漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of arguments passed to the instanceManager.nodes.append function. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5641.
漏洞信息
N/A
漏洞
使用不兼容类型访问资源(类型混淆)
漏洞
Foxit Reader和PhantomPDF 安全漏洞
漏洞信息
Foxit Reader for Windows是中国福昕(Foxit)软件公司的一款基于Windows平台的PDF文档阅读器。Foxit PhantomPDF for Windows是它的商业版。 基于Windows平台的Foxit Reader 9.1.0.5096及之前版本和PhantomPDF 9.1.0.5096及之前版本中对参数的处理(传入到‘instanceManager.nodes.append’函数的参数)存在类型混淆漏洞,该漏洞源于程序没有正确地验证用户提交的数据。远程攻击者可借助恶意
漏洞信息
N/A
漏洞
N/A