By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
Change History 5 change records found show changes CPE Deprecation Remap by NIST 11/27/2024 3:11:45 PM Action Type Old Value New Value Changed CPE ConfigurationOR *cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:* versions from (excluding) 9.5.366.0
OR *cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:* versions from (excluding) 9.5.366.0CVE Modified by CVE 11/21/2024 2:24:53 AM Action Type Old Value New Value Added Reference
https://www.tracker-software.com/product/pdf-xchange-editor/historyAdded Reference
https://www.zerodayinitiative.com/advisories/ZDI-22-1333/CVE Modified by Zero Day Initiative 5/14/2024 7:34:40 AM Action Type Old Value New Value Initial Analysis by NIST 1/27/2023 3:28:11 PM Action Type Old Value New Value Added CVSS V3.1
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NAdded CWE
NIST CWE-125Added CPE Configuration
OR *cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:* versions up to (excluding) 9.5.366.0Changed Reference Type
https://www.tracker-software.com/product/pdf-xchange-editor/history No Types Assigned
https://www.tracker-software.com/product/pdf-xchange-editor/history Vendor AdvisoryChanged Reference Type
https://www.zerodayinitiative.com/advisories/ZDI-22-1333/ No Types Assigned
https://www.zerodayinitiative.com/advisories/ZDI-22-1333/ Third Party Advisory, VDB EntryCVE Modified by Zero Day Initiative 1/26/2023 4:17:11 PM Action Type Old Value New Value Changed Description Record truncated, showing 500 of 556 characters.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. Crafted data in an XPS file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code iRecord truncated, showing 500 of 555 characters.
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. Crafted data in an XPS file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.3