cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-52574,https://securityvulnerability.io/vulnerability/CVE-2024-52574,Out of Bounds Read Vulnerability in Siemens Teamcenter and Tecnomatix Products,"A vulnerability has been identified in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation products, which involves an out of bounds read occurring past the end of an allocated structure when parsing specially crafted WRL files. This vulnerability could enable an attacker to execute code within the context of the affected application, posing significant security risks to users. It is crucial for organizations using these products to apply relevant patches and updates to mitigate potential exploitation.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52572,https://securityvulnerability.io/vulnerability/CVE-2024-52572,Stack-Based Overflow Vulnerability in Teamcenter and Tecnomatix Products by Siemens,"A significant vulnerability has been discovered in Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation products, specifically affecting various versions that have not been updated. This vulnerability involves a stack-based overflow that can occur during the parsing of specially crafted WRL files. As a result, it presents a risk allowing an attacker to execute arbitrary code within the context of the affected applications. Mitigation strategies should be employed immediately by updating to the specified non-vulnerable versions to safeguard against potential exploits.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0005099999834783375,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52573,https://securityvulnerability.io/vulnerability/CVE-2024-52573,Out of Bounds Write Vulnerability in Teamcenter Visualization and Tecnomatix Plant Simulation Products from Siemens,"An out of bounds write vulnerability has been detected in Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation applications. This flaw manifests when these products process specially crafted WRL files, allowing potential attackers to execute arbitrary code within the context of the current process. Regular updates and patches are essential to mitigate the risks associated with this vulnerability and safeguard sensitive operations performed by the affected applications.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52565,https://securityvulnerability.io/vulnerability/CVE-2024-52565,Out of Bounds Write Vulnerability in Teamcenter and Tecnomatix Products by Siemens,"A vulnerability exists in Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation products that may lead to an out-of-bounds write condition when processing specially crafted WRL files. This flaw allows an attacker to potentially execute arbitrary code within the context of the application, posing significant security risks. The affected products include various versions of Teamcenter Visualization and Tecnomatix Plant Simulation, requiring immediate attention to update to secure versions as specified in Siemens' advisories.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52566,https://securityvulnerability.io/vulnerability/CVE-2024-52566,Out of Bounds Write Vulnerability in Teamcenter Visualization and Tecnomatix Plant Simulation,"A vulnerability has been discovered in specific versions of Teamcenter Visualization and Tecnomatix Plant Simulation, which exposes the applications to an out of bounds write error when processing specially crafted WRL files. This flaw can allow an attacker to execute arbitrary code within the context of the current process, presenting significant security implications. Users of the affected versions should prioritize updating their software to mitigate potential risks. Detailed information and remediation steps can be found through the Siemens security alerts.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52567,https://securityvulnerability.io/vulnerability/CVE-2024-52567,Out of Bounds Read Vulnerability in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation Products,"An out of bounds read vulnerability exists in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation products, affecting several versions prior to specified updates. This issue occurs during the parsing of specially crafted WRL files, which may lead to an attacker executing code in the context of the current process. The flaw could potentially be exploited if an attacker can manipulate the files processed by the affected applications, emphasizing the need for users to apply available updates to mitigate any potential risks.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52568,https://securityvulnerability.io/vulnerability/CVE-2024-52568,Use-After-Free Vulnerability in Teamcenter Visualization and Tecnomatix Products by Siemens,"A use-after-free vulnerability has been discovered in Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation applications, which can be exploited when processing specially crafted WRL files. This vulnerability affects multiple versions of these products, presenting a risk where malicious actors could execute arbitrary code within the context of the affected process. Users of Teamcenter Visualization and Tecnomatix should take immediate action to update their respective installations to the latest secure versions to mitigate potential risks associated with this vulnerability.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52569,https://securityvulnerability.io/vulnerability/CVE-2024-52569,Out of Bounds Write Vulnerability in Siemens Teamcenter Visualization and Tecnomatix,"A vulnerability present in Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation products involves an out of bounds write that can occur when processing specially crafted WRL files. This flaw may enable an attacker to execute arbitrary code within the context of the affected process, potentially leading to unauthorized actions and system compromise. The vulnerability affects multiple versions of Teamcenter Visualization and Tecnomatix Plant Simulation, underscoring the importance of applying security patches and updates to mitigate the risks associated with this issue. Organizations using these products should review their versioning and implement necessary safeguards to protect against potential exploits.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52570,https://securityvulnerability.io/vulnerability/CVE-2024-52570,Out of Bounds Write Vulnerability in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation,"A notable vulnerability has been identified in Siemens Teamcenter Visualization and Tecnomatix Plant Simulation products, where an out of bounds write can occur during the parsing of specially crafted WRL files. This weakness may enable attackers to execute arbitrary code within the context of the affected application process. It is essential for users of the specified versions to apply patches or mitigations to reduce exposure to potential exploitation.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-52571,https://securityvulnerability.io/vulnerability/CVE-2024-52571,Out of Bounds Write Vulnerability in Siemens Teamcenter and Tecnomatix Products,"A vulnerability exists in multiple versions of Siemens' Teamcenter Visualization and Tecnomatix Plant Simulation products. Specifically, an out of bounds write issue is triggered when the applications parse specially crafted WRL files. This flaw potentially enables attackers to execute arbitrary code within the context of the affected process. Various affected product versions include older iterations, emphasizing the necessity for users to promptly update to mitigate any associated risks.",Siemens,"Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406,Tecnomatix Plant Simulation V2302,Tecnomatix Plant Simulation V2404",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-11-18T16:15:00.000Z,0 CVE-2024-37997,https://securityvulnerability.io/vulnerability/CVE-2024-37997,Stack Overflow Vulnerability in Siemens JT Open and Teamcenter Visualization Products,"A stack overflow vulnerability has been identified in several products from Siemens, notably within JT Open and Teamcenter Visualization. This vulnerability arises during the parsing of specially crafted XML files, which may permit an attacker to execute arbitrary code in the context of the current process. Affected applications include multiple versions of JT Open, JT2Go, PLM XML SDK, and various iterations of Teamcenter Visualization. Users are advised to update their affected products to the latest secure versions to mitigate associated risks.",Siemens,"Jt Open,Jt2go,Plm Xml Sdk,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-07-09T12:15:00.000Z,0 CVE-2024-37996,https://securityvulnerability.io/vulnerability/CVE-2024-37996,Null Pointer Dereference in Siemens Applications,"A critical vulnerability exists within various Siemens applications, including JT Open, JT2Go, and Teamcenter Visualization, which are susceptible to null pointer dereference. This issue arises when the applications process specially crafted XML files. An attacker could exploit this weakness to trigger application crashes, ultimately leading to a denial of service. It is imperative for users to update to the latest versions to mitigate potential risks associated with this vulnerability.",Siemens,"Jt Open,Jt2go,Plm Xml Sdk,Teamcenter Visualization V14.2,Teamcenter Visualization V14.3,Teamcenter Visualization V2312,Teamcenter Visualization V2406",3.3,LOW,0.0004299999854993075,false,,false,false,false,,false,false,2024-07-09T12:15:00.000Z,0