Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Adobe | Reader Mobile | unspecified ~ 21.8.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is an Exploit App I made when solving the DocumentViewer challenge (CVE-2021-40724) from MobileHackingLab. It will download a libdocviewe_pro.so library from your local machine unto the vulnerable app's internal storage, load it upon relaunch and achieve an RCE. | https://github.com/tinopreter/DocViewerExploitApp | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-40720 | 9.8 CRITICAL | Ops CLI Deserialization of Untrusted Data leads to Abritrary Code Execution |
| CVE-2021-40728 | 7.8 HIGH | Adobe Acrobat Reader DC Use After Free Arbitrary Code Execution |
| CVE-2021-39864 | 6.5 MEDIUM | Adobe Commerce Cross-Site Request Forgery (CSRF) Could Lead To Unauthorized Cart Addition |
| CVE-2021-40721 | 6.1 MEDIUM | Adobe Connect Reflected Cross Site Scripting |
| CVE-2021-40729 | 3.3 LOW | Adobe Acrobat Reader DC PDF Out-of-Bound Read Vulnerability Information Disclosure |
| CVE-2021-40731 | Adobe Acrobat Reader DC JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnera | |
| CVE-2021-40730 | Adobe Acrobat Reader DC JPEG2000 Parsing Use-After-Free Information Disclosure Vulnerabili |
No comments yet