July 13, 2023, 5 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

arbitrary code attackers code code execution corruption exploit file gif malicious memory memory corruption page parsing pdf power remote code remote code execution target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Corporate Security Specialist - 2nd shift (12pm-8pm)

@ Perrigo Company | Grand Rapids, MI, US, 49503

Lead Engineer, Network Security -Network

@ Singtel | Singapore, Singapore

DevSecOps Engineer

@ Moveworks | Remote, USA

Systems Engineer - Cyber Security

@ Penske | Tampa, FL, United States

(Senior) Security Analyst (m/f/x)

@ REWE International Dienstleistungsgesellschaft m.b.H | Wiener Neudorf, Austria

Tier 3 Analyst- Red Team

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States