cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-51745,https://securityvulnerability.io/vulnerability/CVE-2023-51745,Stack Overflow Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"A stack overflow vulnerability has been discovered in JT2Go and Teamcenter Visualization applications from Siemens. This issue arises while processing specially crafted CGM files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. The vulnerability impacts various versions of JT2Go and Teamcenter Visualization, emphasizing the need for users to update to the latest secure versions to mitigate any risks.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0010100000072270632,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-51746,https://securityvulnerability.io/vulnerability/CVE-2023-51746,Stack Overflow Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"A stack overflow vulnerability has been detected in various versions of JT2Go and Teamcenter Visualization applications. This vulnerability arises from improper parsing of specially crafted CGM files, which could enable an attacker to execute arbitrary code in the context of the affected application process. Users of JT2Go and Teamcenter Visualization should ensure they are using the updated versions to mitigate potential risks associated with this security issue.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0010100000072270632,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-51439,https://securityvulnerability.io/vulnerability/CVE-2023-51439,Out of Bounds Read Vulnerability in JT2Go and Teamcenter Visualization Products,"A vulnerability has been identified in Siemens' JT2Go and Teamcenter Visualization applications, characterized by an out of bounds read error triggered during the parsing of specially crafted CGM files. This flaw affects multiple versions of these products, potentially allowing an attacker to execute code within the context of the running process. Users of JT2Go and various Teamcenter Visualization versions are advised to update to the latest patches to mitigate this security risk.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-51744,https://securityvulnerability.io/vulnerability/CVE-2023-51744,Null Pointer Dereference Vulnerability in JT2Go and Teamcenter Visualization Products,"A significant vulnerability exists in JT2Go and various versions of Teamcenter Visualization due to a null pointer dereference issue during the processing of specially crafted CGM files. This flaw can be exploited by an attacker to disrupt the application's functionality, potentially leading to a denial of service scenario where the application crashes when processing harmful CGM data.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",5.5,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-38072,https://securityvulnerability.io/vulnerability/CVE-2023-38072,Out of Bounds Write Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"An out of bounds write vulnerability has been detected in various Siemens applications, including JT2Go and Teamcenter Visualization products. This flaw occurs when the affected applications improperly manage memory while parsing specially crafted WRL files. An attacker could exploit this weakness to execute arbitrary code in the context of the current process, potentially leading to unauthorized access or control over the application.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006799999973736703,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38071,https://securityvulnerability.io/vulnerability/CVE-2023-38071,Heap-Based Buffer Overflow Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A heap-based buffer overflow vulnerability has been discovered in Siemens JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation products. This vulnerability occurs while parsing specially crafted WRL files, potentially allowing attackers to execute arbitrary code within the context of the affected process. Users of these applications should assess their current versions and apply necessary updates to mitigate the risks associated with this exploit.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.000699999975040555,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38070,https://securityvulnerability.io/vulnerability/CVE-2023-38070,Stack-Based Buffer Overflow in JT2Go and Teamcenter Visualization by Siemens,"A stack-based buffer overflow vulnerability has been detected in certain versions of JT2Go and Teamcenter Visualization from Siemens. The flaw occurs while processing specially crafted WRL files, which could allow an attacker to execute arbitrary code within the context of the affected application. Various versions are impacted, necessitating immediate attention and patches to mitigate potential exploitation.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0010499999625608325,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38075,https://securityvulnerability.io/vulnerability/CVE-2023-38075,Use-After-Free Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A use-after-free vulnerability has been discovered in several Siemens products, including JT2Go and various versions of Teamcenter Visualization and Tecnomatix Plant Simulation. This vulnerability can be exploited while parsing specially crafted WRL files, potentially allowing an attacker to execute arbitrary code within the context of the affected application process. Users are advised to update their software to the latest versions to mitigate any risks associated with this vulnerability.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0008800000068731606,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38074,https://securityvulnerability.io/vulnerability/CVE-2023-38074,Type Confusion Vulnerability in Siemens Visualization and Simulation Products,"A type confusion vulnerability has been discovered in several Siemens products, including Teamcenter Visualization and Tecnomatix Plant Simulation. This vulnerability occurs while the applications parse WRL files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. It impacts numerous versions, underscoring the need for users to apply necessary patches and updates to safeguard their systems.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38073,https://securityvulnerability.io/vulnerability/CVE-2023-38073,Type Confusion Vulnerability in Siemens JT2Go and Teamcenter Visualization,"A type confusion vulnerability exists in the parsing of WRL files within Siemens JT2Go and Teamcenter Visualization applications. Attackers may exploit this flaw to execute arbitrary code within the context of the affected process. This vulnerability impacts multiple versions of both JT2Go and various releases of Teamcenter Visualization, making it crucial for users to update to the latest versions to safeguard their systems.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38076,https://securityvulnerability.io/vulnerability/CVE-2023-38076,Heap-Based Buffer Overflow in JT2Go and Teamcenter Visualization Applications,"A vulnerability has been identified in multiple versions of JT2Go and Teamcenter Visualization applications, as well as Tecnomatix Plant Simulation. This security flaw is characterized by a heap-based buffer overflow that occurs when the applications process specially crafted WRL files. Exploiting this vulnerability could enable an attacker to execute arbitrary code within the context of the affected process, potentially leading to unauthorized actions and data breaches.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0007399999885819852,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-28830,https://securityvulnerability.io/vulnerability/CVE-2023-28830,Use-After-Free Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A vulnerability exists in Siemens JT2Go, Solid Edge, and Teamcenter Visualization products prior to specified versions. The flaw arises from improper handling during the parsing of specially crafted ASM files, which leads to a use-after-free condition. This oversight may allow an attacker to execute arbitrary code within the context of the affected application process, potentially leading to unauthorized actions or data breaches.",Siemens,"Jt2go,Solid Edge Se2022,Solid Edge Se2023,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-33122,https://securityvulnerability.io/vulnerability/CVE-2023-33122,Out of Bounds Read Vulnerability in JT2Go and Teamcenter Visualization Products by Siemens,"An out of bounds read vulnerability has been found in several versions of JT2Go and Teamcenter Visualization products by Siemens. This issue arises while parsing specially crafted CGM files, where the applications attempt to read data beyond the allocated buffer. This can potentially allow attackers to access sensitive information, posing a security risk to users of the affected software versions.",Siemens,"JT2Go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",5.5,MEDIUM,0.0005600000149570405,false,,false,false,false,,false,false,2023-06-13T09:15:00.000Z,0 CVE-2023-33121,https://securityvulnerability.io/vulnerability/CVE-2023-33121,Null Pointer Dereference Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"A null pointer dereference vulnerability has been discovered in JT2Go and various versions of Teamcenter Visualization from Siemens. This vulnerability occurs when the applications attempt to parse specially crafted CGM files. If successfully exploited, an attacker could crash the application, leading to a denial of service condition, effectively disrupting normal operations.",Siemens,"JT2Go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",5.5,MEDIUM,0.0005200000014156103,false,,false,false,false,,false,false,2023-06-13T09:15:00.000Z,0 CVE-2023-33123,https://securityvulnerability.io/vulnerability/CVE-2023-33123,Out-of-bounds Read Vulnerability in Siemens Visualization Products,"A vulnerability exists in certain versions of Siemens JT2Go and Teamcenter Visualization products that allows for an out-of-bounds read due to improper handling of specially crafted CGM files. An attacker could exploit this issue to potentially execute code within the context of the application, posing significant risks to the integrity and confidentiality of the system. Users are advised to update to the latest versions to mitigate this risk.",Siemens,"JT2Go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0006000000284984708,false,,false,false,false,,false,false,2023-06-13T09:15:00.000Z,0 CVE-2023-33124,https://securityvulnerability.io/vulnerability/CVE-2023-33124,Memory Corruption Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A vulnerability exists in Siemens JT2Go and Teamcenter Visualization products which allows for memory corruption during the parsing of specially crafted CGM files. This can potentially enable an attacker to execute arbitrary code within the context of the current process, posing significant security risks to users of these applications. Users are advised to upgrade to the latest versions to mitigate this vulnerability.",Siemens,"JT2Go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0006000000284984708,false,,false,false,false,,false,false,2023-06-13T09:15:00.000Z,0 CVE-2022-3161,https://securityvulnerability.io/vulnerability/CVE-2022-3161,Memory Corruption Vulnerability in Siemens APDFL.dll,"The vulnerability in APDFL.dll arises from improper handling of specially crafted PDF files, which can lead to memory corruption. If exploited, this flaw enables an attacker to execute arbitrary code within the context of the vulnerable process, potentially compromising system integrity and security.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",7.8,HIGH,0.0008500000112690032,false,,false,false,false,,false,false,2023-01-13T00:17:06.310Z,0 CVE-2022-3160,https://securityvulnerability.io/vulnerability/CVE-2022-3160,Out-of-Bounds Write Vulnerability in APDFL.dll Affects Siemens Products,"The APDFL.dll component used in Siemens products contains a vulnerability that allows for an out-of-bounds write condition. This arises when processing specially crafted PDF files, leading to potential execution of arbitrary code within the current process. Attackers can exploit this flaw to manipulate the heap, enabling unauthorized operations that may compromise system integrity and security.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",7.8,HIGH,0.0010499999625608325,false,,false,false,false,,false,false,2023-01-13T00:16:30.069Z,0 CVE-2022-3159,https://securityvulnerability.io/vulnerability/CVE-2022-3159,Buffer Overflow Vulnerability in Siemens PDF Processing Component,"The APDFL.dll component in Siemens products is susceptible to a stack-based buffer overflow when processing specially crafted PDF files. This vulnerability allows an attacker to potentially execute arbitrary code within the context of the running process, posing a significant risk. Users are urged to review and apply the latest security updates to mitigate possible exploitation.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",7.8,HIGH,0.0012000000569969416,false,,false,false,false,,false,false,2023-01-13T00:15:15.775Z,0 CVE-2022-41283,https://securityvulnerability.io/vulnerability/CVE-2022-41283,Out of Bounds Write in CGM File Parsing in Siemens Products,"An out of bounds write vulnerability has been identified in the CGM_NIST_Loader.dll of Siemens JT2Go and various versions of Teamcenter Visualization. This issue arises during the parsing of a CGM file, potentially allowing an attacker to execute arbitrary code within the context of the current process. Users of affected versions are advised to apply available updates to mitigate risks associated with this vulnerability.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-41278,https://securityvulnerability.io/vulnerability/CVE-2022-41278,Null Pointer Dereference Vulnerability in Siemens Visualization Products,"A null pointer dereference vulnerability exists in the CGM_NIST_Loader.dll of Siemens JT2Go and Teamcenter Visualization applications, which are present in multiple versions prior to specified thresholds. This flaw can be exploited when specially crafted CGM files are parsed, potentially leading to application crashes and denial of service. Users of affected products should update to the appropriate versions to mitigate this risk.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",3.3,LOW,0.00046999999904073775,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-41279,https://securityvulnerability.io/vulnerability/CVE-2022-41279,Null Pointer Dereference in JT2Go and Teamcenter Visualization by Siemens,"A critical vulnerability has been discovered within JT2Go and Teamcenter Visualization products from Siemens, related to the CGM_NIST_Loader.dll component. This issue arises due to a null pointer dereference when specially crafted CGM files are parsed. Exploitation of this vulnerability allows an attacker to crash the application, leading to a denial of service condition, which potentially hampers productivity and requires manual intervention to recover the affected services.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",3.3,LOW,0.00046999999904073775,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-41280,https://securityvulnerability.io/vulnerability/CVE-2022-41280,Null Pointer Dereference Vulnerability in Siemens Visualization Products,"A null pointer dereference vulnerability has been discovered in JT2Go and multiple versions of Teamcenter Visualization software from Siemens. The issue resides within the CGM_NIST_Loader.dll component when parsing specially crafted CGM files. Exploitation of this vulnerability can lead to a denial of service, potentially crashing the application and disrupting services reliant on these visualization tools.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",3.3,LOW,0.00046999999904073775,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-41281,https://securityvulnerability.io/vulnerability/CVE-2022-41281,Out of Bounds Read Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"An out of bounds read vulnerability exists in the CGM_NIST_Loader.dll of the JT2Go and Teamcenter Visualization products. This issue affects multiple versions of the software and allows an attacker to exploit the vulnerability by crafting a malicious CGM file. When the vulnerable software attempts to parse this file, it may lead to read access violations, allowing the attacker to execute arbitrary code within the context of the affected application. It is crucial for users to update their software to the latest versions to mitigate potential security risks.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0 CVE-2022-41284,https://securityvulnerability.io/vulnerability/CVE-2022-41284,Out of Bounds Read Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"A vulnerability exists in the CGM_NIST_Loader.dll associated with JT2Go and various versions of Teamcenter Visualization. This out of bounds read vulnerability arises while parsing CGM files, potentially allowing an attacker to exploit the flaw to execute arbitrary code within the context of the affected process. Users of vulnerable versions are strongly advised to update their software to mitigate risks associated with this vulnerability.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1",7.8,HIGH,0.00046999999904073775,false,,false,false,false,,false,false,2022-12-13T00:00:00.000Z,0