A vulnerability in JT2Go, Teamcenter Visualization allows remote attackers to disclose arbitrary files via specially crafted XML file. (CVE-2020-26981
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | Siemens JT2Go PLMXML File Parsing XML External Entity Processing Information Disclosure Vulnerability | 14 Jan 202100:00 | – | zdi |
![]() | Code injection | 12 Jan 202121:15 | – | prion |
![]() | CVE-2020-26981 | 12 Jan 202120:18 | – | cvelist |
![]() | CVE-2020-26981 | 12 Jan 202121:15 | – | nvd |
![]() | Siemens JT2Go < 13.1.0 Multiple Vulnerabilities (SSA-622830) | 29 Jan 202100:00 | – | nessus |
![]() | Siemens JT2Go and Teamcenter Visualization (Update B) | 12 Jan 202100:00 | – | ics |
[
{
"product": "JT2Go",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions < V13.1.0"
}
]
},
{
"product": "Teamcenter Visualization",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions < V13.1.0"
}
]
}
]
Source | Link |
---|---|
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-21-048/ |
cert-portal | www.cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo