all InfoSec news
ZDI-23-1855: (0Day) Hancom Office Word DOC File Parsing Use-After-Free Remote Code Execution Vulnerability
Dec. 20, 2023, 6 a.m. |
ZDI: Published Advisories www.zerodayinitiative.com
0day arbitrary code attackers code code execution cvss doc exploit file free malicious office page parsing rating remote code remote code execution target use-after-free vulnerability word zdi
More from www.zerodayinitiative.com / ZDI: Published Advisories
Jobs in InfoSec / Cybersecurity
Principal Security Engineer
@ Elsevier | Home based-Georgia
Infrastructure Compliance Engineer
@ NVIDIA | US, CA, Santa Clara
Information Systems Security Engineer (ISSE) / Cybersecurity SME
@ Green Cell Consulting | Twentynine Palms, CA, United States
Sales Security Analyst
@ Everbridge | Bengaluru
Alternance – Analyste Threat Intelligence – Cybersécurité - Île-de-France
@ Sopra Steria | Courbevoie, France
Third Party Cyber Risk Analyst
@ Chubb | Philippines