{"api_version":"1","generated_at":"2026-04-26T13:46:25+00:00","cve":"CVE-2018-3956","urls":{"html":"https://cve.report/CVE-2018-3956","api":"https://cve.report/api/cve/CVE-2018-3956.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-3956","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-3956"},"summary":{"title":"CVE-2018-3956","description":"An exploitable out-of-bounds read vulnerability exists in the handling of certain XFA element attributes of Foxit Software's PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger an out-of-bounds read, which can disclose sensitive memory content and aid in exploitation when coupled with another vulnerability. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2019-01-30 22:29:00","updated_at":"2023-02-02 13:30:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0626","name":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0626","refsource":"MISC","tags":["Third Party Advisory"],"title":"TALOS-2018-0626 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-3956","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-3956","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"3956","vulnerable":"1","versionEndIncluding":"9.3.0.10826","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"foxitsoftware","cpe5":"phantompdf","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3956","vulnerable":"1","versionEndIncluding":"9.3.0.10826","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"foxitsoftware","cpe5":"reader","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3956","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"3956","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-3956","qid":"376809","title":"Foxit PhantomPDF Prior to 8.3.9 Multiple Security Vulnerabilities"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"talos-cna@cisco.com","DATE_PUBLIC":"2019-01-03T00:00:00","ID":"CVE-2018-3956","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Foxit","version":{"version_data":[{"version_value":"Foxit Software PDF Reader 9.1.0.5096."}]}}]},"vendor_name":"Foxit"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An exploitable out-of-bounds read vulnerability exists in the handling of certain XFA element attributes of Foxit Software's PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger an out-of-bounds read, which can disclose sensitive memory content and aid in exploitation when coupled with another vulnerability. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Out-of-bounds read"}]}]},"references":{"reference_data":[{"name":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0626","refsource":"MISC","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0626"}]},"impact":{"cvss":{"baseScore":6.8,"baseSeverity":"Medium","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H","version":"3.0"}}},"nvd":{"publishedDate":"2019-01-30 22:29:00","lastModifiedDate":"2023-02-02 13:30:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*","versionEndIncluding":"9.3.0.10826","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*","versionEndIncluding":"9.3.0.10826","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"3956","Ordinal":"119870","Title":"CVE-2018-3956","CVE":"CVE-2018-3956","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"3956","Ordinal":"1","NoteData":"An exploitable out-of-bounds read vulnerability exists in the handling of certain XFA element attributes of Foxit Software's PDF Reader version 9.1.0.5096. A specially crafted PDF document can trigger an out-of-bounds read, which can disclose sensitive memory content and aid in exploitation when coupled with another vulnerability. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"3956","Ordinal":"2","NoteData":"2019-01-30","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"3956","Ordinal":"3","NoteData":"2019-01-30","Type":"Other","Title":"Modified"}]}}}