mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
60 lines
2.9 KiB
Markdown
60 lines
2.9 KiB
Markdown
### [CVE-2024-4367](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367)
|
|

|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://bugzilla.mozilla.org/show_bug.cgi?id=1893645
|
|
|
|
#### Github
|
|
- https://github.com/0xr2r/CVE-2024-4367
|
|
- https://github.com/1337rokudenashi/Odoo_PDFjs_CVE-2024-4367.pdf
|
|
- https://github.com/AazafRitha/bug-bounty-reports
|
|
- https://github.com/BektiHandoyo/cve-pdf-host
|
|
- https://github.com/Bhavyakcwestern/Hacking-pdf.js-vulnerability
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/J1ezds/Vulnerability-Wiki-page
|
|
- https://github.com/LOURC0D3/CVE-2024-4367-PoC
|
|
- https://github.com/Masamuneee/CVE-2024-4367-Analysis
|
|
- https://github.com/MihranGIT/POC_CVE-2024-4367
|
|
- https://github.com/PenguinCabinet/CVE-2024-4367-hands-on
|
|
- https://github.com/Scivous/CVE-2024-4367-npm
|
|
- https://github.com/Threekiii/Awesome-POC
|
|
- https://github.com/UnHackerEnCapital/PDFernetRemotelo
|
|
- https://github.com/VVeakee/CVE-2024-4367
|
|
- https://github.com/XiaomingX/awesome-poc-for-red-team
|
|
- https://github.com/Zombie-Kaiser/cve-2024-4367-PoC-fixed
|
|
- https://github.com/alecdhuse/Lantern-Shark
|
|
- https://github.com/avalahEE/pdfjs_disable_eval
|
|
- https://github.com/clarkio/pdfjs-vuln-demo
|
|
- https://github.com/elamani-drawing/CVE-2024-4367-POC-PDFJS
|
|
- https://github.com/exfil0/WEAPONIZING-CVE-2024-4367
|
|
- https://github.com/google/fishy-pdf
|
|
- https://github.com/hellomipl/mipl-pdf-viewer
|
|
- https://github.com/kabiri-labs/CVE-2024-4367-PoC
|
|
- https://github.com/klausnitzer/pentest-pdf-collection
|
|
- https://github.com/m0d0ri205/PDFJS
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/pS3ud0RAnD0m/cve-2024-4367-poc
|
|
- https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample
|
|
- https://github.com/plzheheplztrying/cve_monitor
|
|
- https://github.com/rjm521/hdfs-dashboard
|
|
- https://github.com/romanbelaire/notebook
|
|
- https://github.com/rzte/pdf-exploit
|
|
- https://github.com/s4vvysec/CVE-2024-4367-POC
|
|
- https://github.com/snyk-labs/pdfjs-vuln-demo
|
|
- https://github.com/spaceraccoon/detect-cve-2024-4367
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/zgimszhd61/openai-sec-test-cve-quickstart
|
|
- https://github.com/zulloper/cve-poc
|
|
|