First published: Thu Sep 17 2020(Updated: )
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gonitro Nitro Pro | =13.13.2.242 | |
Gonitro Nitro Pro | =13.16.2.300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-6115 is high.
Gonitro Nitro Pro versions 13.13.2.242 and 13.16.2.300 are affected by CVE-2020-6115.
CVE-2020-6115 allows an attacker to save a reference to a malformed document, leading to a cross-reference table repairing vulnerability in Nitro Pro.
Yes, Nitro Software, Inc. has released a patch to address the vulnerability. Please update to the latest version of Nitro Pro to fix CVE-2020-6115.
More information about CVE-2020-6115 can be found at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068](https://talosintelligence.com/vulnerability_reports/TALOS-2020-1068)