A potential memory vulnerability due to insufficient input validation in PDFXEditCore.x64.dll in PDF-XChange Editor version 9.3 by Tracker Software may allow attackers to execute code when a user opens a crafted PDF file. The issue occurs when handling a large number of objects in a PDF file.
References
Link | Resource |
---|---|
https://www.sit.fraunhofer.de/cve-2023-24308/ | Third Party Advisory |
https://www.sit.fraunhofer.de/cve-2023-24308/ | Third Party Advisory |
Configurations
History
27 Nov 2024, 20:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3:*:*:*:*:*:*:* | |
First Time |
Pdf-xchange pdf-xchange Editor
Pdf-xchange |
21 Nov 2024, 07:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.sit.fraunhofer.de/cve-2023-24308/ - Third Party Advisory |
Information
Published : 2023-03-28 21:15
Updated : 2025-02-19 16:15
NVD link : CVE-2023-24308
Mitre link : CVE-2023-24308
CVE.ORG link : CVE-2023-24308
JSON object : View
Products Affected
pdf-xchange
- pdf-xchange_editor
CWE
CWE-755
Improper Handling of Exceptional Conditions