{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T10:57:48.285","vulnerabilities":[{"cve":{"id":"CVE-2025-32451","sourceIdentifier":"talos-cna@cisco.com","published":"2025-08-13T14:15:31.080","lastModified":"2025-11-03T20:18:27.500","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A memory corruption vulnerability exists in Foxit Reader 2025.1.0.27937 due to the use of an uninitialized pointer. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."},{"lang":"es","value":"Existe una vulnerabilidad de corrupción de memoria en Foxit Reader 2025.1.0.27937 debido al uso de un puntero no inicializado. Un código Javascript especialmente manipulado dentro de un documento PDF malicioso puede activar esta vulnerabilidad, lo que puede provocar corrupción de memoria y la ejecución de código arbitrario. Un atacante necesita engañar al usuario para que abra el archivo malicioso para activar esta vulnerabilidad. La explotación también es posible si un usuario visita un sitio web malicioso especialmente manipulado con la extensión del complemento del navegador habilitada."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-824"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:pdf_reader:2025.1.0.27937:*:*:*:*:*:*:*","matchCriteriaId":"DA26A7B2-3D4B-4715-9B1C-BC9E31022C85"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2025-2202","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2202","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}