CVE-2020-11493

In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*
cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-04 04:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-11493

Mitre link : CVE-2020-11493

CVE.ORG link : CVE-2020-11493


JSON object : View

Products Affected

microsoft

  • windows

foxitsoftware

  • phantompdf
  • reader
CWE
CWE-345

Insufficient Verification of Data Authenticity