Heap-based Buffer Overflow in VeryDOC PDF Viewer ActiveX Control
CVE-2008-5492

Currently unrated

Key Information:

Vendor

VeryPDF

Vendor
CVE Published:
12 December 2008

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 70%

What is CVE-2008-5492?

The VeryDOC PDF Viewer OCX Control includes a vulnerable ActiveX control, pdfview.ocx, which is susceptible to a heap-based buffer overflow attack. This vulnerability occurs due to insufficient validation of user input when the OpenPDF method is called with an excessively long first argument. Attackers can leverage this flaw to execute arbitrary code on affected systems, posing significant risks to users who interact with malicious PDF files.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

70% chance of being exploited in the next 30 days.

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.