First published: Wed Nov 09 2022(Updated: )
An Uncontrolled Search Path Element in Foxit Software released Foxit Reader v11.2.118.51569 allows attackers to escalate privileges when searching for DLL libraries without specifying an absolute path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Foxit Reader | <11.2.118.51569 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Foxit Reader vulnerability is CVE-2022-43310.
The severity rating of CVE-2022-43310 is high with a value of 7.8.
Foxit Reader version 11.2.118.51569 is affected by CVE-2022-43310.
Attackers can exploit CVE-2022-43310 by escalating privileges when searching for DLL libraries without specifying an absolute path.
Yes, you can find references and more information about CVE-2022-43310 in the following links: [GitHub](https://github.com/hxxt9049/futing), [Foxit Software Security Bulletins](https://www.foxitsoftware.cn/support/security-bulletins.html), [Foxit Software Security Bulletins](https://www.foxitsoftware.com/support/security-bulletins.php).