Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-1599

EPSS 0.24% · P47
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-1599

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Opera executes DOM calls in response to a javascript: URI in the target attribute of a submit element within a form contained in an inline PDF file, which might allow remote attackers to bypass intended Adobe Acrobat JavaScript restrictions on accessing the document object, as demonstrated by a web site that permits PDF uploads by untrusted users, and therefore has a shared document.domain between the web site and this javascript: URI. NOTE: the researcher reports that Adobe's position is "a PDF file is active content."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Opera Adobe Acrobat JavaScript访问控制绕过漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Opera是Opera软件公司开发的Web浏览器和互联网软件。 Opera执行对一个javascript的响应的DOM调用:包含于内嵌PDF文件的一个格式中的提交元素的目标属性中的URI,可能允许远程攻击者绕过在文件对象上预设的Adobe Acrobat JavaScript限制,这表现目标属性的URI通过一个网站,允许不可信用户上传PDF格式文件的网站和此JavaScript:URI的共享document.domain。注意:研究人员报告说,Adobe公司的立场是"一个PDF文件就是活跃的内容。"
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-1599

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-1599

Please Login to view more intelligence information

Same Patch Batch · n/a · 2009-05-11 · 27 CVEs total

CVE-2009-1609Battle Blog 'admin/uploadform.asp'任意文件上传漏洞
CVE-2009-1596Igniterealtime Openfire jabber:iq:auth "passwd_change"请求远程更改口令漏洞
CVE-2009-1595Igniterealtime Openfire jabber:iq:auth "passwd_change"请求远程更改口令漏洞
CVE-2009-1602Pablosoftwaresolutions Quick' n Easy邮件服务器SMTP请求拒绝服务漏洞
CVE-2009-1601ClamAV 'clamav-milter' Initscript 文件许可漏洞
CVE-2009-1600Apple Safari Adobe Acrobat JavaScript访问控制绕过漏洞
CVE-2009-1598Google Chrome 权限许可和访问控制问题漏洞
CVE-2009-1597Mozilla Firefox Adobe Acrobat JavaScript访问控制绕过漏洞
CVE-2009-1194Gnome Pango 数字错误漏洞
CVE-2009-0194Garmin Communicator Plugin npGarmin.dll绕过安全限制漏洞
CVE-2009-1603OpenSC 'pkcs11-tool'不安全关键世代漏洞
CVE-2009-1611Electrasoft FTP banner远程栈溢出漏洞
CVE-2009-1610JobScript 'changepassword.php'访问控制漏洞
CVE-2008-6803Yigit_Aybuga Dizi Portali 'diziler.asp' SQL注入漏洞
CVE-2009-1608Microchip MPLAB IDE .mcp文件处理栈溢出漏洞
CVE-2009-1607LinkBase Users Menu HTML注入漏洞
CVE-2009-1606Dafolo DafoloControl ActiveX Control 多个远程缓冲区溢出漏洞
CVE-2009-1605SumatraPDF 缓冲区错误漏洞
CVE-2009-1604LimeSurvey '/admin/remotecontrol' 远程代码执行漏洞
CVE-2009-1616Coppermine Photo Gallery css参数跨站脚本漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2009-1599

No comments yet


Leave a comment