Lucene search

K

6 matches found

CVE
CVE
added 2019/10/09 9:15 p.m.79 views

CVE-2019-5053

An exploitable use-after-free vulnerability exists in the Length parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use-after-free condition. An attacker can craft a malicious PDF to trigger this vulnerability.

7.8CVSS7.5AI score0.00012EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.78 views

CVE-2019-5046

A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malic...

8.8CVSS7.9AI score0.00051EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.76 views

CVE-2019-5047

An exploitable Use After Free vulnerability exists in the CharProcs parsing functionality of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a Use After Free. An attacker can craft a malicious PDF to trigger this vulnerability.

7.8CVSS7.5AI score0.00012EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.74 views

CVE-2019-5045

A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malic...

8.8CVSS7.9AI score0.00051EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.71 views

CVE-2019-5048

A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

8.8CVSS7.9AI score0.00181EPSS
CVE
CVE
added 2019/10/09 9:15 p.m.67 views

CVE-2019-5050

A specifically crafted PDF file can lead to a heap corruption when opened in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.

8.8CVSS7.9AI score0.0015EPSS