Auto-Update: 2024-11-27T21:01:06.385665+00:00

This commit is contained in:
cad-safe-bot 2024-11-27 21:04:18 +00:00
parent a08f5141e4
commit e46b29d1dd
146 changed files with 9168 additions and 1915 deletions

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-10100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T18:15:07.873",
"lastModified": "2024-05-17T01:03:08.010",
"lastModified": "2024-11-27T20:19:36.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -13,32 +13,14 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -46,12 +28,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -61,13 +61,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
@ -83,7 +83,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -101,9 +101,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.11",
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8"
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE"
}
]
}
@ -140,6 +140,36 @@
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://github.com/wp-plugins/dynamic-widgets/commit/d0a19c6efcdc86d7093b369bc9e29a0629e57795",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wp-plugins/dynamic-widgets/releases/tag/1.5.11",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.225353",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.225353",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-9436",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-26T02:15:10.537",
"lastModified": "2019-09-26T15:51:20.680",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:19:36.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -45,13 +45,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.11",
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8"
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE"
}
]
}
@ -118,6 +118,30 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/dynamic-widgets/#developers",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://wpvulndb.com/vulnerabilities/8258",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-9437",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-26T02:15:10.600",
"lastModified": "2019-09-26T15:16:13.963",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:19:36.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
@ -45,13 +45,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.11",
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8"
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE"
}
]
}
@ -118,6 +118,30 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/dynamic-widgets/#developers",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://wpvulndb.com/vulnerabilities/8258",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2017-13316",
"sourceIdentifier": "security@android.com",
"published": "2024-11-27T20:15:22.363",
"lastModified": "2024-11-27T20:15:22.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In checkPermissions of RecognitionService.java, there is a possible\u00a0permissions bypass due to a missing permission check. This could lead to\u00a0local escalation of privilege with no additional execution privileges\u00a0needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2018-05-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2017-13319",
"sourceIdentifier": "security@android.com",
"published": "2024-11-27T20:15:22.493",
"lastModified": "2024-11-27T20:15:22.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In pvmp3_get_main_data_size of pvmp3_get_main_data_size.cpp, there is a\u00a0possible buffer overread due to a missing bounds check. This could lead to\u00a0remote information disclosure of global static variables with no additional\u00a0execution privileges needed. User interaction is not needed for\u00a0exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01",
"source": "security@android.com"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2018-16303",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-09-01T14:29:00.387",
"lastModified": "2024-11-21T03:52:29.743",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndIncluding": "7.0.326.1",
"matchCriteriaId": "E2C6464F-3822-4876-95AB-282E01F37CD1"
"matchCriteriaId": "482A6952-AB23-4BAB-B018-578559B69C4A"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-18689",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-07T18:15:12.560",
"lastModified": "2021-01-15T17:07:25.060",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
@ -45,13 +45,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -80,17 +80,6 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
},
{
"operator": "OR",
"negate": false,
@ -145,6 +134,16 @@
"criteria": "cpe:2.3:a:iskysoft:pdfelement6:6.8.4.3921:*:*:*:professional:*:*:*",
"matchCriteriaId": "950C35B2-1B7F-495F-9947-0E992329954B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:7.0.237.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7E887CBD-BF50-4E3E-B44F-04B8FC5502B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:7.0.326:*:*:*:*:*:*:*",
"matchCriteriaId": "96BE2F3E-A319-4743-85C9-CF2653DDA258"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pdfforge:pdf_architect:6.0.37:*:*:*:*:*:*:*",
@ -200,16 +199,6 @@
"criteria": "cpe:2.3:a:soft-xpansion:perfect_pdf_reader:13.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E808A140-D375-4BE2-9EF1-4A17634ADAC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:7.0.237.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2A959-1E6D-4255-B57F-BF66351EF6E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:7.0.326:*:*:*:*:*:*:*",
"matchCriteriaId": "BD74AF39-AE51-4767-B30E-BF1D320710EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_viewer:2.5:*:*:*:*:*:*:*",
@ -221,23 +210,23 @@
"matchCriteriaId": "14B07BD4-0FC3-4471-B58B-2ADBA36B08D6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
},
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -288,23 +277,23 @@
"matchCriteriaId": "C0F12D65-A39B-4F36-A219-1AEDD968C9D9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
}
]
},
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
@ -335,6 +324,17 @@
"matchCriteriaId": "C0F12D65-A39B-4F36-A219-1AEDD968C9D9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
]
}
@ -367,6 +367,34 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://pdf-insecurity.org/signature/evaluation_2018.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://pdf-insecurity.org/signature/signature.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.foxitsoftware.com/support/security-bulletins.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.pdfa.org/recently-identified-pdf-digital-signature-vulnerabilities/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-19440",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-01-30T15:29:05.973",
"lastModified": "2020-11-18T17:12:32.440",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:03:20.203",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
@ -45,13 +45,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:trusted_firmware-a:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:arm:trusted_firmware-a:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0",
"matchCriteriaId": "CA2A9B97-496E-4AE8-8D28-1E78417FFB0E"
"matchCriteriaId": "5379645A-328B-4B0A-86A7-546472D7A3E2"
}
]
}
@ -110,6 +110,22 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ARM-software/arm-trusted-firmware/pull/1710",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/ARM-software/arm-trusted-firmware/wiki/Trusted-Firmware-A-Security-Advisory-TFV-8",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2019-17497",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-10-11T00:15:10.537",
"lastModified": "2024-11-21T04:32:22.713",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.0.330.0",
"matchCriteriaId": "C4E8A247-74B2-44B7-A802-8BE0B369B3A8"
"matchCriteriaId": "376E07A1-E3FB-491B-9C53-0BC6C68E825B"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2021-43619",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-01T05:15:07.803",
"lastModified": "2024-11-21T06:29:31.750",
"lastModified": "2024-11-27T20:03:20.203",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -84,13 +85,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:trusted_firmware-m:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E3C409-82C3-4CD5-8387-B8C9D9A1C978"
"criteria": "cpe:2.3:o:arm:trusted_firmware-m:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7466A0E8-A066-4C75-8CC2-4EB8C8D6E36B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:trusted_firmware-m:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "276E2878-F82E-43CF-B94A-96A54D32E015"
"criteria": "cpe:2.3:o:arm:trusted_firmware-m:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "479959C0-3840-4C14-B549-8DD38078FD63"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37349",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.023",
"lastModified": "2023-04-05T18:09:38.780",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1076/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37350",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.113",
"lastModified": "2023-04-05T18:09:25.287",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1078/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37351",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.200",
"lastModified": "2023-04-05T18:09:08.923",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1079/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37352",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.293",
"lastModified": "2023-04-05T18:00:10.263",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -59,8 +59,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -69,8 +69,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -112,6 +112,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1080/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37353",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.373",
"lastModified": "2023-04-05T17:59:46.797",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1081/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37354",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.500",
"lastModified": "2023-04-05T17:59:19.943",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1082/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37355",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.593",
"lastModified": "2023-04-05T17:59:05.757",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1083/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37356",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.683",
"lastModified": "2023-04-05T17:58:48.503",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1084/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37357",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.760",
"lastModified": "2023-04-05T17:58:08.890",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1085/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37358",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.833",
"lastModified": "2023-04-05T17:57:45.320",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1086/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37359",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:13.917",
"lastModified": "2023-04-05T17:43:53.300",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1087/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37360",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.010",
"lastModified": "2023-04-05T17:42:39.713",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -101,6 +101,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1088/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37361",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.090",
"lastModified": "2023-04-05T17:41:54.960",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -101,6 +101,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1089/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37362",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.177",
"lastModified": "2023-04-05T17:41:10.380",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1090/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37363",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.263",
"lastModified": "2023-04-05T18:14:08.263",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1091/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37364",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.347",
"lastModified": "2023-04-05T18:13:53.540",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -59,8 +59,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -69,8 +69,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -112,6 +112,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1092/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37365",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.437",
"lastModified": "2023-04-05T18:13:27.387",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1093/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37366",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.517",
"lastModified": "2023-04-05T18:12:46.287",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -101,6 +101,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1094/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37367",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.600",
"lastModified": "2023-04-05T18:13:05.467",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1095/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37368",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.713",
"lastModified": "2023-04-05T18:12:31.757",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1096/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37369",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.857",
"lastModified": "2023-04-05T18:12:16.523",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1097/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37370",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:14.957",
"lastModified": "2023-04-05T18:12:01.260",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1098/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37371",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:15.047",
"lastModified": "2023-04-05T18:11:45.617",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -59,8 +59,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -69,8 +69,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -88,8 +88,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -112,6 +112,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1099/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37372",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:15.117",
"lastModified": "2023-04-05T18:11:30.140",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1100/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37373",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:15.207",
"lastModified": "2023-04-05T18:11:14.207",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1101/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37374",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:15.297",
"lastModified": "2023-04-05T18:10:56.917",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1102/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-37375",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-03-29T19:15:15.470",
"lastModified": "2023-04-05T18:10:37.077",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -41,6 +41,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -48,9 +50,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -60,7 +60,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -78,8 +78,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A56D8687-A78A-499D-AEAC-531217C5D7BC"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.3.361.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B2868B-DC97-4D56-977D-3E755285DAAD"
}
]
}
@ -102,6 +102,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1103/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41143",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:53.953",
"lastModified": "2023-02-01T14:44:37.730",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1329/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41144",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.030",
"lastModified": "2023-02-01T14:44:58.347",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1334/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41145",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.103",
"lastModified": "2023-02-01T15:02:05.810",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1335/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41146",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.173",
"lastModified": "2023-02-01T15:01:50.347",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1336/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41147",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.267",
"lastModified": "2023-02-01T14:45:18.790",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1337/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41148",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.340",
"lastModified": "2023-02-01T14:45:29.167",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1345/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41149",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.410",
"lastModified": "2023-02-01T14:46:32.443",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1346/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41150",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.483",
"lastModified": "2023-02-01T14:51:46.923",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1347/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41151",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.560",
"lastModified": "2023-02-01T14:46:48.033",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1348/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41152",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.633",
"lastModified": "2023-02-01T14:41:28.860",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1349/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41153",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.707",
"lastModified": "2023-02-01T15:01:37.730",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1350/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42369",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.777",
"lastModified": "2023-02-01T15:00:56.607",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1351/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42370",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.850",
"lastModified": "2023-02-01T14:46:57.310",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1352/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42371",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.920",
"lastModified": "2023-02-01T14:47:11.767",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1353/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42372",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:54.990",
"lastModified": "2023-02-01T14:43:19.113",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1354/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42373",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.060",
"lastModified": "2023-02-01T14:49:31.690",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1360/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42374",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.133",
"lastModified": "2023-02-01T14:20:35.393",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1361/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42375",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.203",
"lastModified": "2023-02-01T15:00:35.223",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1362/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42376",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.270",
"lastModified": "2023-02-01T15:00:25.423",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1363/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42377",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.340",
"lastModified": "2023-06-27T14:04:27.247",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -62,16 +62,6 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -81,6 +71,16 @@
"value": "CWE-119"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1367/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42378",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.410",
"lastModified": "2023-02-01T14:49:44.073",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1368/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42379",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.477",
"lastModified": "2023-02-01T14:44:05.263",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1370/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42380",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.547",
"lastModified": "2023-02-01T14:50:12.783",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1371/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42381",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.617",
"lastModified": "2023-02-01T14:51:00.927",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1372/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42382",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.690",
"lastModified": "2023-02-01T14:51:34.473",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1373/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42383",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.760",
"lastModified": "2023-02-01T14:52:37.257",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1374/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42384",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.827",
"lastModified": "2023-02-01T14:52:13.077",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1375/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42385",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.897",
"lastModified": "2023-02-01T14:52:02.177",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1376/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42386",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:55.967",
"lastModified": "2023-01-27T19:21:23.950",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1377/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42387",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.037",
"lastModified": "2023-01-27T19:21:46.903",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1378/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42388",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.103",
"lastModified": "2023-01-27T19:22:26.543",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1379/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42389",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.213",
"lastModified": "2023-01-27T19:22:10.580",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1380/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42390",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.320",
"lastModified": "2023-01-27T19:08:29.333",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1381/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42391",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.393",
"lastModified": "2023-01-27T19:36:31.707",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1382/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42392",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.467",
"lastModified": "2023-01-27T19:36:42.503",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1383/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42393",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.537",
"lastModified": "2023-01-27T19:36:57.037",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1384/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42394",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.630",
"lastModified": "2023-01-27T19:24:18.097",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1392/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42395",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.727",
"lastModified": "2023-01-27T19:30:07.140",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1331/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42396",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.797",
"lastModified": "2023-01-27T19:30:27.790",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -62,16 +62,6 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -81,6 +71,16 @@
"value": "CWE-822"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1332/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42397",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.870",
"lastModified": "2023-01-27T20:28:11.787",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1333/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42398",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:56.940",
"lastModified": "2023-01-27T20:27:56.830",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1339/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42399",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.010",
"lastModified": "2023-01-27T20:18:56.960",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1343/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42400",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.077",
"lastModified": "2023-01-27T20:18:49.380",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1344/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42401",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.143",
"lastModified": "2023-01-27T20:04:27.943",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1364/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42402",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.210",
"lastModified": "2023-01-27T19:56:44.663",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1369/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42403",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.277",
"lastModified": "2023-01-27T20:29:50.297",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -62,16 +62,6 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -81,6 +71,16 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1391/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42404",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.350",
"lastModified": "2023-01-27T20:29:40.767",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1330/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42405",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.417",
"lastModified": "2023-01-27T20:29:31.483",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -62,16 +62,6 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -81,6 +71,16 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1357/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42406",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.487",
"lastModified": "2023-01-27T20:29:19.293",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1359/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42407",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.557",
"lastModified": "2023-01-27T20:28:59.247",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1365/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42408",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.623",
"lastModified": "2023-01-28T03:48:20.970",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -118,6 +118,23 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1366/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42409",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.690",
"lastModified": "2023-01-28T03:43:51.720",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1340/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42410",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.760",
"lastModified": "2023-01-28T03:43:29.823",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1355/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42411",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.830",
"lastModified": "2023-01-27T19:09:22.330",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1338/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42412",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.900",
"lastModified": "2023-01-27T19:09:34.087",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1341/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42413",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:57.970",
"lastModified": "2023-01-27T19:09:48.540",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -116,6 +116,21 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1358/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42414",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:58.037",
"lastModified": "2023-01-28T03:47:54.147",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -117,6 +117,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1342/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42415",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:58.107",
"lastModified": "2023-01-28T03:47:37.987",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -117,6 +117,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1356/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42416",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:58.173",
"lastModified": "2023-01-28T03:46:58.067",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -117,6 +117,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1385/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42417",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:58.240",
"lastModified": "2023-01-28T03:46:36.037",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -117,6 +117,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1386/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42418",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:58.307",
"lastModified": "2023-07-10T17:46:43.260",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -62,16 +62,6 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
@ -81,6 +71,16 @@
"value": "CWE-822"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -117,6 +117,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1387/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42419",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2023-01-26T18:59:58.380",
"lastModified": "2023-01-28T03:49:20.237",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:11:45.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -52,9 +54,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,8 +63,8 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,8 +73,8 @@
]
},
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -92,9 +92,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tracker-software:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.5.366.0",
"matchCriteriaId": "2662AD29-098E-4AA9-B04B-0A9157068952"
"matchCriteriaId": "FE9DD26D-B14E-4EB3-8698-3E0E82F2177A"
}
]
}
@ -117,6 +117,22 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tracker-software.com/product/pdf-xchange-editor/history",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1389/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

Some files were not shown because too many files have changed in this diff Show More