cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-54095,https://securityvulnerability.io/vulnerability/CVE-2024-54095,Integer Underflow Vulnerability in Solid Edge SE2024 Could Allow Code Execution,"A vulnerability exists in Solid Edge SE2024 affecting all versions prior to V224.0 Update 10. This vulnerability is an integer underflow that can be exploited by attackers through specially crafted PAR files. When the application parses these files, it may enable the execution of arbitrary code within the context of the current process, posing significant risks to system integrity and user data.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,2024-12-10T13:54:21.335Z,0 CVE-2024-54094,https://securityvulnerability.io/vulnerability/CVE-2024-54094,Heap-Based Buffer Overflow Vulnerability Affects Solid Edge SE2024,"A heap-based buffer overflow vulnerability exists in Siemens' Solid Edge SE2024, impacting all versions prior to V224.0 Update 5. This vulnerability arises during the processing of specially crafted PAR files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. Prompt mitigation measures are advisable to safeguard systems against exploitation of this flaw.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,2024-12-10T13:54:20.014Z,0 CVE-2024-54093,https://securityvulnerability.io/vulnerability/CVE-2024-54093,Heap-Based Buffer Overflow Vulnerability Affects Solid Edge SE2024,"A heap-based buffer overflow vulnerability exists in Solid Edge SE2024 which affects all versions prior to V224.0 Update 5. This flaw is triggered while processing specially crafted ASM files, which can lead to potential code execution in the context of the current process. Attackers who exploit this vulnerability could take control of the affected system, posing significant risks to users and organizations utilizing this software. Immediate updates and security measures are recommended to mitigate the threat.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,false,false,2024-12-10T13:54:18.597Z,0 CVE-2024-47942,https://securityvulnerability.io/vulnerability/CVE-2024-47942,DLL Hijacking Vulnerability Affects Solid Edge SE2024,"Solid Edge SE2024 has been found susceptible to a DLL hijacking vulnerability that affects all versions prior to V224.0 Update 9. This flaw permits an attacker to place a maliciously crafted DLL file in specific locations on the target system, which could lead to the execution of arbitrary code. The exploit of this vulnerability may result in unauthorized access and manipulation of system resources, potentially compromising the integrity and confidentiality of sensitive data.",Siemens,Solid Edge Se2024,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-12T12:49:52.230Z,0 CVE-2024-47941,https://securityvulnerability.io/vulnerability/CVE-2024-47941,Vulnerability in Solid Edge SE2024 Could Allow Execution of Code,"A vulnerability has been found in Solid Edge SE2024 that involves an out of bounds read beyond the limits of a designated structure during the processing of specially crafted PAR files. This flaw could potentially allow malicious actors to execute arbitrary code within the context of the affected application. The implications of this vulnerability underline significant security risks for users relying on this engineering software, as it may compromise the integrity and confidentiality of sensitive data.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,2024-11-12T12:49:50.990Z,0 CVE-2024-47940,https://securityvulnerability.io/vulnerability/CVE-2024-47940,Vulnerability in Solid Edge SE2024 Allows Execution of Code,"A vulnerability exists in Solid Edge SE2024 across all versions below V224.0 Update 9, which stems from an out of bounds read vulnerability during the processing of specially crafted PSM files. This oversight potentially enables an attacker to execute arbitrary code within the context of the current process. Users of the affected application should ensure they upgrade to a secured version to mitigate risks associated with this technical flaw.",Siemens,Solid Edge Se2024,7.8,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,2024-11-12T12:49:49.740Z,0 CVE-2023-49125,https://securityvulnerability.io/vulnerability/CVE-2023-49125,Parasolid Vulnerability Could Allow Execution of Code,"A vulnerability exists in multiple versions of Siemens' Parasolid and Solid Edge products, characterized by an out of bounds read past the end of an allocated structure. This issue arises during the parsing of specially crafted XT format files, which may allow an attacker to execute arbitrary code within the context of the current process. It is essential for organizations using these applications to review the affected versions and apply the necessary updates to mitigate potential exploitation.",Siemens,"Parasolid V35.0,Parasolid V35.1,Parasolid V36.0,Solid Edge Se2023,Solid Edge Se2024",7.8,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,2024-02-13T08:59:57.813Z,0