March 8, 2024, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dassault Syst��mes eDrawings. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-1847.

arbitrary code attackers code code execution cvss dassault systèmes exploit file malicious out-of-bounds out-of-bounds write page parsing rating remote code remote code execution target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Associate Director Cyber Engineering

@ KBR, Inc. | CO102: 16800 E Centretech Pkwy,Aurora 16800 East Centretech Pkwy Building S75, Aurora, CO, 80011 USA

Application Security Engineering Manager - Security Operations (Boston)

@ Klaviyo | Boston, MA

Azure Security DevOps Engineer

@ Global Payments | North Carolina - Remote

Senior IT Planning Analyst - Cybersecurity PMO

@ Pacific Gas and Electric Company | Oakland, CA, US, 94612

Principal Business Value Consultant

@ Palo Alto Networks | Chicago, IL, United States

Sr. Specialist - Cyber Defence Operations

@ Diageo | Bengaluru Karle Town SEZ