cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-30795,https://securityvulnerability.io/vulnerability/CVE-2023-30795,Out of Bounds Read Vulnerability in JT Open and Parasolid Products by Siemens,"A vulnerability exists in JT Open, JT Utilities, and Parasolid software products, wherein an out of bounds read can occur while processing specially crafted JT files. This flaw can lead to potential code execution within the context of the application, presenting significant security risks. It is essential for users of affected versions to apply patches and updates promptly to mitigate the risks associated with this vulnerability.",Siemens,"Jt Open,Jt Utilities,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Parasolid V35.1",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-30796,https://securityvulnerability.io/vulnerability/CVE-2023-30796,Out of Bounds Read in JT Open and JT Utilities by Siemens,"A security vulnerability has been detected in JT Open and JT Utilities, where an out of bounds read can occur when parsing specially crafted JT files. This flaw affects all versions of JT Open prior to V11.4 and JT Utilities prior to V13.4. Attackers could exploit this vulnerability to read data beyond allocated buffers, potentially executing arbitrary code within the current process context. Users of these applications should take immediate precautions to mitigate associated risks.",Siemens,"Jt Open,Jt Utilities",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-29053,https://securityvulnerability.io/vulnerability/CVE-2023-29053,Out of Bounds Read Vulnerability in JT Open and JT Utilities by Siemens,"A vulnerability exists in JT Open and JT Utilities that allows an out of bounds read past the allocated structure's end when parsing specially crafted JT files. This flaw could be exploited by an attacker to execute arbitrary code in the context of the vulnerable application, posing significant security risks.",Siemens,"JT Open,JT Utilities",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-04-11T10:15:00.000Z,0 CVE-2022-47977,https://securityvulnerability.io/vulnerability/CVE-2022-47977,Memory Corruption in JT Open and JT Utilities by Siemens,"A memory corruption vulnerability has been discovered in Siemens JT Open and JT Utilities, affecting all versions prior to V11.2.3.0 and V13.2.3.0 respectively. This vulnerability arises from the improper parsing of specially crafted JT files, which may enable an attacker to execute arbitrary code in the context of the affected process, potentially compromising system integrity.",Siemens,"Jt Open,Jt Utilities",7.8,HIGH,0.0006000000284984708,false,,false,false,false,,false,false,2023-02-14T10:36:22.513Z,0 CVE-2022-47936,https://securityvulnerability.io/vulnerability/CVE-2022-47936,Stack Overflow Vulnerability in JT Open and Parasolid by Siemens,"A vulnerability exists in JT Open and Parasolid products, where specially crafted JT files can trigger a stack overflow in the affected applications. This flaw may enable unauthorized code execution within the context of the current process, potentially compromising system integrity and security. Users are advised to upgrade to the latest versions to mitigate this risk.",Siemens,"Jt Open,Jt Utilities,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Parasolid V35.1",7.8,HIGH,0.0013000000035390258,false,,false,false,false,,false,false,2023-02-14T10:36:21.369Z,0 CVE-2022-47935,https://securityvulnerability.io/vulnerability/CVE-2022-47935,Memory Corruption in JT Open and Solid Edge by Siemens,"A memory corruption vulnerability exists in the JT Open and Solid Edge software due to improper processing of specially crafted JT files. This flaw is present in versions of JT Open earlier than V11.1.1.0, JT Utilities earlier than V13.1.1.0, and Solid Edge before V2023. An attacker could exploit this vulnerability to execute arbitrary code within the context of the affected application, potentially compromising system integrity and security.",Siemens,"Jt Open,Jt Utilities,Solid Edge",7.8,HIGH,0.0007099999929778278,false,,false,false,false,,false,false,2023-01-10T11:39:47.238Z,0 CVE-2021-44450,https://securityvulnerability.io/vulnerability/CVE-2021-44450,,"A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15055, ZDI-CAN-14915, ZDI-CAN-14865)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0005799999926239252,false,,false,false,false,,false,false,2021-12-14T12:07:08.000Z,0 CVE-2021-44449,https://securityvulnerability.io/vulnerability/CVE-2021-44449,,"A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14830)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:07:08.000Z,0 CVE-2021-44448,https://securityvulnerability.io/vulnerability/CVE-2021-44448,,"A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14843, ZDI-CAN-15051)",Siemens,"Jt Utilities,Jttk",3.3,LOW,0.0005600000149570405,false,,false,false,false,,false,false,2021-12-14T12:07:07.000Z,0 CVE-2021-44447,https://securityvulnerability.io/vulnerability/CVE-2021-44447,,"A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14911)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0007800000021234155,false,,false,false,false,,false,false,2021-12-14T12:07:06.000Z,0 CVE-2021-44445,https://securityvulnerability.io/vulnerability/CVE-2021-44445,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15054)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:07:05.000Z,0 CVE-2021-44446,https://securityvulnerability.io/vulnerability/CVE-2021-44446,,"A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14828, ZDI-CAN-14898)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:07:05.000Z,0 CVE-2021-44444,https://securityvulnerability.io/vulnerability/CVE-2021-44444,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15052)",Siemens,"Jt Utilities,Jttk",3.3,LOW,0.0008299999753944576,false,,false,false,false,,false,false,2021-12-14T12:07:04.000Z,0 CVE-2021-44443,https://securityvulnerability.io/vulnerability/CVE-2021-44443,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15039)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:07:03.000Z,0 CVE-2021-44442,https://securityvulnerability.io/vulnerability/CVE-2021-44442,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14995)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:07:02.000Z,0 CVE-2021-44441,https://securityvulnerability.io/vulnerability/CVE-2021-44441,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14913)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:07:01.000Z,0 CVE-2021-44440,https://securityvulnerability.io/vulnerability/CVE-2021-44440,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to memory corruption condition while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14912)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:07:00.000Z,0 CVE-2021-44439,https://securityvulnerability.io/vulnerability/CVE-2021-44439,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14908)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0005799999926239252,false,,false,false,false,,false,false,2021-12-14T12:06:59.000Z,0 CVE-2021-44438,https://securityvulnerability.io/vulnerability/CVE-2021-44438,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14907)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:06:59.000Z,0 CVE-2021-44437,https://securityvulnerability.io/vulnerability/CVE-2021-44437,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14906)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:06:58.000Z,0 CVE-2021-44436,https://securityvulnerability.io/vulnerability/CVE-2021-44436,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14905)",Siemens,"Jt Utilities,Jttk",3.3,LOW,0.0005600000149570405,false,,false,false,false,,false,false,2021-12-14T12:06:57.000Z,0 CVE-2021-44435,https://securityvulnerability.io/vulnerability/CVE-2021-44435,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to stack based buffer overflow while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14903)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0007900000200606883,false,,false,false,false,,false,false,2021-12-14T12:06:56.000Z,0 CVE-2021-44434,https://securityvulnerability.io/vulnerability/CVE-2021-44434,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14902, ZDI-CAN-14866)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2021-12-14T12:06:56.000Z,0 CVE-2021-44433,https://securityvulnerability.io/vulnerability/CVE-2021-44433,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains a use after free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14900)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0007800000021234155,false,,false,false,false,,false,false,2021-12-14T12:06:55.000Z,0 CVE-2021-44432,https://securityvulnerability.io/vulnerability/CVE-2021-44432,,"A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to stack based buffer overflow while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14845)",Siemens,"Jt Utilities,Jttk",7.8,HIGH,0.0009599999757483602,false,,false,false,false,,false,false,2021-12-14T12:06:54.000Z,0