Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-1492

EPSS 68.06% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-1492

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Adobe Reader "JavaScript API" 远程代码执行漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Adobe Reader和Acrobat 9.1, 8.1.4, 7.1.1及之前版本中的JavaScript API采用getAnnots Doc方式。远程攻击者可以借助一个PDF文件,引起拒绝服务攻击(内存破坏)或执行任意代码。该PDF文件包含一个注释,拥有一个带有JavaScript代码的OpenAction入口。而该JavaScript代码会利用特制的整数自变量呼叫该方式。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-1492

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-1492

登录查看更多情报信息。

Same Patch Batch · n/a · 2009-04-30 · 16 CVEs total

CVE-2009-1313Mozilla Firefox 资源管理错误漏洞
CVE-2009-0663Cmu Perl DBD::Pg 'pg_getline()' 和'getline()'堆缓冲区溢出漏洞
CVE-2009-1255Memcached和MemcacheDB stats maps命令信息泄露漏洞
CVE-2009-1291TIBCO SmartSockets的RTserver组件栈溢出漏洞
CVE-2009-1295Apport 本地任意文件删除漏洞
CVE-2009-1339twiki 会话劫持和跨站请求伪造漏洞
CVE-2009-1341Debian Perl DBD::Pg 'quote.c'内存泄露漏洞
CVE-2009-1348McAfee Products 'RAR/ZIP'文件扫描绕过漏洞
CVE-2009-1415GnuTLS 函数库libgnutls "lib/pk-libgcrypt.c" 远程安全漏洞
CVE-2009-1416GnuTLS 函数库libgnutls "lib/gnutls_pk.c" 远程安全漏洞
CVE-2009-1417GnuTLS "gnutls-cli" 远程安全漏洞
CVE-2009-1432Symantec Reporting Server 输入验证错误漏洞
CVE-2009-1434Foswiki 会话劫持和跨站请求伪造漏洞
CVE-2009-1493Adobe Reader "JavaScript API" 方法customDictionaryOpen远程代码执行漏洞
CVE-2009-1494memcached 'process_stat'函数信息泄露漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2009-1492

No comments yet


Leave a comment