A vulnerability in JT2Go and Teamcenter Visualization allows code execution via TIFF file parsing
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | CVE-2020-27003 | 9 Feb 202115:38 | – | cvelist |
![]() | Siemens JT2Go TIFF File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability | 24 Feb 202100:00 | – | zdi |
![]() | CVE-2020-27003 | 9 Feb 202117:15 | – | nvd |
![]() | Siemens JT2Go and Teamcenter Visualization Untrusted Pointer Dereference Vulnerability | 20 Feb 202100:00 | – | cnvd |
![]() | Design/Logic Flaw | 9 Feb 202117:15 | – | prion |
![]() | Siemens JT2Go < 13.1.0.1 Multiple Vulnerabilities (SSA-663999) | 7 May 202100:00 | – | nessus |
![]() | ICSA-21-040-06_Siemens JT2Go and Teamcenter Visualization (Update A) | 17 May 202100:00 | – | ics |
![]() | Open Design Alliance Drawings SDK (Update A) | 9 Feb 202100:00 | – | ics |
[
{
"product": "JT2Go",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions < V13.1.0.1"
}
]
},
{
"product": "Teamcenter Visualization",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions < V13.1.0.1"
}
]
}
]
Source | Link |
---|---|
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-21-229/ |
cert-portal | www.cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo