cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-34086,https://securityvulnerability.io/vulnerability/CVE-2024-34086,JT2Go Teamcenter Visualization Vulnerability: Out of Bounds Write Flaw Allows Code Execution,"An out of bounds write vulnerability exists in Siemens' JT2Go and Teamcenter Visualization applications, affecting various versions. This vulnerability arises when parsing specially crafted CGM files, potentially allowing an attacker to execute arbitrary code within the context of the affected application's process. Organizations using these applications should prioritize upgrades to newer versions to mitigate the risk of exploitation.",Siemens,"Jt2go,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:03:10.774Z,0 CVE-2024-34085,https://securityvulnerability.io/vulnerability/CVE-2024-34085,JT2Go and Teamcenter Visualization Vulnerabilities,"A stack overflow vulnerability has been identified in the JT2Go application and multiple versions of Teamcenter Visualization by Siemens. This vulnerability arises when these applications parse specially crafted XML files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. The vulnerability affects JT2Go in all versions prior to V2312.0001, along with Teamcenter Visualization versions V14.1, V14.2, V14.3, and V2312, all of which require specific version updates to mitigate the risk. Organizations utilizing these products should prioritize updating to the latest versions to protect against potential exploitation.",Siemens,"Jt2go,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-14T10:03:09.574Z,0 CVE-2023-51745,https://securityvulnerability.io/vulnerability/CVE-2023-51745,Stack Overflow Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"A stack overflow vulnerability has been discovered in JT2Go and Teamcenter Visualization applications from Siemens. This issue arises while processing specially crafted CGM files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. The vulnerability impacts various versions of JT2Go and Teamcenter Visualization, emphasizing the need for users to update to the latest secure versions to mitigate any risks.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0010100000072270632,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-51744,https://securityvulnerability.io/vulnerability/CVE-2023-51744,Null Pointer Dereference Vulnerability in JT2Go and Teamcenter Visualization Products,"A significant vulnerability exists in JT2Go and various versions of Teamcenter Visualization due to a null pointer dereference issue during the processing of specially crafted CGM files. This flaw can be exploited by an attacker to disrupt the application's functionality, potentially leading to a denial of service scenario where the application crashes when processing harmful CGM data.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",5.5,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-51746,https://securityvulnerability.io/vulnerability/CVE-2023-51746,Stack Overflow Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"A stack overflow vulnerability has been detected in various versions of JT2Go and Teamcenter Visualization applications. This vulnerability arises from improper parsing of specially crafted CGM files, which could enable an attacker to execute arbitrary code in the context of the affected application process. Users of JT2Go and Teamcenter Visualization should ensure they are using the updated versions to mitigate potential risks associated with this security issue.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0010100000072270632,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-51439,https://securityvulnerability.io/vulnerability/CVE-2023-51439,Out of Bounds Read Vulnerability in JT2Go and Teamcenter Visualization Products,"A vulnerability has been identified in Siemens' JT2Go and Teamcenter Visualization applications, characterized by an out of bounds read error triggered during the parsing of specially crafted CGM files. This flaw affects multiple versions of these products, potentially allowing an attacker to execute code within the context of the running process. Users of JT2Go and various Teamcenter Visualization versions are advised to update to the latest patches to mitigate this security risk.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,2024-01-09T10:15:00.000Z,0 CVE-2023-38071,https://securityvulnerability.io/vulnerability/CVE-2023-38071,Heap-Based Buffer Overflow Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A heap-based buffer overflow vulnerability has been discovered in Siemens JT2Go, Teamcenter Visualization, and Tecnomatix Plant Simulation products. This vulnerability occurs while parsing specially crafted WRL files, potentially allowing attackers to execute arbitrary code within the context of the affected process. Users of these applications should assess their current versions and apply necessary updates to mitigate the risks associated with this exploit.",Siemens,"Jt2go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.000699999975040555,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38070,https://securityvulnerability.io/vulnerability/CVE-2023-38070,Stack-Based Buffer Overflow in JT2Go and Teamcenter Visualization by Siemens,"A stack-based buffer overflow vulnerability has been detected in certain versions of JT2Go and Teamcenter Visualization from Siemens. The flaw occurs while processing specially crafted WRL files, which could allow an attacker to execute arbitrary code within the context of the affected application. Various versions are impacted, necessitating immediate attention and patches to mitigate potential exploitation.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0010499999625608325,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38076,https://securityvulnerability.io/vulnerability/CVE-2023-38076,Heap-Based Buffer Overflow in JT2Go and Teamcenter Visualization Applications,"A vulnerability has been identified in multiple versions of JT2Go and Teamcenter Visualization applications, as well as Tecnomatix Plant Simulation. This security flaw is characterized by a heap-based buffer overflow that occurs when the applications process specially crafted WRL files. Exploiting this vulnerability could enable an attacker to execute arbitrary code within the context of the affected process, potentially leading to unauthorized actions and data breaches.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0007399999885819852,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38075,https://securityvulnerability.io/vulnerability/CVE-2023-38075,Use-After-Free Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A use-after-free vulnerability has been discovered in several Siemens products, including JT2Go and various versions of Teamcenter Visualization and Tecnomatix Plant Simulation. This vulnerability can be exploited while parsing specially crafted WRL files, potentially allowing an attacker to execute arbitrary code within the context of the affected application process. Users are advised to update their software to the latest versions to mitigate any risks associated with this vulnerability.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0008800000068731606,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38074,https://securityvulnerability.io/vulnerability/CVE-2023-38074,Type Confusion Vulnerability in Siemens Visualization and Simulation Products,"A type confusion vulnerability has been discovered in several Siemens products, including Teamcenter Visualization and Tecnomatix Plant Simulation. This vulnerability occurs while the applications parse WRL files, potentially allowing an attacker to execute arbitrary code within the context of the affected process. It impacts numerous versions, underscoring the need for users to apply necessary patches and updates to safeguard their systems.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38073,https://securityvulnerability.io/vulnerability/CVE-2023-38073,Type Confusion Vulnerability in Siemens JT2Go and Teamcenter Visualization,"A type confusion vulnerability exists in the parsing of WRL files within Siemens JT2Go and Teamcenter Visualization applications. Attackers may exploit this flaw to execute arbitrary code within the context of the affected process. This vulnerability impacts multiple versions of both JT2Go and various releases of Teamcenter Visualization, making it crucial for users to update to the latest versions to safeguard their systems.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38072,https://securityvulnerability.io/vulnerability/CVE-2023-38072,Out of Bounds Write Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"An out of bounds write vulnerability has been detected in various Siemens applications, including JT2Go and Teamcenter Visualization products. This flaw occurs when the affected applications improperly manage memory while parsing specially crafted WRL files. An attacker could exploit this weakness to execute arbitrary code in the context of the current process, potentially leading to unauthorized access or control over the application.",Siemens,"JT2Go,Teamcenter Visualization V13.3,Teamcenter Visualization V14.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Tecnomatix Plant Simulation V2201,Tecnomatix Plant Simulation V2302",7.8,HIGH,0.0006799999973736703,false,,false,false,false,,false,false,2023-09-12T10:15:00.000Z,0 CVE-2023-38525,https://securityvulnerability.io/vulnerability/CVE-2023-38525,Out of Bounds Read Vulnerability in Parasolid and Teamcenter Visualization Products by Siemens,"A vulnerability has been discovered in Siemens' Parasolid and Teamcenter Visualization products that allows for an out of bounds read error. This issue occurs when the software parses specially crafted X_T files, resulting in an attempt to read data beyond the allocated structure. If exploited, this could enable attackers to execute arbitrary code within the context of the affected process, posing a serious security risk for users of these applications.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38531,https://securityvulnerability.io/vulnerability/CVE-2023-38531,Out of Bounds Read Vulnerability in Siemens Parasolid and Teamcenter Visualization Products,"A security issue has been discovered in multiple versions of Siemens' Parasolid and Teamcenter Visualization products. The vulnerability occurs due to an out of bounds read past the end of an allocated structure when specially crafted X_T files are parsed. This flaw may allow an attacker to execute arbitrary code within the context of the affected application, potentially leading to unauthorized actions or data manipulation.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38532,https://securityvulnerability.io/vulnerability/CVE-2023-38532,Stack Exhaustion Vulnerability in Parasolid and Teamcenter Visualization Products,"A vulnerability exists in various versions of Parasolid and Teamcenter Visualization products, which can be exploited through specially crafted X_T files. The flaw could potentially lead to a stack exhaustion scenario, enabling attackers to incapacitate the system, resulting in a denial of service condition.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",3.3,LOW,0.0005600000149570405,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38682,https://securityvulnerability.io/vulnerability/CVE-2023-38682,Out of Bounds Read in JT2Go and Teamcenter Visualization Software,"A vulnerability exists in the JT2Go and Teamcenter Visualization applications that allows for an out-of-bounds read during the processing of specially crafted TIFF files. This flaw can lead to the execution of code in the context of the current process, potentially allowing malicious actors to exploit the software. Affected versions must be updated to mitigate this risk.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38530,https://securityvulnerability.io/vulnerability/CVE-2023-38530,Out of Bounds Read Vulnerability in Parasolid and Teamcenter Visualization by Siemens,"A vulnerability exists in specific versions of Parasolid and Teamcenter Visualization products, where an out of bounds read occurs beyond allocated structures during the parsing of specially crafted X_T files. This flaw could potentially enable an attacker to execute arbitrary code in the context of the current process, impacting the integrity and security of the affected systems.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38529,https://securityvulnerability.io/vulnerability/CVE-2023-38529,Out of Bounds Read Vulnerability in Parasolid and Teamcenter Visualization Software,"A critical out of bounds read vulnerability has been detected in various versions of Parasolid and Teamcenter Visualization applications. When parsing specially crafted X_T files, the affected software may read data beyond the allocated memory structure. This flaw can potentially allow an attacker to execute arbitrary code within the context of the currently running process, posing serious security risks to systems using these applications.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38528,https://securityvulnerability.io/vulnerability/CVE-2023-38528,Out of Bounds Write Vulnerability in Siemens Parasolid and Teamcenter Visualization Software,"A vulnerability exists in Siemens Parasolid and Teamcenter Visualization products that allows for an out of bounds write past the end of an allocated buffer when parsing specially crafted X_T files. This flaw may enable an attacker to execute arbitrary code in the context of the affected process, potentially leading to unauthorized access or control over the impacted system.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38527,https://securityvulnerability.io/vulnerability/CVE-2023-38527,Out of Bounds Read Vulnerability in Parasolid and Teamcenter Visualization Products,"A vulnerability exists in certain versions of Parasolid and Teamcenter Visualization products, which allows an out of bounds read past the end of an allocated structure when parsing specially crafted X_T files. This flaw could enable a malicious actor to execute code within the context of the affected process, posing significant security risks.",Siemens,"Parasolid V34.1,Parasolid V35.0,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38526,https://securityvulnerability.io/vulnerability/CVE-2023-38526,Out of Bounds Read Vulnerability in Siemens Parasolid and Teamcenter Visualization Products,"A vulnerability exists in certain versions of Siemens Parasolid and Teamcenter Visualization products, where an out of bounds read can occur while processing specially crafted X_T files. This is due to insufficient validation of file data, which may allow an attacker to execute arbitrary code within the context of the current process, potentially leading to unauthorized access or control over the affected systems.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",7.8,HIGH,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38683,https://securityvulnerability.io/vulnerability/CVE-2023-38683,Out of Bounds Write Vulnerability in JT2Go and Teamcenter Visualization by Siemens,"An out of bounds write vulnerability has been discovered in JT2Go and Teamcenter Visualization software by Siemens. This vulnerability arises when the affected applications process specially crafted TIFF files, allowing an attacker to write past the end of an allocated buffer. Exploiting this vulnerability could permit the execution of arbitrary code within the context of the current process, potentially leading to unauthorized access and manipulation of system resources.",Siemens,"Jt2go,Teamcenter Visualization V13.2,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-38524,https://securityvulnerability.io/vulnerability/CVE-2023-38524,Code Execution Vulnerability in Parasolid and Teamcenter Visualization by Siemens,"A vulnerability exists within various versions of Parasolid and Teamcenter Visualization products, which involves a null pointer dereference when processing specially crafted X_T files. This flaw can potentially enable an attacker to execute arbitrary code within the context of the affected application, posing significant security risks to systems utilizing these products.",Siemens,"Parasolid V34.1,Parasolid V35.0,Parasolid V35.1,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3",3.3,LOW,0.0006699999794363976,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0 CVE-2023-28830,https://securityvulnerability.io/vulnerability/CVE-2023-28830,Use-After-Free Vulnerability in Siemens JT2Go and Teamcenter Visualization Products,"A vulnerability exists in Siemens JT2Go, Solid Edge, and Teamcenter Visualization products prior to specified versions. The flaw arises from improper handling during the parsing of specially crafted ASM files, which leads to a use-after-free condition. This oversight may allow an attacker to execute arbitrary code within the context of the affected application process, potentially leading to unauthorized actions or data breaches.",Siemens,"Jt2go,Solid Edge Se2022,Solid Edge Se2023,Teamcenter Visualization V13.2,Teamcenter Visualization V13.3,Teamcenter Visualization V14.1,Teamcenter Visualization V14.2",7.8,HIGH,0.0005699999746866524,false,,false,false,false,,false,false,2023-08-08T10:15:00.000Z,0