Siemens Jt Open Toolkit 11.1.1.0

CPE Details

Siemens Jt Open Toolkit 11.1.1.0
11.1.1.0
2021-12-14
13h06 +00:00
2021-12-16
19h27 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:siemens:jt_open_toolkit:11.1.1.0:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

jt_open_toolkit

Version

11.1.1.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-30796 2023-08-08 09h20 +00:00 A vulnerability has been identified in JT Open (All versions < V11.4), JT Utilities (All versions < V13.4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
7.8
Haute
CVE-2023-29053 2023-04-11 09h03 +00:00 A vulnerability has been identified in JT Open (All versions < V11.3.2.0), JT Utilities (All versions < V13.3.0.0). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
7.8
Haute
CVE-2022-47977 2023-02-14 10h36 +00:00 A vulnerability has been identified in JT Open (All versions < V11.2.3.0), JT Utilities (All versions < V13.2.3.0). The affected application contains a memory corruption vulnerability while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
7.8
Haute
CVE-2022-47936 2023-02-14 10h36 +00:00 A vulnerability has been identified in JT Open (All versions < V11.2.3.0), JT Utilities (All versions < V13.2.3.0), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Parasolid V35.1 (All versions < V35.1.150). The affected application contains a stack overflow vulnerability while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
7.8
Haute