1 results (0.004 seconds)

CVSS: 10.0EPSS: 66%CPEs: 1EXPL: 2

Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action. Desbordamiento de búfer basado en pila en Foxit Reader v3.0 anteriores a Build 1506, incluidas la 1120 y la 1301, permite a atacantes remotos ejecutar código arbitrario a través de (1)una ruta relativa larga o (2)una ruta absoluta larga en el argumento "filename" en una acción, como se demostró mediante la acción "Abrir/Ejecutar un fichero". • https://www.exploit-db.com/exploits/8201 https://www.exploit-db.com/exploits/18905 http://secunia.com/advisories/34036 http://www.coresecurity.com/content/foxit-reader-vulnerabilities http://www.foxitsoftware.com/pdf/reader/security.htm#Stackbased http://www.securityfocus.com/archive/1/501623/100/0/threaded http://www.securityfocus.com/bid/34035 http://www.securitytracker.com/id?1021824 http://www.vupen.com/english/advisories/2009/0634 https://exchange.xforce.ibmcloud.com/vulnerabilitie • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •