cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-37996,https://securityvulnerability.io/vulnerability/CVE-2024-37996,Null Pointer Dereference in Siemens Applications,"A critical vulnerability exists within various Siemens applications, including JT Open, JT2Go, and Teamcenter Visualization, which are susceptible to null pointer dereference. This issue arises when the applications process specially crafted XML files. An attacker could exploit this weakness to trigger application crashes, ultimately leading to a denial of service. It is imperative for users to update to the latest versions to mitigate potential risks associated with this vulnerability.",Siemens,"Jt Open,Jt2go,Plm Xml Sdk,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406",3.3,LOW,0.0004299999854993075,false,,false,false,false,,false,false,2024-07-09T12:15:00.000Z,0 CVE-2024-37997,https://securityvulnerability.io/vulnerability/CVE-2024-37997,Stack Overflow Vulnerability in Siemens JT Open and Teamcenter Visualization Products,"A stack overflow vulnerability has been identified in several products from Siemens, notably within JT Open and Teamcenter Visualization. This vulnerability arises during the parsing of specially crafted XML files, which may permit an attacker to execute arbitrary code in the context of the current process. Affected applications include multiple versions of JT Open, JT2Go, PLM XML SDK, and various iterations of Teamcenter Visualization. Users are advised to update their affected products to the latest secure versions to mitigate associated risks.",Siemens,"Jt Open,Jt2go,Plm Xml Sdk,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-07-09T12:15:00.000Z,0 CVE-2023-30796,https://securityvulnerability.io/vulnerability/CVE-2023-30796,Out of Bounds Read in JT Open and JT Utilities by Siemens,"A security vulnerability has been detected in JT Open and JT Utilities, where an out of bounds read can occur when parsing specially crafted JT files. This flaw affects all versions of JT Open prior to V11.4 and JT Utilities prior to V13.4. Attackers could exploit this vulnerability to read data beyond allocated buffers, potentially executing arbitrary code within the current process context. Users of these applications should take immediate precautions to mitigate associated risks.",Siemens,"Jt Open,Jt Utilities",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-30795,https://securityvulnerability.io/vulnerability/CVE-2023-30795,Out of Bounds Read Vulnerability in JT Open and Parasolid Products by Siemens,"A vulnerability exists in JT Open, JT Utilities, and Parasolid software products, wherein an out of bounds read can occur while processing specially crafted JT files. This flaw can lead to potential code execution within the context of the application, presenting significant security risks. It is essential for users of affected versions to apply patches and updates promptly to mitigate the risks associated with this vulnerability.",Siemens,"Jt Open,Jt Utilities,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Parasolid V35.1",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-29053,https://securityvulnerability.io/vulnerability/CVE-2023-29053,Out of Bounds Read Vulnerability in JT Open and JT Utilities by Siemens,"A vulnerability exists in JT Open and JT Utilities that allows an out of bounds read past the allocated structure's end when parsing specially crafted JT files. This flaw could be exploited by an attacker to execute arbitrary code in the context of the vulnerable application, posing significant security risks.",Siemens,"JT Open,JT Utilities",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-04-11T10:15:00.000Z,0 CVE-2022-47977,https://securityvulnerability.io/vulnerability/CVE-2022-47977,Memory Corruption in JT Open and JT Utilities by Siemens,"A memory corruption vulnerability has been discovered in Siemens JT Open and JT Utilities, affecting all versions prior to V11.2.3.0 and V13.2.3.0 respectively. This vulnerability arises from the improper parsing of specially crafted JT files, which may enable an attacker to execute arbitrary code in the context of the affected process, potentially compromising system integrity.",Siemens,"Jt Open,Jt Utilities",7.8,HIGH,0.0006000000284984708,false,,false,false,false,,false,false,2023-02-14T10:36:22.513Z,0 CVE-2022-47936,https://securityvulnerability.io/vulnerability/CVE-2022-47936,Stack Overflow Vulnerability in JT Open and Parasolid by Siemens,"A vulnerability exists in JT Open and Parasolid products, where specially crafted JT files can trigger a stack overflow in the affected applications. This flaw may enable unauthorized code execution within the context of the current process, potentially compromising system integrity and security. Users are advised to upgrade to the latest versions to mitigate this risk.",Siemens,"Jt Open,Jt Utilities,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Parasolid V35.1",7.8,HIGH,0.0013000000035390258,false,,false,false,false,,false,false,2023-02-14T10:36:21.369Z,0 CVE-2022-47935,https://securityvulnerability.io/vulnerability/CVE-2022-47935,Memory Corruption in JT Open and Solid Edge by Siemens,"A memory corruption vulnerability exists in the JT Open and Solid Edge software due to improper processing of specially crafted JT files. This flaw is present in versions of JT Open earlier than V11.1.1.0, JT Utilities earlier than V13.1.1.0, and Solid Edge before V2023. An attacker could exploit this vulnerability to execute arbitrary code within the context of the affected application, potentially compromising system integrity and security.",Siemens,"Jt Open,Jt Utilities,Solid Edge",7.8,HIGH,0.0007099999929778278,false,,false,false,false,,false,false,2023-01-10T11:39:47.238Z,0 CVE-2021-44014,https://securityvulnerability.io/vulnerability/CVE-2021-44014,,"A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15057, ZDI-CAN-19081)",Siemens,"Jt Open,Jt Utilities,Solid Edge",7.8,HIGH,0.0024300001095980406,false,,false,false,false,,false,false,2021-12-14T12:06:50.000Z,0 CVE-2021-44002,https://securityvulnerability.io/vulnerability/CVE-2021-44002,,"A vulnerability has been identified in JT Open (All versions < V11.1.1.0), JT Utilities (All versions < V13.1.1.0), Solid Edge (All versions < V2023). The Jt1001.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15058, ZDI-CAN-19076, ZDI-CAN-19077)",Siemens,"Jt Open,Jt Utilities,Solid Edge",7.8,HIGH,0.0011899999808520079,false,,false,false,false,,false,false,2021-12-14T12:06:41.000Z,0