Page 6 of 70 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20824) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones &lt; V14.3.0.1), Teamcenter Visualization V13.3 (Todas las versiones &lt; V13.3.0.12), Teamcenter Visualization V14.0 (Todas las versiones), Teamcenter Visualization V14.1 ( Todas las versiones &lt; V14.1.0.11), Teamcenter Visualization V14.2 (todas las versiones &lt; V14.2.0.6), Teamcenter Visualization V14.3 (todas las versiones &lt; V14.3.0.1). La aplicación afectada es vulnerable al Desbordamiento del Búfer mientras analiza archivos WRL especialmente manipulados. • https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-478780.pdf • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20818) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones &lt; V14.3.0.1), Teamcenter Visualization V13.3 (Todas las versiones &lt; V13.3.0.12), Teamcenter Visualization V14.0 (Todas las versiones), Teamcenter Visualization V14.1 ( Todas las versiones &lt; V14.1.0.11), Teamcenter Visualization V14.2 (todas las versiones &lt; V14.2.0.6), Teamcenter Visualization V14.3 (Todas las versiones &lt; V14.3.0.1). La aplicación afectada es vulnerable al Desbordamiento del Búfer al analizar archivos WRL especialmente manipulados. • https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-478780.pdf • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted IGS file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21270) Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones inferiores a V2201.0008), Tecnomatix Plant Simulation V2302 (Todas las versiones inferiores a V2302.0002). La aplicación afectada contiene una escritura fuera de límites más allá del final de un búfer asignado mientras analiza un archivo IGS especialmente diseñado. • https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21132) Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones inferiores a V2201.0008), Tecnomatix Plant Simulation V2302 (Todas las versiones inferiores a V2302.0002). La aplicación afectada contiene una escritura fuera de límites más allá del final de un búfer asignado mientras analiza un archivo SPP especialmente diseñado. • https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21106) Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones inferiores a V2201.0008), Tecnomatix Plant Simulation V2302 (Todas las versiones inferiores a V2302.0002). La aplicación afectada contiene una escritura fuera de límites más allá del final de un búfer asignado mientras analiza un archivo SPP especialmente diseñado. • https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf • CWE-787: Out-of-bounds Write •