all InfoSec news
ZDI-24-322: Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
March 28, 2024, 5 a.m. |
ZDI: Published Advisories www.zerodayinitiative.com
arbitrary code attackers code code execution cves cvss exploit file foxit free malicious page pdf pdf reader rating reader remote code remote code execution target use-after-free vulnerability zdi
More from www.zerodayinitiative.com / ZDI: Published Advisories
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cybersecurity Engineer
@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client
Invoice Compliance Reviewer
@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote
Technical Program Manager II - Compliance
@ Microsoft | Redmond, Washington, United States
Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence
@ Moonshot | Washington, District of Columbia, United States
Customer Engineer, Security, Public Sector
@ Google | Virginia, USA; Illinois, USA