An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path.
References
Link | Resource |
---|---|
https://github.com/hxxt9049/futing | Third Party Advisory |
https://www.foxitsoftware.cn/support/security-bulletins.html | Vendor Advisory |
https://www.foxitsoftware.com/support/security-bulletins.php | Not Applicable Vendor Advisory |
Configurations
History
15 Nov 2022, 14:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.foxitsoftware.com/support/security-bulletins.php - Not Applicable, Vendor Advisory | |
References | (MISC) https://github.com/hxxt9049/futing - Third Party Advisory | |
References | (MISC) https://www.foxitsoftware.cn/support/security-bulletins.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Foxitsoftware foxit Reader
Foxitsoftware |
|
CWE | CWE-427 |
09 Nov 2022, 21:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-09 21:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-43310
Mitre link : CVE-2022-43310
CVE.ORG link : CVE-2022-43310
JSON object : View
Products Affected
foxitsoftware
- foxit_reader
CWE
CWE-427
Uncontrolled Search Path Element