Nov. 14, 2023, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Argon. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-44438.

arbitrary code attackers code code execution cves cvss exploit file malicious page path rating remote code remote code execution search target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Engineer II - Vulnerability Analysis

@ Datadog | New York City, USA

Associate Lead Consultant - SIEM Solution Management Job

@ Yash Technologies | Hyderabad, TG, IN

Cyber Security Senior Manager/Associate Director

@ EY | Johannesburg, GT, ZA, 2146

Cloud Security Engineer

@ Hexagon US Federal | Chantilly, VA

Sr Analyst, Governance, Risk, and Compliance

@ Tucows | Canada