Page 7 of 35 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to heap-based buffer underflow while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. • https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to heap-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. • https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf • CWE-122: Heap-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to stack-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. • https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.264), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19070) Se ha identificado una vulnerabilidad en: Parasolid V33.1 (Todas las versiones &lt; V33.1.264), Parasolid V34.0 (Todas las versiones &lt; V34.0.252), Parasolid V34.1 (Todas las versiones &lt; V34.1.242), Parasolid V35 .0 (Todas las versiones &lt; V35.0.170), Solid Edge SE2022 (Todas las versiones &lt; V222.0MP12), Solid Edge SE2022 (Todas las versiones), Solid Edge SE2023 (Todas las versiones &lt; V223.0Update2). Las aplicaciones afectadas contienen una escritura fuera de los límites más allá del final de una estructura asignada mientras analizan archivos X_B especialmente manipulados. Esto podría permitir a un atacante ejecutar código en el contexto del proceso actual. • https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-588101.pdf • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.264), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds write past the end of an allocated structure while parsing specially crafted X_B files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19071) Se ha identificado una vulnerabilidad en: Parasolid V33.1 (Todas las versiones &lt; V33.1.264), Parasolid V34.0 (Todas las versiones &lt; V34.0.252), Parasolid V34.1 (Todas las versiones &lt; V34.1.242), Parasolid V35 .0 (Todas las versiones &lt; V35.0.170), Solid Edge SE2022 (Todas las versiones &lt; V222.0MP12), Solid Edge SE2022 (Todas las versiones), Solid Edge SE2023 (Todas las versiones &lt; V223.0Update2). Las aplicaciones afectadas contienen una escritura fuera de los límites más allá del final de una estructura asignada mientras analizan archivos X_B especialmente manipulados. Esto podría permitir a un atacante ejecutar código en el contexto del proceso actual. • https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-588101.pdf • CWE-787: Out-of-bounds Write •