Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Foxit and Phantom PDF are prime targets for remote code execution
- This topic has 0 replies, 1 voice, and was last updated 10 months, 1 week ago by .
-
Topic
-
Security researchers have reported that both Foxit PDF Reader and Phantom PDF contain multiple severe vulnerabilities allowing attackers to execute code remotely. The problem is exacerbated by the use of the technologies by corporations like Amazon and Google.
https://threatpost.com/foxit-pdf-reader-phantompdf-remote-code-execution/154942/
You must be logged in to reply to this topic.