CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
74.7%
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor 11.1.1.53537;. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within JavaScript optimizations. The issue results from an improper optimization, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16733.
Vendor | Product | Version | CPE |
---|---|---|---|
foxit | pdf_editor | * | cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:* |
foxit | pdf_editor | 12.0.0.12394 | cpe:2.3:a:foxit:pdf_editor:12.0.0.12394:*:*:*:*:*:*:* |
foxit | pdf_reader | * | cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:* |
microsoft | windows | - | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
[
{
"vendor": "Foxit",
"product": "PDF Editor",
"versions": [
{
"version": "11.1.1.53537;",
"status": "affected"
}
]
}
]