VeryPDF 4.1 has a Memory Overflow leading to Code Execution because pdfocx!CxImageTIF::operator in pdfocx.ocx (used by pdfeditor.exe and pdfcmd.exe) is mishandled.
References
Link | Resource |
---|---|
https://www.vdalabs.com/2019/04/25/microsoft-security-risk-detection-0day-in-verypdf-reader-part-1/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-04-26 14:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-11493
Mitre link : CVE-2019-11493
CVE.ORG link : CVE-2019-11493
JSON object : View
Products Affected
verypdf
- verypdf
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer