A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
2024-01-09T10:15:17.127
2024-11-21T08:32:52.653
Modified
CVSSv3.1: 7.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | siemens | solid_edge_se2023 | < 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |
Application | siemens | solid_edge_se2023 | 223.0 | Yes |