{"api_version":"1","generated_at":"2026-04-23T21:01:02+00:00","cve":"CVE-2018-20248","urls":{"html":"https://cve.report/CVE-2018-20248","api":"https://cve.report/api/cve/CVE-2018-20248.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-20248","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-20248"},"summary":{"title":"CVE-2018-20248","description":"In Foxit Quick PDF Library (all versions prior to 16.12), issue where loading a malformed or malicious PDF containing invalid xref table pointers or invalid xref table data using the LoadFromFile, LoadFromString, LoadFromStream, DAOpenFile or DAOpenFileReadOnly functions may result in an access violation caused by out of bounds memory access.","state":"PUBLIC","assigner":"cve@checkpoint.com","published_at":"2018-12-24 18:29:00","updated_at":"2019-10-09 23:39:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://www.foxitsoftware.com/support/security-bulletins.php","name":"https://www.foxitsoftware.com/support/security-bulletins.php","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Security Bulletins | Foxit Software","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/106306","name":"106306","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Foxit Quick PDF Library Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-20248","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20248","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"20248","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"foxitsoftware","cpe5":"quick_pdf_library","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"20248","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"foxitsoftware","cpe5":"quick_pdf_library","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@checkpoint.com","ID":"CVE-2018-20248","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Foxit Quick PDF Library","version":{"version_data":[{"version_value":"All versions prior to 16.12"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Foxit Quick PDF Library (all versions prior to 16.12), issue where loading a malformed or malicious PDF containing invalid xref table pointers or invalid xref table data using the LoadFromFile, LoadFromString, LoadFromStream, DAOpenFile or DAOpenFileReadOnly functions may result in an access violation caused by out of bounds memory access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-787: Out-of-bounds Write (3.1)"}]}]},"references":{"reference_data":[{"name":"106306","refsource":"BID","url":"http://www.securityfocus.com/bid/106306"},{"name":"https://www.foxitsoftware.com/support/security-bulletins.php","refsource":"CONFIRM","url":"https://www.foxitsoftware.com/support/security-bulletins.php"}]}},"nvd":{"publishedDate":"2018-12-24 18:29:00","lastModifiedDate":"2019-10-09 23:39:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:foxitsoftware:quick_pdf_library:*:*:*:*:*:*:*:*","versionEndExcluding":"16.12","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"20248","Ordinal":"140530","Title":"CVE-2018-20248","CVE":"CVE-2018-20248","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"20248","Ordinal":"1","NoteData":"In Foxit Quick PDF Library (all versions prior to 16.12), issue where loading a malformed or malicious PDF containing invalid xref table pointers or invalid xref table data using the LoadFromFile, LoadFromString, LoadFromStream, DAOpenFile or DAOpenFileReadOnly functions may result in an access violation caused by out of bounds memory access.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"20248","Ordinal":"2","NoteData":"2018-12-24","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"20248","Ordinal":"3","NoteData":"2018-12-26","Type":"Other","Title":"Modified"}]}}}