Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. | https://github.com/Jasmoon99/Embedded-PDF | POC Details |
| 2 | This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. | https://github.com/omarothmann/Embedded-Backdoor-Connection | POC Details |
| 3 | None | https://github.com/asepsaepdin/CVE-2010-1240 | POC Details |
| 4 | Python tool for CVE-2010-1240 research - generates malicious PDFs exploiting Adobe Reader Launch Actions | https://github.com/12345qwert123456/CVE-2010-1240 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet