![]() This is a low severity flaw and received a CVSS score of 3.8/10. No CVE key: A format string error when the util.printf function cannot handle the format extension properly would allow threat actors to create specially designed files to access sensitive information. ![]() No CVE key: A boundary error when converting PDF files would allow threat actors to create specially designed files to trigger an out-of-bounds write on the target system. The flaw received a CVSS score of 7.7/10. ![]() No CVE key: A boundary error when processing JPEG2000 images in PDF files would allow threat actors to use specially crafted documents to execute arbitrary code on the affected system. This flaw received a CVSS score of 7.7/10. ![]() The flaw received a CVSS score of 7.7/10 and its successful exploitation would allow threat actors to fully compromise the affected system.ĬVE-2021-41783: A boundary error when processing PDF files would allow threat actors to use specially designed documents to execute arbitrary code on affected systems.ĬVE-2021-41785: A boundary error when processing PDF files would allow threat actors to use specially crafted documents to generate memory corruption of the affected system. The vulnerability received a CVSS score of 7.7/10.ĬVE-2021-41782: A boundary error when processing PDF files would allow threat actors to cause memory corruption using specially crafted PDF documents. This is a high severity flaw and received a CVSS score of 7.7/10 because successful exploitation could lead to total compromise of the vulnerable system.ĬVE-2021-41784: A boundary error when processing PDF files would allow threat actors to create specially designed files to generate corruption in the memory of the target system and execute arbitrary code. This vulnerability received a CVSS score of 5.7/10.ĬVE-2021-41781: A boundary error when processing PDF files would allow malicious hackers to create specially crafted documents capable of executing arbitrary code on the affected system. CVE-2021-40326: Improper verification of digital signatures on PDF files would allow hackers to create legitimate-looking malicious files in the form of a signed PDF.
0 Comments
Leave a Reply. |