06426

Уязвимость метода readFileIntoStream программы просмотра и редактирования PDF документов PDF-XChange Editor, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.5
0%
Низкий
около 3 лет назад

Уязвимостей на страницу