Логотип exploitDog
bind:CVE-2020-11493
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-11493

Количество 2

Количество 2

nvd логотип

CVE-2020-11493

больше 5 лет назад

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-3qpg-r423-v8v2

больше 3 лет назад

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-11493

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.

CVSS3: 8.1
0%
Низкий
больше 5 лет назад
github логотип
GHSA-3qpg-r423-v8v2

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу