{"containers":{"cna":{"affected":[{"product":"PDFMate PDF Converter Pro","vendor":"Anvsoft","versions":[{"status":"affected","version":"1.7.5.0"}]}],"credits":[{"lang":"en","value":"Benjamin Kunz Mejri"}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Anvsoft PDFMate PDF Converter Pro 1.7.5.0 and classified as critical. The manipulation leads to memory corruption. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-119","description":"CWE-119 Memory Corruption","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-07-24T19:30:15.000Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.vulnerability-lab.com/get_content.php?id=2029"},{"tags":["x_refsource_MISC"],"url":"https://vuldb.com/?id.97267"}],"title":"Anvsoft PDFMate PDF Converter Pro memory corruption","x_generator":"vuldb.com","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@vuldb.com","ID":"CVE-2017-20144","REQUESTER":"cna@vuldb.com","STATE":"PUBLIC","TITLE":"Anvsoft PDFMate PDF Converter Pro memory corruption"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PDFMate PDF Converter Pro","version":{"version_data":[{"version_value":"1.7.5.0"}]}}]},"vendor_name":"Anvsoft"}]}},"credit":"Benjamin Kunz Mejri","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability has been found in Anvsoft PDFMate PDF Converter Pro 1.7.5.0 and classified as critical. The manipulation leads to memory corruption. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."}]},"generator":"vuldb.com","impact":{"cvss":{"baseScore":"6.3","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-119 Memory Corruption"}]}]},"references":{"reference_data":[{"name":"https://www.vulnerability-lab.com/get_content.php?id=2029","refsource":"MISC","url":"https://www.vulnerability-lab.com/get_content.php?id=2029"},{"name":"https://vuldb.com/?id.97267","refsource":"MISC","url":"https://vuldb.com/?id.97267"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T21:45:26.061Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.vulnerability-lab.com/get_content.php?id=2029"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://vuldb.com/?id.97267"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:04:34.546263Z","id":"CVE-2017-20144","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T14:02:26.926Z"}}]},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2017-20144","datePublished":"2022-07-24T19:30:15.000Z","dateReserved":"2022-07-24T00:00:00.000Z","dateUpdated":"2025-04-15T14:02:26.926Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}