The launchURL function in PDF-XChange Viewer 2.5 (Build 314.0) might allow remote attackers to execute arbitrary code via a crafted PDF file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/143912/PDF-XChange-Viewer-2.5-Build-314.0-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/143912/PDF-XChange-Viewer-2.5-Build-314.0-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/143912/PDF-XChange-Viewer-2.5-Build-314.0-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-12-27 17:29
Updated : 2024-11-21 03:10
NVD link : CVE-2017-13056
Mitre link : CVE-2017-13056
CVE.ORG link : CVE-2017-13056
JSON object : View
Products Affected
tracker-software
- pdf-xchange_viewer
CWE
CWE-20
Improper Input Validation