![]() ![]() This can lead to code execution under the context of the application. When closed, the document will result in the reference being released twice. A specially crafted document can cause a reference to a timeout object to be stored in two different places. An attacker can convince a user to open a document to trigger the vulnerability.Īn exploitable double-free vulnerability exists in the JavaScript implementation of Nitro Pro PDF. ![]() ![]() A specially crafted document can cause a stack variable to go out of scope, resulting in the application dereferencing a stale pointer. An exploitable return of stack variable address vulnerability exists in the JavaScript implementation of Nitro Pro PDF. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |