A command injection can occur for specially crafted PDF files in Foxit Reader SDK (ActiveX) Professional 5.4.0.1031 when the JavaScript API app.launchURL is used. An attacker can leverage this to gain remote code execution.
References
Link | Resource |
---|---|
https://www.foxitsoftware.com/support/security-bulletins.php | Patch Vendor Advisory |
https://www.foxitsoftware.com/support/security-bulletins.php | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.foxitsoftware.com/support/security-bulletins.php - Patch, Vendor Advisory |
Information
Published : 2019-06-17 20:15
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19445
Mitre link : CVE-2018-19445
CVE.ORG link : CVE-2018-19445
JSON object : View
Products Affected
foxitsoftware
- foxit_pdf_sdk_activex
microsoft
- windows
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')