Page 10 of 1803 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones &lt; V2201.0012), Tecnomatix Plant Simulation V2302 (Todas las versiones &lt; V2302.0006). Las aplicaciones afectadas contienen una vulnerabilidad de desbordamiento de pila al analizar archivos WRL especialmente manipulados. • https://cert-portal.siemens.com/productcert/html/ssa-017796.html • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones &lt; V2201.0012), Tecnomatix Plant Simulation V2302 (Todas las versiones &lt; V2302.0006). Las aplicaciones afectadas contienen una vulnerabilidad de desbordamiento de pila al analizar archivos WRL especialmente manipulados. • https://cert-portal.siemens.com/productcert/html/ssa-017796.html • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones &lt; V2201.0012), Tecnomatix Plant Simulation V2302 (Todas las versiones &lt; V2302.0006). La aplicación afectada es vulnerable al desbordamiento de búfer de almacenamiento dinámico mientras analiza archivos WRL especialmente manipulados. • https://cert-portal.siemens.com/productcert/html/ssa-017796.html • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted WRL file. This could allow an attacker to execute code in the context of the current process. Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones &lt; V2201.0012), Tecnomatix Plant Simulation V2302 (Todas las versiones &lt; V2302.0006). La aplicación afectada contiene una escritura fuera de los límites más allá del final de un búfer asignado mientras analiza un archivo WRL especialmente manipulado. • https://cert-portal.siemens.com/productcert/html/ssa-017796.html • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in Unicam FX (All versions). The windows installer agent used in affected product contains incorrect use of privileged APIs that trigger the Windows Console Host (conhost.exe) as a child process with SYSTEM privileges. This could be exploited by an attacker to perform a local privilege escalation attack. Se ha identificado una vulnerabilidad en Unicam FX (todas las versiones). El agente de instalación de Windows utilizado en el producto afectado contiene un uso incorrecto de API privilegiadas que activan el host de la consola de Windows (conhost.exe) como un proceso secundario con privilegios de SYSTEMA. • https://cert-portal.siemens.com/productcert/html/ssa-543502.html • CWE-648: Incorrect Use of Privileged APIs •