Логотип exploitDog
bind:CVE-2023-27363
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-27363

Количество 3

Количество 3

nvd логотип

CVE-2023-27363

почти 2 года назад

Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportXFAData method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-19697.

CVSS3: 7.8
EPSS: Высокий
github логотип

GHSA-phwf-pmc2-5cx4

почти 2 года назад

Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportXFAData method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-19697.

CVSS3: 7.8
EPSS: Высокий
fstec логотип

BDU:2023-02843

около 3 лет назад

Уязвимость метода exportXFAData программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader (ранее Foxit Reader) и программы редактирования PDF-файлов Foxit PDF Editor (ранее Foxit PhantomPDF), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-27363

Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportXFAData method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-19697.

CVSS3: 7.8
81%
Высокий
почти 2 года назад
github логотип
GHSA-phwf-pmc2-5cx4

Foxit PDF Reader exportXFAData Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportXFAData method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-19697.

CVSS3: 7.8
81%
Высокий
почти 2 года назад
fstec логотип
BDU:2023-02843

Уязвимость метода exportXFAData программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader (ранее Foxit Reader) и программы редактирования PDF-файлов Foxit PDF Editor (ранее Foxit PhantomPDF), позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
81%
Высокий
около 3 лет назад

Уязвимостей на страницу