Feb. 23, 2024, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-27331.

attackers cves cvss disclosure editor exploit file information information disclosure information disclosure vulnerability malicious out-of-bounds page parsing pdf rating sensitive sensitive information target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Network Security Analyst

@ Wiz | Tel Aviv

Penetration Testing Staff Engineer- Turkey Remote

@ SonicWall | Istanbul, Istanbul, Türkiye

Physical Security Engineer

@ Microsoft | Atlanta, Georgia, United States

Junior Security Consultant (m/w/d)

@ Deutsche Telekom | Berlin, Deutschland

Senior Cybersecurity Product Specialist - Security Endpoint Protection

@ Pacific Gas and Electric Company | San Ramon, CA, US, 94583

Security Engineer, Pre-Sales (PA/NJ)

@ Vectra | US - South New Jersey, US - Pennsylvania