cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-54091,https://securityvulnerability.io/vulnerability/CVE-2024-54091,Parasolid Vulnerability Could Allow Execution of Code in Context of Current Process,"A critical vulnerability has been identified in the Parasolid software, specifically affecting versions of Parasolid V36.1 prior to V36.1.225 and V37.0 prior to V37.0.173. This flaw manifests as an out of bounds write past the end of an allocated buffer when processing X_T data or handling specially crafted files in X_T format. Exploitation of this vulnerability could enable an attacker to execute arbitrary code within the context of the currently running process, posing significant security risks to users.",Siemens,"Parasolid V36.1,Parasolid V37.0",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-12-10T13:54:17.315Z,0 CVE-2024-31980,https://securityvulnerability.io/vulnerability/CVE-2024-31980,Buffer Overflow Vulnerability in Parasolid Could Allow Execution of Code,"An out of bounds write vulnerability has been identified in Parasolid, a widely used software for 3D solid modeling. This vulnerability arises while processing a specially crafted X_T part file, potentially allowing attackers to write beyond the allocated buffer length. If successfully exploited, it may enable attackers to execute arbitrary code within the context of the affected application, leading to unauthorized actions and data breaches. Users of Parasolid are strongly advised to update to the latest versions to safeguard against these security risks.",Siemens,"Parasolid V35.1,Parasolid V36.0,Parasolid V36.1",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:02:27.405Z,0 CVE-2024-26277,https://securityvulnerability.io/vulnerability/CVE-2024-26277,Parasolid Vulnerability Could Lead to Denial of Service Condition,"A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted X_T files. An attacker could leverage this vulnerability to crash the application causing denial of service condition.",Siemens,"Jt2go,Parasolid V35.1,Parasolid V36.0,Parasolid V36.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",3.3,LOW,0.0004299999854993075,false,,false,false,false,,false,false,2024-04-09T08:34:38.896Z,0 CVE-2024-26276,https://securityvulnerability.io/vulnerability/CVE-2024-26276,Stack Exhaustion Vulnerability in Parasolid Could Lead to Denial of Service,"A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected application contains a stack exhaustion vulnerability while parsing a specially crafted X_T file. This could allow an attacker to cause denial of service condition.",Siemens,"Jt2go,Parasolid V35.1,Parasolid V36.0,Parasolid V36.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",3.3,LOW,0.0004299999854993075,false,,false,false,false,,false,false,2024-04-09T08:34:37.744Z,0 CVE-2024-26275,https://securityvulnerability.io/vulnerability/CVE-2024-26275,Parasolid Vulnerability Could Allow Execution of Code,"A serious vulnerability has been found in Siemens JT2Go and Teamcenter Visualization products, whereby an out of bounds read condition exists when parsing malformed X_T files. This flaw allows attackers to potentially execute arbitrary code within the context of the affected process, which could lead to unauthorized actions and compromised systems. Users of JT2Go and Teamcenter Visualization should apply necessary updates to mitigate risks associated with this vulnerability.",Siemens,"Jt2go,Parasolid V35.1,Parasolid V36.0,Parasolid V36.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-04-09T08:34:36.604Z,0