Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
PDF-XChange Editor exportAsText Exposed Dangerous Method Remote Code Execution Vulnerability
Vulnerability Description
PDF-XChange Editor exportAsText Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the exportAsText method. The application exposes a JavaScript interface that allows writing arbitrary files. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-19649.
CVSS Information
N/A
Vulnerability Type
暴露危险的方法或函数
Vulnerability Title
PDF-XChange Editor 安全漏洞
Vulnerability Description
PDF-XChange Editor是PDF-XChange公司的一个运行在 Microsoft Windows 系统中的 PDF 文件查看软件。 PDF-XChange Editor 存在安全漏洞,该漏洞源于 exportAsText 暴露了危险方法远程代码执行漏洞。
CVSS Information
N/A
Vulnerability Type
N/A