all InfoSec news
ZDI-24-258: Dassault Systèmes eDrawings CATPART File Parsing Use-After-Free Remote Code Execution Vulnerability
March 11, 2024, 5 a.m. |
ZDI: Published Advisories www.zerodayinitiative.com
arbitrary code attackers code code execution cvss dassault systèmes exploit file free malicious page parsing rating remote code remote code execution target use-after-free vulnerability zdi
More from www.zerodayinitiative.com / ZDI: Published Advisories
Jobs in InfoSec / Cybersecurity
Technical Senior Manager, SecOps | Remote US
@ Coalfire | United States
Global Cybersecurity Governance Analyst
@ UL Solutions | United States
Security Engineer II, AWS Offensive Security
@ Amazon.com | US, WA, Virtual Location - Washington
Senior Cyber Threat Intelligence Analyst
@ Sainsbury's | Coventry, West Midlands, United Kingdom
Embedded Global Intelligence and Threat Monitoring Analyst
@ Sibylline Ltd | Austin, Texas, United States
Senior Security Engineer
@ Curai Health | Remote