Логотип exploitDog
bind:CVE-2021-21797
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-21797

Количество 2

Количество 2

nvd логотип

CVE-2021-21797

больше 4 лет назад

An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.

CVSS3: 7.8
EPSS: Высокий
github логотип

GHSA-5676-7chm-gxvm

больше 3 лет назад

An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.

CVSS3: 7.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-21797

An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.

CVSS3: 7.8
73%
Высокий
больше 4 лет назад
github логотип
GHSA-5676-7chm-gxvm

An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability.

CVSS3: 7.8
73%
Высокий
больше 3 лет назад

Уязвимостей на страницу