cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-49125,https://securityvulnerability.io/vulnerability/CVE-2023-49125,Parasolid Vulnerability Could Allow Execution of Code,"A vulnerability exists in multiple versions of Siemens' Parasolid and Solid Edge products, characterized by an out of bounds read past the end of an allocated structure. This issue arises during the parsing of specially crafted XT format files, which may allow an attacker to execute arbitrary code within the context of the current process. It is essential for organizations using these applications to review the affected versions and apply the necessary updates to mitigate potential exploitation.",Siemens,"Parasolid V35.0,Parasolid V35.1,Parasolid V36.0,Solid Edge Se2023,Solid Edge Se2024",7.8,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-02-13T08:59:57.813Z,0 CVE-2023-49130,https://securityvulnerability.io/vulnerability/CVE-2023-49130,Uninitialized Pointer Access Vulnerability in Solid Edge by Siemens,"A vulnerability has been identified in Solid Edge SE2023, where uninitialized pointer access occurs while parsing specially crafted PAR files. This presents an opportunity for an attacker to exploit the flaw, potentially leading to code execution within the context of the currently running process. Users of Solid Edge SE2023 versions prior to V223.0 Update 10 are advised to apply available patches and updates to mitigate risks associated with this vulnerability.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49121,https://securityvulnerability.io/vulnerability/CVE-2023-49121,Heap-Based Buffer Overflow in Solid Edge SE2023 from Siemens,"A vulnerability has been found in Solid Edge SE2023, specifically affecting all versions prior to V223.0 Update 10. The issue is related to a heap-based buffer overflow that occurs when the application processes specially crafted PAR files. Successful exploitation of this vulnerability may enable an attacker to execute arbitrary code within the context of the current process, potentially compromising system integrity and functionality.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49124,https://securityvulnerability.io/vulnerability/CVE-2023-49124,Out of Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability exists in Solid Edge SE2023, specifically in all versions earlier than V223.0 Update 10. The flaw arises due to an out-of-bounds read occurring beyond the allocated structure's end while processing specially crafted PAR files. This critical design oversight can potentially permit an attacker to execute arbitrary code within the context of the current process, posing serious security risks for users of the affected software. Immediate action is recommended to mitigate the risks associated with this vulnerability.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49126,https://securityvulnerability.io/vulnerability/CVE-2023-49126,Out of Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A security vulnerability has been discovered in Solid Edge SE2023 affecting all versions prior to V223.0 Update 10. This vulnerability involves an out of bounds read issue that occurs when the application parses specially crafted PAR files. The flaw could allow an attacker to execute arbitrary code within the context of the affected process, potentially leading to unauthorized access and control over the system. Mitigation measures are essential to protect against potential exploitation.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49127,https://securityvulnerability.io/vulnerability/CVE-2023-49127,Out-of-Bounds Read Vulnerability in Siemens Solid Edge SE2023,"A vulnerability has been found in Siemens Solid Edge SE2023, specifically affecting all versions prior to V223.0 Update 10. This vulnerability arises from an out-of-bounds read caused by the parsing of specially crafted PAR files. An attacker could potentially exploit this flaw to execute arbitrary code in the context of the running process, thereby compromising the security of the affected system. It is crucial for users to apply the necessary updates to safeguard their applications from potential exploits. For further details, please refer to the official Siemens security advisory.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49128,https://securityvulnerability.io/vulnerability/CVE-2023-49128,Out-of-Bounds Write Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability has been detected in Solid Edge SE2023 that involves an out-of-bounds write resulting from improper handling of specially crafted PAR files. This flaw arises when the application processes data beyond the limits of allocated buffers, which can potentially lead to unauthorized code execution within the context of the affected application. Users of all versions earlier than V223.0 Update 10 should consider applying the latest updates to mitigate this security risk.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49129,https://securityvulnerability.io/vulnerability/CVE-2023-49129,Stack Overflow Vulnerability in Solid Edge SE2023 by Siemens,"A stack overflow vulnerability has been found in Solid Edge SE2023, specifically affecting all versions prior to V223.0 Update 10. This security issue arises during the processing of specially crafted PAR files, potentially allowing attackers to execute arbitrary code within the context of the affected process. Users and administrators should ensure they are using the latest updates to mitigate risks associated with this vulnerability.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0011599999852478504,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49122,https://securityvulnerability.io/vulnerability/CVE-2023-49122,Heap-Based Buffer Overflow in Solid Edge SE2023 by Siemens,"A vulnerability exists in Solid Edge SE2023, specifically in all versions prior to V223.0 Update 10. This flaw is characterized by a heap-based buffer overflow that occurs when the application processes specially crafted PAR files. If exploited, this vulnerability has the potential to allow an attacker to execute arbitrary code within the context of the affected process, posing serious risks to system integrity and security.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49132,https://securityvulnerability.io/vulnerability/CVE-2023-49132,Uninitialized Pointer Access Vulnerability in Solid Edge by Siemens,"A vulnerability has been found in Solid Edge SE2023, specifically in all versions prior to V223.0 Update 10. This issue stems from the application’s handling of specially crafted PAR files, which can lead to uninitialized pointer access. This flaw may provide an attacker with the ability to execute arbitrary code within the context of the affected process, potentially compromising system integrity and security.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49131,https://securityvulnerability.io/vulnerability/CVE-2023-49131,Uninitialized Pointer Access in Solid Edge SE2023 by Siemens,"A vulnerability identified in Solid Edge SE2023 affects all versions prior to V223.0 Update 10. This vulnerability arises from uninitialized pointer access when the application parses specially crafted PAR files. An attacker can exploit this weakness to execute arbitrary code within the context of the current process, potentially leading to unauthorized access or manipulation of system functions.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005099999834783375,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-49123,https://securityvulnerability.io/vulnerability/CVE-2023-49123,Heap-Based Buffer Overflow Vulnerability in Solid Edge SE2023 by Siemens,"A significant vulnerability has been identified in Solid Edge SE2023, affecting all versions prior to V223.0 Update 10. The vulnerability arises from a heap-based buffer overflow that occurs when the application processes specially crafted PAR files. If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code within the context of the affected process, posing substantial security risks. Vigilant users and administrators of Solid Edge SE2023 should apply the necessary updates to mitigate potential threats.",Siemens,Solid Edge SE2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2024-01-09T10:15:00.000Z,0 CVE-2023-39419,https://securityvulnerability.io/vulnerability/CVE-2023-39419,Out of Bounds Write Vulnerability in Solid Edge SE2023 from Siemens,"An out of bounds write vulnerability has been discovered in Solid Edge SE2023, where specially crafted DFT files can cause a write past the end of an allocated structure. This flaw can result in unauthorized code execution within the context of the current process, potentially compromising system integrity and user data.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-28830,https://securityvulnerability.io/vulnerability/CVE-2023-28830,Use-After-Free Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A vulnerability exists in Siemens JT2Go, Solid Edge, and Teamcenter Visualization products prior to specified versions. The flaw arises from improper handling during the parsing of specially crafted ASM files, which leads to a use-after-free condition. This oversight may allow an attacker to execute arbitrary code within the context of the affected application process, potentially leading to unauthorized actions or data breaches.",Siemens,"Jt2go,Solid Edge Se2022,Solid Edge Se2023,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39181,https://securityvulnerability.io/vulnerability/CVE-2023-39181,Out of Bounds Write Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability exists in Solid Edge SE2023 versions prior to V223.0 Update 7, characterized by an out of bounds write beyond the end of an allocated buffer. This flaw arises when the application processes specially crafted PAR files, potentially allowing unauthorized code execution within the context of the current process. Security measures and updates are recommended to mitigate this risk.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39186,https://securityvulnerability.io/vulnerability/CVE-2023-39186,Out of Bounds Read in Solid Edge SE2023 by Siemens,"A vulnerability in Siemens Solid Edge SE2023 allows for an out of bounds read when the application processes specially crafted DFT files. This flaw occurs when the software attempts to read beyond the allocated bounds of a data structure, potentially enabling attackers to execute unauthorized code within the context of the process. Users are advised to update to V223.0 Update 7 or later to mitigate this risk.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39188,https://securityvulnerability.io/vulnerability/CVE-2023-39188,Out-of-Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability has been identified in Solid Edge SE2023 that involves an out-of-bounds read beyond the allocated structure. This issue occurs when parsing specially crafted DFT files, potentially enabling an attacker to execute code within the context of the current process. Users of affected versions should take immediate action to mitigate risks.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39187,https://securityvulnerability.io/vulnerability/CVE-2023-39187,Out of Bounds Read in Solid Edge SE2023 by Siemens,"A vulnerability exists in Solid Edge SE2023 that allows an out of bounds read past the end of an allocated structure when parsing specially crafted DFT files. This could enable an attacker to execute arbitrary code within the context of the current process, posing significant risks to system integrity and confidentiality.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39549,https://securityvulnerability.io/vulnerability/CVE-2023-39549,Use-After-Free Vulnerability in Siemens Solid Edge SE2023,"A security flaw has been discovered in Siemens' Solid Edge SE2023 that allows for a use-after-free condition. This vulnerability occurs during the processing of specially crafted DWG files, potentially enabling an attacker to execute arbitrary code within the execution context of the affected process. Users of Solid Edge SE2023 versions prior to V223.0 Update 2 are advised to take precautions to mitigate the risks associated with this vulnerability.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0006200000061653554,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39182,https://securityvulnerability.io/vulnerability/CVE-2023-39182,Out of Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability exists in Solid Edge SE2023 where an out of bounds read can occur while processing specially crafted DFT files. This flaw allows attackers to read past the end of an allocated structure, potentially leading to arbitrary code execution in the context of the affected process. This issue affects all versions prior to V223.0 Update 7 and poses a significant security risk.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39183,https://securityvulnerability.io/vulnerability/CVE-2023-39183,Out of Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A vulnerability has been discovered in Solid Edge SE2023 that permits an out of bounds read during the processing of specially crafted PSM files. This flaw arises when the application attempts to parse these files, potentially leading to the exposure of sensitive information or enabling an attacker to execute malicious code within the context of the current process. Users are advised to upgrade to the latest version to mitigate the risks associated with this vulnerability.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39184,https://securityvulnerability.io/vulnerability/CVE-2023-39184,Out of Bounds Read Vulnerability in Solid Edge by Siemens,"A vulnerability has been identified in Solid Edge SE2023 affecting all versions prior to V223.0 Update 7. The flaw occurs due to an out of bounds read past the end of an allocated structure when parsing specially crafted PSM files. This issue may allow an attacker to execute code within the context of the current process, potentially compromising the integrity and security of the affected systems.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-39185,https://securityvulnerability.io/vulnerability/CVE-2023-39185,Out of Bounds Read Vulnerability in Solid Edge SE2023 by Siemens,"A significant vulnerability has been detected in Solid Edge SE2023, where an out of bounds read occurs past the allocated structure's end during the parsing of specifically crafted PAR files. This flaw could potentially enable an attacker to execute arbitrary code within the context of the current process, posing a risk to system integrity and security.",Siemens,Solid Edge Se2023,7.8,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-08-08T10:15:00.000Z,0 CVE-2023-30985,https://securityvulnerability.io/vulnerability/CVE-2023-30985,Out of Bounds Vulnerability in Solid Edge SE2023 Product by Siemens,"A vulnerability has been discovered in Siemens Solid Edge SE2023, affecting all versions prior to V223.0 Update 3 and V223.0 Update 2. This flaw arises during the parsing of specially crafted OBJ files, leading to an out of bounds read past an allocated buffer. Exploitation of this vulnerability may allow attackers to access sensitive information from the application, potentially compromising the confidentiality and integrity of user data.",Siemens,Solid Edge Se2023,3.3,LOW,0.0004799999878741801,false,,false,false,false,,,false,false,,2023-05-09T13:15:00.000Z,0 CVE-2023-30986,https://securityvulnerability.io/vulnerability/CVE-2023-30986,Memory Corruption Vulnerability in Solid Edge SE2023 by Siemens,"A memory corruption vulnerability has been discovered in Solid Edge SE2023 that affects all versions prior to V223.0 Update 3 and V223.0 Update 2. The flaw arises during the parsing of specially crafted STP files, potentially enabling an attacker to execute arbitrary code within the current process context. Users are advised to update to the latest version to mitigate the risk associated with this vulnerability.",Siemens,Solid Edge Se2023,7.8,HIGH,0.001509999972768128,false,,false,false,false,,,false,false,,2023-05-09T13:15:00.000Z,0