all InfoSec news
ZDI-24-432: Dassault Systèmes eDrawings Viewer JT File Parsing Memory Corruption Remote Code Execution Vulnerability
May 9, 2024, 5 a.m. |
ZDI: Published Advisories www.zerodayinitiative.com
arbitrary code attackers code code execution corruption cvss dassault systèmes exploit file malicious memory memory corruption page parsing rating remote code remote code execution target viewer vulnerability zdi
More from www.zerodayinitiative.com / ZDI: Published Advisories
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Information Technology Security Engineer
@ Plexus Worldwide | Scottsdale, Arizona, United States
Principal Email Security Researcher (Cortex XDR)
@ Palo Alto Networks | Tel Aviv-Yafo, Israel
Lead Security Engineer - Cloud Security, AWS
@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India