March 4, 2024, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-27339.

arbitrary code attackers code code execution cvss exploit file malicious out-of-bounds out-of-bounds write page parsing pdf power rating remote code remote code execution target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Chief Information Security Officer (CISO)

@ CSIRO | Adelaide, SA, AU

Cyber Security Engineer - Clearance Required

@ Logistics Management Institute | Remote, United States

Security Engineer, Infrastructure

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City

TS Senior Security Engineer

@ UL Solutions | Mumbai, Maharashtra, India

Security Operations Engineer

@ Fortis Games | Remote - United Kingdom

Senior Product Compliance Engineer

@ Element Biosciences | San Diego - Headquarters