In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.
References
Link | Resource |
---|---|
https://www.foxitsoftware.com/support/security-bulletins.php | Vendor Advisory |
https://www.foxitsoftware.com/support/security-bulletins.php | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.foxitsoftware.com/support/security-bulletins.php - Vendor Advisory |
Information
Published : 2020-09-04 04:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11493
Mitre link : CVE-2020-11493
CVE.ORG link : CVE-2020-11493
JSON object : View
Products Affected
foxitsoftware
- phantompdf
- reader
microsoft
- windows
CWE
CWE-345
Insufficient Verification of Data Authenticity