all InfoSec news
ZDI-24-307: Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulnerability
March 28, 2024, 5 a.m. |
ZDI: Published Advisories www.zerodayinitiative.com
arbitrary code attackers code code execution cvss doc exploit file foxit free malicious object page pdf pdf reader rating reader remote code remote code execution target use-after-free vulnerability zdi
More from www.zerodayinitiative.com / ZDI: Published Advisories
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)
@ WWC Global | Reston, Virginia, United States
Security Architect (DevSecOps)
@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium
Infrastructure Security Architect
@ Ørsted | Kuala Lumpur, MY
Contract Penetration Tester
@ Evolve Security | United States - Remote
Senior Penetration Tester
@ DigitalOcean | Canada