{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T19:54:27.842","vulnerabilities":[{"cve":{"id":"CVE-2026-3775","sourceIdentifier":"14984358-7092-470d-8f34-ade47a7658a2","published":"2026-04-01T02:16:02.440","lastModified":"2026-04-14T17:56:31.173","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The application's update service, when checking for updates, loads certain system libraries from a search path that includes directories writable by low‑privileged users and is not strictly restricted to trusted system locations. Because these libraries may be resolved and loaded from user‑writable locations, a local attacker can place a malicious library there and have it loaded with SYSTEM privileges, resulting in local privilege escalation and arbitrary code execution."},{"lang":"es","value":"El servicio de actualización de la aplicación, al buscar actualizaciones, carga ciertas bibliotecas del sistema desde una ruta de búsqueda que incluye directorios escribibles por usuarios con pocos privilegios y no está estrictamente restringida a ubicaciones de sistema confiables. Debido a que estas bibliotecas pueden ser resueltas y cargadas desde ubicaciones escribibles por el usuario, un atacante local puede colocar una biblioteca maliciosa allí y hacer que se cargue con privilegios de SYSTEM, lo que resulta en una escalada de privilegios local y ejecución de código arbitrario."}],"metrics":{"cvssMetricV31":[{"source":"14984358-7092-470d-8f34-ade47a7658a2","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"14984358-7092-470d-8f34-ade47a7658a2","type":"Secondary","description":[{"lang":"en","value":"CWE-427"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*","versionEndIncluding":"13.2.2.24014","matchCriteriaId":"8E9FD877-062E-4AE4-B7D7-91E1CA8657DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0.33046","versionEndIncluding":"14.0.2.33402","matchCriteriaId":"6B7281CC-97ED-4441-BB97-6C73E328B9AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*","versionStartIncluding":"2023.1.0.15510","versionEndIncluding":"2023.3.0.23028","matchCriteriaId":"0C75FEE6-54F3-49C6-BAEA-A09D23BE5D64"},{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*","versionStartIncluding":"2024.1.0.23997","versionEndIncluding":"2024.4.1.27687","matchCriteriaId":"2C06BC41-9831-4AE3-B10B-3FC313D01580"},{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*","versionStartIncluding":"2025.1.0.27937","versionEndIncluding":"2025.3.0.35737","matchCriteriaId":"AD0AAFC0-5B9B-4A11-8967-4699792850F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*","versionEndIncluding":"2025.3.0.35737","matchCriteriaId":"1A7AD877-2AB4-4568-8109-5406D2259725"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://www.foxit.com/support/security-bulletins.html","source":"14984358-7092-470d-8f34-ade47a7658a2","tags":["Vendor Advisory"]}]}}]}