Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Foxit PDF Editor transitionToState Use-After-Free Remote Code Execution Vulnerability
Vulnerability Description
Foxit PDF Editor transitionToState Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the implementation of the transitionToState method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14370.
CVSS Information
N/A
Vulnerability Type
释放后使用
Vulnerability Title
Foxit PDF Editor 缓冲区错误漏洞
Vulnerability Description
Foxit PDF Editor是中国福昕(Foxit)公司的一款PDF编辑器。 Foxit PDF Editor 中存在缓冲区错误漏洞,该漏洞源于产品transitionToState方法的实现中没有验证对象的存在性。攻击者诱导用户打开恶意文件或恶意页面后可通过该漏洞导致恶意代码执行。
CVSS Information
N/A
Vulnerability Type
N/A