Логотип exploitDog
bind:CVE-2023-41257
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-41257

Количество 3

Количество 3

nvd логотип

CVE-2023-41257

около 2 лет назад

A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-79r8-2qh7-xqp4

около 2 лет назад

A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-08377

около 2 лет назад

Уязвимость программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader (ранее Foxit Reader), связанная с переполнением буфера на основе кучи, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-41257

A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
github логотип
GHSA-79r8-2qh7-xqp4

A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.

CVSS3: 8.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-08377

Уязвимость программы для просмотра электронных документов в стандарте PDF Foxit PDF Reader (ранее Foxit Reader), связанная с переполнением буфера на основе кучи, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу