3 results (0.008 seconds)

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a reference to a timeout object to be stored in two different places. When closed, the document will result in the reference being released twice. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1266 • CWE-415: Double Free •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable use-after-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause an object containing the path to a document to be destroyed and then later reused, resulting in a use-after-free vulnerability, which can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger this vulnerability. Se presenta una vulnerabilidad explotable de uso de memoria previamente liberada en la implementación de JavaScript de Nitro Pro PDF. Un documento especialmente diseñado puede causar la destrucción de un objeto que contiene la ruta de acceso a un documento y su posterior reuso, resultando en una vulnerabilidad de uso de memoria previamente liberada, que puede conllevar a una ejecución de código bajo el contexto de la aplicación. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1265 • CWE-416: Use After Free •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF. A specially crafted document can cause a stack variable to go out of scope, resulting in the application dereferencing a stale pointer. This can lead to code execution under the context of the application. An attacker can convince a user to open a document to trigger the vulnerability. Se presenta una vulnerabilidad explotable de retorno de dirección de variable de pila en la implementación de JavaScript de Nitro Pro PDF. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1267 • CWE-562: Return of Stack Variable Address •