cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-54095,https://securityvulnerability.io/vulnerability/CVE-2024-54095,Integer Underflow Vulnerability in Solid Edge SE2024 Could Allow Code Execution,"A vulnerability exists in Solid Edge SE2024 affecting all versions prior to V224.0 Update 10. This vulnerability is an integer underflow that can be exploited by attackers through specially crafted PAR files. When the application parses these files, it may enable the execution of arbitrary code within the context of the current process, posing significant risks to system integrity and user data.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,2024-12-10T13:54:21.335Z,0 CVE-2024-54094,https://securityvulnerability.io/vulnerability/CVE-2024-54094,Heap-Based Buffer Overflow Vulnerability Affects Solid Edge SE2024,"A heap-based buffer overflow vulnerability exists in Siemens' Solid Edge SE2024, impacting all versions prior to V224.0 Update 5. This vulnerability arises during the processing of specially crafted PAR files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. Prompt mitigation measures are advisable to safeguard systems against exploitation of this flaw.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,2024-12-10T13:54:20.014Z,0 CVE-2024-54093,https://securityvulnerability.io/vulnerability/CVE-2024-54093,Heap-Based Buffer Overflow Vulnerability Affects Solid Edge SE2024,"A heap-based buffer overflow vulnerability exists in Solid Edge SE2024 which affects all versions prior to V224.0 Update 5. This flaw is triggered while processing specially crafted ASM files, which can lead to potential code execution in the context of the current process. Attackers who exploit this vulnerability could take control of the affected system, posing significant risks to users and organizations utilizing this software. Immediate updates and security measures are recommended to mitigate the threat.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,2024-12-10T13:54:18.597Z,0 CVE-2024-47942,https://securityvulnerability.io/vulnerability/CVE-2024-47942,DLL Hijacking Vulnerability Affects Solid Edge SE2024,"Solid Edge SE2024 has been found susceptible to a DLL hijacking vulnerability that affects all versions prior to V224.0 Update 9. This flaw permits an attacker to place a maliciously crafted DLL file in specific locations on the target system, which could lead to the execution of arbitrary code. The exploit of this vulnerability may result in unauthorized access and manipulation of system resources, potentially compromising the integrity and confidentiality of sensitive data.",Siemens,Solid Edge Se2024,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-12T12:49:52.230Z,0 CVE-2024-47941,https://securityvulnerability.io/vulnerability/CVE-2024-47941,Vulnerability in Solid Edge SE2024 Could Allow Execution of Code,"A vulnerability has been found in Solid Edge SE2024 that involves an out of bounds read beyond the limits of a designated structure during the processing of specially crafted PAR files. This flaw could potentially allow malicious actors to execute arbitrary code within the context of the affected application. The implications of this vulnerability underline significant security risks for users relying on this engineering software, as it may compromise the integrity and confidentiality of sensitive data.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,2024-11-12T12:49:50.990Z,0 CVE-2024-47940,https://securityvulnerability.io/vulnerability/CVE-2024-47940,Vulnerability in Solid Edge SE2024 Allows Execution of Code,"A vulnerability exists in Solid Edge SE2024 across all versions below V224.0 Update 9, which stems from an out of bounds read vulnerability during the processing of specially crafted PSM files. This oversight potentially enables an attacker to execute arbitrary code within the context of the current process. Users of the affected application should ensure they upgrade to a secured version to mitigate risks associated with this technical flaw.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,2024-11-12T12:49:49.740Z,0 CVE-2024-34773,https://securityvulnerability.io/vulnerability/CVE-2024-34773,Solid Edge PAR File Parsing Vulnerability Could Allow Code Execution,"A vulnerability exists in Solid Edge that impacts all versions prior to V224.0 Update 2, stemming from a stack overflow condition when parsing specially crafted PAR files. This vulnerability could potentially enable an attacker to execute arbitrary code within the context of the affected process, posing significant security risks to users operating these software versions. It is vital for users of Solid Edge to be aware of this vulnerability and to apply the necessary updates to mitigate any associated risks.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:03:14.388Z,0 CVE-2024-34772,https://securityvulnerability.io/vulnerability/CVE-2024-34772,Solid Edge Vulnerability: Out of Bounds Read Could Lead to Code Execution,"A vulnerability exists in Solid Edge affecting all versions prior to V224.0 Update 4. This flaw results from an out of bounds read occurring past the end of an allocated structure while processing specially crafted PAR files. An attacker exploiting this vulnerability could potentially execute arbitrary code within the context of the current process, leading to severe security implications for users running susceptible versions of the application.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:03:13.155Z,0 CVE-2024-34771,https://securityvulnerability.io/vulnerability/CVE-2024-34771,Solid Edge Vulnerability: Heap-Based Buffer Overflow in PAR File Parsing,"A heap-based buffer overflow vulnerability has been detected in Solid Edge, affecting all versions prior to V224.0 Update 2. This vulnerability arises when the application parses specially crafted PAR files. If exploited, an attacker could potentially execute arbitrary code within the context of the affected process, leading to unauthorized actions and system compromise. Organizations using affected versions of Solid Edge should take immediate action to mitigate the risk by applying the necessary updates.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:03:11.953Z,0 CVE-2024-33493,https://securityvulnerability.io/vulnerability/CVE-2024-33493,Solid Edge Vulnerability: Out of Bounds Read Could Lead to Code Execution,"A vulnerability has been identified in Solid Edge affecting all versions prior to V224.0 Update 5. The flaw allows for an out of bounds read, which occurs when specially crafted PAR files are parsed. This could potentially enable an attacker to execute arbitrary code within the context of the running process, posing significant security risks to users who have not updated to the specified version.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:02:55.387Z,0 CVE-2024-33492,https://securityvulnerability.io/vulnerability/CVE-2024-33492,Solid Edge Vulnerability: Out of Bounds Read Could Lead to Code Execution,"An out of bounds read vulnerability has been detected in Solid Edge, permitting the potential for code execution within the current process due to improperly handled data in PAR files. This security flaw affects all versions of Solid Edge prior to V224.0 Update 5, indicating that users of earlier releases are at increased risk if they process maliciously crafted PAR files. Addressing this vulnerability is critical to maintaining the integrity and security of the system.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:02:54.177Z,0 CVE-2024-33491,https://securityvulnerability.io/vulnerability/CVE-2024-33491,Solid Edge Vulnerability: Out of Bounds Read Could Lead to Code Execution,"A significant vulnerability has been identified in Solid Edge applications, specifically affecting all versions prior to V224.0 Update 5. The issue arises from an out of bounds read, which occurs when parsing specially crafted PAR files. This vulnerability could potentially enable an attacker to execute arbitrary code within the context of the current process, thereby compromising the integrity and security of the affected application. Users are advised to update their software to mitigate this risk.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:02:52.964Z,0 CVE-2024-33490,https://securityvulnerability.io/vulnerability/CVE-2024-33490,Solid Edge Vulnerability: Out of Bounds Read Could Lead to Code Execution,"A security flaw has been identified in Solid Edge where an out of bounds read occurs past the end of an allocated structure during the parsing of specially crafted PAR files. This vulnerability opens the door for potential code execution within the context of the currently running process, posing a significant risk for affected users. Users of Solid Edge versions prior to V224.0 Update 5 should take prompt action to mitigate this risk, as the exploitation of this vulnerability could lead to unauthorized access and control over affected systems.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:02:51.775Z,0 CVE-2024-33489,https://securityvulnerability.io/vulnerability/CVE-2024-33489,Solid Edge Vulnerability: Heap-Based Buffer Overflow in PAR File Parsing,"A significant vulnerability exists in Solid Edge, affecting all versions prior to V224.0 Update 5. This flaw is attributed to a heap-based buffer overflow when the application processes specially crafted PAR files. If exploited, this vulnerability enables an attacker to execute arbitrary code with the permissions of the current process, potentially leading to severe security risks and breaches. Users of affected versions are strongly advised to apply the latest updates to mitigate the risk.",Siemens,Solid Edge,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:02:50.566Z,0 CVE-2023-49125,https://securityvulnerability.io/vulnerability/CVE-2023-49125,Parasolid Vulnerability Could Allow Execution of Code,"A vulnerability exists in multiple versions of Siemens' Parasolid and Solid Edge products, characterized by an out of bounds read past the end of an allocated structure. This issue arises during the parsing of specially crafted XT format files, which may allow an attacker to execute arbitrary code within the context of the current process. It is essential for organizations using these applications to review the affected versions and apply the necessary updates to mitigate potential exploitation.",Siemens,"Parasolid V35.0,Parasolid V35.1,Parasolid V36.0,Solid Edge Se2023,Solid Edge Se2024",7.8,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,2024-02-13T08:59:57.813Z,0 CVE-2023-49129,https://securityvulnerability.io/vulnerability/CVE-2023-49129,Stack Overflow Vulnerability in Solid Edge SE2023 by Siemens,"A stack overflow vulnerability has been found in Solid Edge SE2023, specifically affecting all versions prior to V223.0 Update 10. This security issue arises during the processing of specially crafted PAR files, potentially allowing attackers to execute arbitrary code within the context of the affected process. Users and administrators should ensure they are using the latest updates to mitigate risks associated with this vulnerability.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0010100000072270632,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49132,https://securityvulnerability.io/vulnerability/CVE-2023-49132,Uninitialized Pointer Access Vulnerability in Solid Edge by Siemens,"A vulnerability has been found in Solid Edge SE2023, specifically in all versions prior to V223.0 Update 10. This issue stems from the application’s handling of specially crafted PAR files, which can lead to uninitialized pointer access. This flaw may provide an attacker with the ability to execute arbitrary code within the context of the affected process, potentially compromising system integrity and security.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49131,https://securityvulnerability.io/vulnerability/CVE-2023-49131,Uninitialized Pointer Access in Solid Edge SE2023 by Siemens,"A vulnerability identified in Solid Edge SE2023 affects all versions prior to V223.0 Update 10. This vulnerability arises from uninitialized pointer access when the application parses specially crafted PAR files. An attacker can exploit this weakness to execute arbitrary code within the context of the current process, potentially leading to unauthorized access or manipulation of system functions.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49130,https://securityvulnerability.io/vulnerability/CVE-2023-49130,Uninitialized Pointer Access Vulnerability in Solid Edge by Siemens,"A vulnerability has been identified in Solid Edge SE2023, where uninitialized pointer access occurs while parsing specially crafted PAR files. This presents an opportunity for an attacker to exploit the flaw, potentially leading to code execution within the context of the currently running process. Users of Solid Edge SE2023 versions prior to V223.0 Update 10 are advised to apply available patches and updates to mitigate risks associated with this vulnerability.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49126,https://securityvulnerability.io/vulnerability/CVE-2023-49126,Out of Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A security vulnerability has been discovered in Solid Edge SE2023 affecting all versions prior to V223.0 Update 10. This vulnerability involves an out of bounds read issue that occurs when the application parses specially crafted PAR files. The flaw could allow an attacker to execute arbitrary code within the context of the affected process, potentially leading to unauthorized access and control over the system. Mitigation measures are essential to protect against potential exploitation.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49122,https://securityvulnerability.io/vulnerability/CVE-2023-49122,Heap-Based Buffer Overflow in Solid Edge SE2023 by Siemens,"A vulnerability exists in Solid Edge SE2023, specifically in all versions prior to V223.0 Update 10. This flaw is characterized by a heap-based buffer overflow that occurs when the application processes specially crafted PAR files. If exploited, this vulnerability has the potential to allow an attacker to execute arbitrary code within the context of the affected process, posing serious risks to system integrity and security.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49127,https://securityvulnerability.io/vulnerability/CVE-2023-49127,Out-of-Bounds Read Vulnerability in Siemens Solid Edge SE2023,"A vulnerability has been found in Siemens Solid Edge SE2023, specifically affecting all versions prior to V223.0 Update 10. This vulnerability arises from an out-of-bounds read caused by the parsing of specially crafted PAR files. An attacker could potentially exploit this flaw to execute arbitrary code in the context of the running process, thereby compromising the security of the affected system. It is crucial for users to apply the necessary updates to safeguard their applications from potential exploits. For further details, please refer to the official Siemens security advisory.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49121,https://securityvulnerability.io/vulnerability/CVE-2023-49121,Heap-Based Buffer Overflow in Solid Edge SE2023 from Siemens,"A vulnerability has been found in Solid Edge SE2023, specifically affecting all versions prior to V223.0 Update 10. The issue is related to a heap-based buffer overflow that occurs when the application processes specially crafted PAR files. Successful exploitation of this vulnerability may enable an attacker to execute arbitrary code within the context of the current process, potentially compromising system integrity and functionality.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49124,https://securityvulnerability.io/vulnerability/CVE-2023-49124,Out of Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability exists in Solid Edge SE2023, specifically in all versions earlier than V223.0 Update 10. The flaw arises due to an out-of-bounds read occurring beyond the allocated structure's end while processing specially crafted PAR files. This critical design oversight can potentially permit an attacker to execute arbitrary code within the context of the current process, posing serious security risks for users of the affected software. Immediate action is recommended to mitigate the risks associated with this vulnerability.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-49128,https://securityvulnerability.io/vulnerability/CVE-2023-49128,Out-of-Bounds Write Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability has been detected in Solid Edge SE2023 that involves an out-of-bounds write resulting from improper handling of specially crafted PAR files. This flaw arises when the application processes data beyond the limits of allocated buffers, which can potentially lead to unauthorized code execution within the context of the affected application. Users of all versions earlier than V223.0 Update 10 should consider applying the latest updates to mitigate this security risk.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0