CVE-2013-10057
Synactis PDF In-The-Box ConnectToSynactic Stack-Based Buffer Overflow
A stack-based buffer overflow vulnerability exists in Synactis PDF In-The-Box ActiveX control (PDF_IN_1.ocx), specifically the ConnectToSynactis method. When a long string is passed to this method—intended to populate the ldCmdLine argument of a WinExec call—a strcpy operation overwrites a saved TRegistry class pointer on the stack. This allows remote attackers to execute arbitrary code in the context of the user by enticing them to visit a malicious webpage that instantiates the vulnerable ActiveX control. The vulnerability was discovered via its use in third-party software such as Logic Print 2013.
| CWE | CWE-121 CWE-94 |
| Vendor | synactis |
| Product | pdf in-the-box |
| Published | Aug 1, 2025 |
| Last Updated | Apr 7, 2026 |
Get instant alerts for synactis pdf in-the-box
Be the first to know when new unknown vulnerabilities affecting synactis pdf in-the-box are published — delivered to Slack, Telegram or Discord.