cvelist/2020/11xxx/CVE-2020-11493.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-04-02 19:01:20 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-09-04 04:01:28 +00:00
"ID": "CVE-2020-11493",
"STATE": "PUBLIC"
2020-04-02 19:01:20 +00:00
},
2020-09-04 04:01:28 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-04-02 19:01:20 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-09-04 04:01:28 +00:00
"value": "In Foxit Reader and PhantomPDF before 10.0.1, and PhantomPDF before 9.7.3, attackers can obtain sensitive information about an uninitialized object because of direct transformation from PDF Object to Stream without concern for a crafted XObject."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.foxitsoftware.com/support/security-bulletins.php",
"refsource": "MISC",
"name": "https://www.foxitsoftware.com/support/security-bulletins.php"
2020-04-02 19:01:20 +00:00
}
]
}
}