Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-13557

EPSS 14.03% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-13557

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A use after free vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Foxit Reader 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Foxit Reader是中国福昕(Foxit)公司的一款PDF文档阅读器。 Foxit PDF Reader版本10.1.0.37527 存在安全漏洞,该漏洞源于JavaScript引擎存在免费漏洞。一个特别制作的PDF文档可以触发以前空闲内存的重用,这可能导致任意代码的执行。攻击者可利用该漏洞需要欺骗用户打开恶意文件来触发此漏洞。如果浏览器插件扩展被启用,访问恶意站点也会触发该漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Foxit Foxit Reader Version: 10.1.0.37527 -

II. Public POCs for CVE-2020-13557

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-13557

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-12-22 · 21 CVEs total

CVE-2020-2506610.0 CRITICALTreck TCP/IP 缓冲区错误漏洞
CVE-2020-273377.3 HIGHTreck TCP/IP 缓冲区错误漏洞
CVE-2020-273385.9 MEDIUMTreck TCP/IP 缓冲区错误漏洞
CVE-2020-284605.6 MEDIUMPrototype Pollution
CVE-2020-284485.6 MEDIUMPrototype Pollution
CVE-2020-273363.7 LOWTreck TCP/IP 缓冲区错误漏洞
CVE-2020-29583Zyxel USG Series 加密问题漏洞
CVE-2020-28641Malwarebytes Endpoint Protection 后置链接漏洞
CVE-2020-25106Nanosystems Supremo 代码问题漏洞
CVE-2020-13560Foxit Reader 资源管理错误漏洞
CVE-2020-13570Foxit Reader 资源管理错误漏洞
CVE-2020-24578D-link DSL-2888A 默认配置问题漏洞
CVE-2020-24579D-link DSL-2888A 授权问题漏洞
CVE-2020-24580D-link DSL-2888A 访问控制错误漏洞
CVE-2020-24581D-link DSL-2888A 操作系统命令注入漏洞
CVE-2020-13547Foxit Reader 资源管理错误漏洞
CVE-2020-35608Microsoft Azure Sphere 注入漏洞
CVE-2020-35609Microsoft Azure Sphere 注入漏洞
CVE-2020-14231HCL Client Application Access 缓冲区错误漏洞
CVE-2020-14270Hcl Technologies Domino 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-13557

No comments yet


Leave a comment