Loading HuntDB...

GHSA-3g9x-fmvg-62j2

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

PDF-XChange Editor PDF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20887.

Related CVEs

Key Information

GHSA ID
GHSA-3g9x-fmvg-62j2
Published
May 3, 2024 3:31 AM
Last Modified
May 3, 2024 3:31 AM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: September 11, 2025 6:35 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.