{"id":78550,"date":"2026-05-17T08:46:16","date_gmt":"2026-05-17T05:16:16","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-8733-investintech-slimpdfreader-slimpdfreader-exe-sub_3b4610-stack-based-overflow\/"},"modified":"2026-05-17T08:46:16","modified_gmt":"2026-05-17T05:16:16","slug":"cve-2026-8733-investintech-slimpdfreader-slimpdfreader-exe-sub_3b4610-stack-based-overflow","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-8733-investintech-slimpdfreader-slimpdfreader-exe-sub_3b4610-stack-based-overflow\/","title":{"rendered":"CVE-2026-8733 &#8211; Investintech SlimPDFReader SlimPDFReader.exe sub_3B4610 stack-based overflow"},"content":{"rendered":"<p>CVE ID :CVE-2026-8733<\/p>\n<p>  Published : May 17, 2026, 5:16 a.m. | 1\u00a0hour, 42\u00a0minutes ago<\/p>\n<p>  Description :A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected by this vulnerability is the function sub_3B4610 of the file SlimPDFReader.exe. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor responded to the initial vulnerability report by the researcher with a note that the product is discontinued. This vulnerability only affects products that are no longer supported by the maintainer.<\/p>\n<p>  Severity: 7.5 | HIGH<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-8733 Published : May 17, 2026, 5:16 a.m. | 1\u00a0hour, 42\u00a0minutes ago Description :A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected by this vulnerability is the function sub_3B4610 of the file SlimPDFReader.exe. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78550","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78550"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78550\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}