all InfoSec news
ZDI-24-345: Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
March 28, 2024, 5 a.m. |
ZDI: Published Advisories www.zerodayinitiative.com
arbitrary code attackers code code execution cves cvss exploit file foxit free malicious page pdf pdf reader rating reader remote code remote code execution target use-after-free vulnerability zdi
More from www.zerodayinitiative.com / ZDI: Published Advisories
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Network Security Engineer
@ Meta | Menlo Park, CA | Remote, US
Security Engineer, Investigations - i3
@ Meta | Washington, DC
Threat Investigator- Security Analyst
@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC
Security Operations Engineer II
@ Microsoft | Redmond, Washington, United States
Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas
@ Goldman Sachs | Dallas, Texas, United States