Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-9948 PoC — Foxit Reader 安全漏洞

Source
Associated Vulnerability
Title:Foxit Reader 安全漏洞 (CVE-2018-9948)
Description:This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of typed arrays. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5380.
Description
a exp for cve-2018-9948/9958 , current shellcode called win-calc 
Readme
### 2018-9948-9958-exp
- "get_shellcode_from_msf.py" is a python script to get shellcode from msfvenom, then copy the output to the exp.pdf replace the 'calc' shellcode block, and finally it works. Ooooops, it's a tcp reverse shellcode.
- a sample code is like this: python get_shellcode_from_msf.py 192.168.1.79 1234
File Snapshot

[4.0K] /data/pocs/dcf2f69010673c0c20d8397c2930b458ec8c9e4c ├── [1.0K] exp-calc ├── [ 919] get_shellocode_from_msf.py ├── [ 318] README.md └── [ 782] safe-pdf-sample 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →