CVE-2011-10030
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-08-22
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| foxit | pdf_reader | 4.3.1.0218 |
| foxit | pdf_reader | 4.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-73 | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Foxit PDF Reader versions before 4.3.1.0218, where a JavaScript API function called createDataObject() allows untrusted PDF content to write arbitrary files anywhere on the disk. An attacker can embed a malicious PDF that uses this API to drop executables or scripts into privileged folders, potentially leading to code execution when the system boots or the user logs in.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary code on your system by placing malicious executables or scripts in privileged locations. This can lead to unauthorized control over your system, potentially compromising system integrity, confidentiality, and availability.