cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-37996,https://securityvulnerability.io/vulnerability/CVE-2024-37996,Null Pointer Dereference in Siemens Applications,"A critical vulnerability exists within various Siemens applications, including JT Open, JT2Go, and Teamcenter Visualization, which are susceptible to null pointer dereference. This issue arises when the applications process specially crafted XML files. An attacker could exploit this weakness to trigger application crashes, ultimately leading to a denial of service. It is imperative for users to update to the latest versions to mitigate potential risks associated with this vulnerability.",Siemens,"Jt Open,Jt2go,Plm Xml Sdk,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406",3.3,LOW,0.0004299999854993075,false,,false,false,false,,false,false,2024-07-09T12:15:00.000Z,0 CVE-2024-37997,https://securityvulnerability.io/vulnerability/CVE-2024-37997,Stack Overflow Vulnerability in Siemens JT Open and Teamcenter Visualization Products,"A stack overflow vulnerability has been identified in several products from Siemens, notably within JT Open and Teamcenter Visualization. This vulnerability arises during the parsing of specially crafted XML files, which may permit an attacker to execute arbitrary code in the context of the current process. Affected applications include multiple versions of JT Open, JT2Go, PLM XML SDK, and various iterations of Teamcenter Visualization. Users are advised to update their affected products to the latest secure versions to mitigate associated risks.",Siemens,"Jt Open,Jt2go,Plm Xml Sdk,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-07-09T12:15:00.000Z,0