cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-28830,https://securityvulnerability.io/vulnerability/CVE-2023-28830,Use-After-Free Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A vulnerability exists in Siemens JT2Go, Solid Edge, and Teamcenter Visualization products prior to specified versions. The flaw arises from improper handling during the parsing of specially crafted ASM files, which leads to a use-after-free condition. This oversight may allow an attacker to execute arbitrary code within the context of the affected application process, potentially leading to unauthorized actions or data breaches.",Siemens,"Jt2go,Solid Edge Se2022,Solid Edge Se2023,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-24555,https://securityvulnerability.io/vulnerability/CVE-2023-24555,Out of Bounds Read in Solid Edge SE2022 and SE2023,"A vulnerability exists in Solid Edge SE2022 and SE2023 that involves an out of bounds read past the end of an allocated structure, which occurs during the parsing of specially crafted PAR files. This flaw could be exploited by attackers, enabling them to execute code within the context of the active process. Organizations using affected versions must implement security measures to mitigate the potential risks associated with this vulnerability.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24561,https://securityvulnerability.io/vulnerability/CVE-2023-24561,Uninitialized Pointer Access Vulnerability in Siemens Solid Edge Software,"A vulnerability exists in Siemens Solid Edge software affecting SE2022 and SE2023 versions, which is susceptible to uninitialized pointer access. This flaw arises when parsing specially crafted PAR files, potentially enabling an attacker to execute arbitrary code within the context of the current process. Users are advised to update to the latest versions to mitigate the risk associated with this vulnerability.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24562,https://securityvulnerability.io/vulnerability/CVE-2023-24562,Uninitialized Pointer Access Vulnerability in Solid Edge by Siemens,"A vulnerability has been found in Solid Edge SE2022 and SE2023 that allows uninitialized pointer access while handling specifically designed PAR files. This flaw could enable an attacker to execute arbitrary code within the context of the running process, posing significant security risks to users of impacted Solid Edge versions.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24563,https://securityvulnerability.io/vulnerability/CVE-2023-24563,Uninitialized Pointer Access Vulnerability in Solid Edge by Siemens,"A vulnerability has been discovered in Solid Edge, specifically affecting versions prior to V222.0MP12 for SE2022 and V223.0Update2 for SE2023. This issue arises from uninitialized pointer access during the parsing of specially crafted PAR files. If exploited, this vulnerability could enable an attacker to execute arbitrary code within the context of the current process, potentially leading to unauthorized actions or system compromise.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24564,https://securityvulnerability.io/vulnerability/CVE-2023-24564,Memory Corruption Vulnerability in Solid Edge by Siemens,"A memory corruption vulnerability has been discovered in Solid Edge SE2022 and SE2023 when processing specially crafted DWG files. This flaw could provide attackers with the ability to execute arbitrary code within the application’s current process context, posing significant risks to system integrity. Affected versions include all Solid Edge SE2022 versions prior to V222.0MP12 and all SE2023 versions before V223.0Update2. It is crucial for users to update their products to mitigate the risks associated with this vulnerability.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.0018599999602884054,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24565,https://securityvulnerability.io/vulnerability/CVE-2023-24565,Out of Bounds Read Vulnerability in Solid Edge SE2022 and SE2023 by Siemens,"A security vulnerability has been identified in Solid Edge SE2022 and SE2023 that allows for an out of bounds read past the end of an allocated buffer when processing specially crafted STL files. This flaw may enable an attacker to read sensitive data, posing a risk to the confidentiality of information handled within the application. Users of impacted versions are advised to apply the necessary updates to mitigate potential exploitation.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",3.3,LOW,0.0009200000204145908,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24566,https://securityvulnerability.io/vulnerability/CVE-2023-24566,Stack-Based Buffer Vulnerability in Solid Edge Products by Siemens,"A stack-based buffer overflow vulnerability has been identified in Solid Edge versions prior to V222.0MP12 and V223.0Update2. This weakness arises from the application's inability to properly parse specially crafted PAR files, resulting in the possibility for an attacker to execute arbitrary code within the context of the affected process. Organizations using these versions of Solid Edge should implement immediate patches and review their security measures to mitigate potential exploitation.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",3.3,LOW,0.001509999972768128,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24581,https://securityvulnerability.io/vulnerability/CVE-2023-24581,Use-After-Free Vulnerability in Solid Edge Products by Siemens,"A use-after-free vulnerability has been identified in Solid Edge SE2022 and SE2023, which could be exploited through specially crafted STP files. Attackers leveraging this flaw could execute arbitrary code within the context of the affected process, posing significant risks to sensitive data and system integrity.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.005590000189840794,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-25140,https://securityvulnerability.io/vulnerability/CVE-2023-25140,Out of Bounds Read Vulnerability in Parasolid and Solid Edge Products,"A significant vulnerability has been found in multiple versions of Parasolid and Solid Edge products. This issue arises from an out of bounds read, which occurs during the parsing of specially crafted PAR files. The flaw allows attackers to exploit the vulnerability, potentially executing arbitrary code within the context of the affected process. Users of the impacted versions are strongly encouraged to apply the necessary updates to safeguard their systems against potential exploitation.",Siemens,"Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Solid Edge SE2022",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24549,https://securityvulnerability.io/vulnerability/CVE-2023-24549,Stack-Based Buffer Overflow in Siemens Solid Edge SE2022 and SE2023,"A stack-based buffer overflow vulnerability exists in Siemens Solid Edge SE2022 and SE2023, which affects all versions before specified updates. This vulnerability can be exploited when parsing specially crafted PAR files. An attacker could potentially execute arbitrary code within the context of the application process, leading to unauthorized access and control over the affected system. It is crucial for users of Solid Edge to apply the necessary updates as outlined in Siemens' security advisories to mitigate this risk.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.0006399999838322401,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24550,https://securityvulnerability.io/vulnerability/CVE-2023-24550,Heap-based Buffer Overflow in Siemens Solid Edge Products,"A heap-based buffer overflow vulnerability has been detected in Siemens Solid Edge applications affecting versions prior to V222.0MP12 for SE2022 and V223.0Update2 for SE2023. This flaw arises during the parsing of specially crafted PAR files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. It is essential for users to update their software to mitigate any risks associated with this vulnerability.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24551,https://securityvulnerability.io/vulnerability/CVE-2023-24551,Heap-Based Buffer Underflow Vulnerability in Siemens Solid Edge Products,"A heap-based buffer underflow vulnerability has been detected in Siemens Solid Edge products, affecting versions prior to V222.0MP12 for SE2022 and V223.0Update2 for SE2023. This vulnerability arises during the parsing of specially crafted PAR files, which could allow an attacker to execute arbitrary code within the context of the application process. It underscores the importance of applying the latest security updates to mitigate potential exploitation risks.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24552,https://securityvulnerability.io/vulnerability/CVE-2023-24552,Out of Bounds Read Vulnerability in Siemens Solid Edge Product Line,"A significant vulnerability exists in the Siemens Solid Edge product line, specifically in the SE2022 and SE2023 versions prior to their respective updates. This flaw arises from an out of bounds read condition while processing a malformed PAR file, potentially allowing an attacker to execute arbitrary code within the context of the application. Users are encouraged to upgrade to the latest patched versions to mitigate the risk associated with this vulnerability.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24553,https://securityvulnerability.io/vulnerability/CVE-2023-24553,Out of Bounds Read Vulnerability in Siemens Solid Edge Products,"An out of bounds read vulnerability has been detected in Siemens Solid Edge applications, specifically in versions prior to V222.0MP12 for SE2022 and V223.0Update2 for SE2023. This flaw arises when the applications attempt to parse specially crafted PAR files, potentially leading to a code execution scenario within the context of the running process. Attackers exploiting this vulnerability could gain unauthorized access and execute malicious code, posing significant security risks to affected systems.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24554,https://securityvulnerability.io/vulnerability/CVE-2023-24554,Out of Bounds Read in Siemens Solid Edge Software,"A flaw has been discovered in Siemens Solid Edge software that allows for an out of bounds read while handling specifically crafted PAR files. This vulnerability affects all versions of Solid Edge SE2022 prior to V222.0MP12 and SE2023 prior to V223.0Update2. An attacker could exploit this issue, potentially leading to unauthorized code execution within the current process context. Users should upgrade to the latest versions to mitigate this risk.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24556,https://securityvulnerability.io/vulnerability/CVE-2023-24556,Out of Bounds Read Vulnerability in Solid Edge by Siemens,"A security flaw has been discovered in Siemens Solid Edge applications, where an out of bounds read can occur when processing specially crafted PAR files. This vulnerability affects Solid Edge SE2022 and SE2023, allowing potential attackers to access sensitive memory areas beyond the allocated structures. Exploiting this issue could enable them to execute arbitrary code within the context of the running process, raising concerns about the integrity and confidentiality of the affected systems. Users are encouraged to update to the latest versions to mitigate risks.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24557,https://securityvulnerability.io/vulnerability/CVE-2023-24557,Out of Bounds Read Vulnerability in Solid Edge by Siemens,"An out of bounds read vulnerability has been discovered in Solid Edge SE2022 and SE2023 that affects all versions prior to designated updates. This flaw occurs while the software parses specially crafted PAR files, leading to a read beyond allocated memory structures. If exploited, this vulnerability could enable an attacker to potentially execute arbitrary code within the context of the affected application. It is critical for users to apply the latest updates to mitigate this risk.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24558,https://securityvulnerability.io/vulnerability/CVE-2023-24558,Out of Bounds Read in Solid Edge SE2022 and SE2023 by Siemens,"An out of bounds read vulnerability exists in Solid Edge SE2022 and SE2023, which affects all versions prior to V222.0MP12 and V223.0Update2, respectively. The vulnerability arises during the parsing of specially crafted PAR files. This issue permits attackers to read beyond allocated memory, potentially allowing unauthorized code execution within the context of the affected application. Users are urged to update their software to mitigate the risks associated with this vulnerability.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24559,https://securityvulnerability.io/vulnerability/CVE-2023-24559,Out of Bounds Read Vulnerability in Solid Edge by Siemens,"An out of bounds read vulnerability exists in Siemens Solid Edge applications, specifically targeting versions of SE2022 prior to V222.0MP12 and SE2023 prior to V223.0Update2. This flaw occurs during the processing of specially crafted PAR files, which may lead to reading beyond the allocated memory structure. Exploiting this vulnerability could enable attackers to execute arbitrary code within the context of the affected process, posing significant security risks to users.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2023-24560,https://securityvulnerability.io/vulnerability/CVE-2023-24560,Out of Bounds Write Vulnerability in Solid Edge by Siemens,"A vulnerability exists in Solid Edge SE2022 and SE2023, which allows an out of bounds write past the end of an allocated buffer when parsing a specially crafted PAR file. This issue could enable an attacker to execute arbitrary code within the context of the current process, potentially compromising the security of affected systems.",Siemens,"Solid Edge SE2022,Solid Edge SE2023",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2023-02-14T11:15:00.000Z,0 CVE-2022-46349,https://securityvulnerability.io/vulnerability/CVE-2022-46349,Out-of-Bounds Read Vulnerability in Parasolid and Solid Edge Products by Siemens,"A security issue exists in multiple versions of Siemens' Parasolid and Solid Edge products, where the applications can experience an out-of-bounds read when parsing specially crafted X_B files. This flaw allows an attacker to potentially execute arbitrary code within the context of the vulnerable process. Users of these applications should take immediate action to update to the latest versions as outlined in the security advisories.",Siemens,"Parasolid V33.1,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Solid Edge Se2022,Solid Edge Se2023",7.8,HIGH,0.0006500000017695129,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-46345,https://securityvulnerability.io/vulnerability/CVE-2022-46345,Out of Bounds Write Vulnerability in Parasolid and Solid Edge Products,"A vulnerability exists in multiple versions of the Parasolid and Solid Edge software, where an out of bounds write might occur when the applications parse specially crafted X_B files. This flaw can potentially allow an attacker to execute arbitrary code within the context of the affected process, posing significant security risks to users of these applications.",Siemens,"Parasolid V33.1,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Solid Edge Se2022,Solid Edge Se2023",7.8,HIGH,0.0009699999936856329,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-46347,https://securityvulnerability.io/vulnerability/CVE-2022-46347,Out of Bounds Write Vulnerability in Parasolid and Solid Edge Products by Siemens,"A vulnerability exists in certain versions of Siemens' Parasolid and Solid Edge products due to an out of bounds write after the end of an allocated structure. This issue arises while processing specially crafted X_B files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. Users are advised to update to the latest versions to mitigate potential risks associated with this vulnerability.",Siemens,"Parasolid V33.1,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Solid Edge Se2022,Solid Edge Se2023",7.8,HIGH,0.0009699999936856329,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-46346,https://securityvulnerability.io/vulnerability/CVE-2022-46346,Out of Bounds Write Vulnerability in Parasolid and Solid Edge Products by Siemens,"A vulnerability exists in Siemens' Parasolid and Solid Edge products that allows for an out of bounds write past the end of an allocated structure when processing specially crafted X_B files. This weakness could enable attackers to execute arbitrary code within the context of the current process, raising significant security concerns for users of affected versions.",Siemens,"Parasolid V33.1,Parasolid V34.0,Parasolid V34.1,Parasolid V35.0,Solid Edge Se2022,Solid Edge Se2023",7.8,HIGH,0.0009699999936856329,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0