Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13547

EPSS 1.02% · P77
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-13547

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A type confusion vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger an improper use of an object, resulting in memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用不兼容类型访问资源(类型混淆)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Foxit Reader 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Foxit Reader是中国福昕(Foxit)公司的一款PDF文档阅读器。 Foxit PDF Reader版本10.1.0.37527存在安全漏洞,该漏洞源于特别制作的PDF文档可能会引发对对象的不当使用,从而导致内存损坏和任意代码执行。攻击者可利用该漏洞需要欺骗用户打开恶意文件来触发此漏洞。如果浏览器插件扩展被启用,访问恶意站点也会触发该漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Foxit Foxit Reader Version: 10.1.0.37527 -

II. Public POCs for CVE-2020-13547

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-13547

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-12-22 · 21 CVEs total

CVE-2020-2506610.0 CRITICALTreck TCP/IP 缓冲区错误漏洞
CVE-2020-273377.3 HIGHTreck TCP/IP 缓冲区错误漏洞
CVE-2020-273385.9 MEDIUMTreck TCP/IP 缓冲区错误漏洞
CVE-2020-284605.6 MEDIUMPrototype Pollution
CVE-2020-284485.6 MEDIUMPrototype Pollution
CVE-2020-273363.7 LOWTreck TCP/IP 缓冲区错误漏洞
CVE-2020-29583Zyxel USG Series 加密问题漏洞
CVE-2020-28641Malwarebytes Endpoint Protection 后置链接漏洞
CVE-2020-25106Nanosystems Supremo 代码问题漏洞
CVE-2020-13557Foxit Reader 资源管理错误漏洞
CVE-2020-13560Foxit Reader 资源管理错误漏洞
CVE-2020-13570Foxit Reader 资源管理错误漏洞
CVE-2020-24578D-link DSL-2888A 默认配置问题漏洞
CVE-2020-24579D-link DSL-2888A 授权问题漏洞
CVE-2020-24580D-link DSL-2888A 访问控制错误漏洞
CVE-2020-24581D-link DSL-2888A 操作系统命令注入漏洞
CVE-2020-35608Microsoft Azure Sphere 注入漏洞
CVE-2020-35609Microsoft Azure Sphere 注入漏洞
CVE-2020-14231HCL Client Application Access 缓冲区错误漏洞
CVE-2020-14270Hcl Technologies Domino 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-13547

No comments yet


Leave a comment