Siemens

Solid Edge Se2021 Firmware

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.22%
  • Veröffentlicht 10.08.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:14:48

A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). An XML external entity injection vulnerability in the underlying XML parser could cause the affected application to disclose arbitrary files to remote attackers by l...

  • EPSS 0.53%
  • Veröffentlicht 10.08.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:14:48

A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library in affected application lacks proper validation while parsing user-supplied OBJ files that could lead to a use-after-free condition. An atta...

  • EPSS 0.38%
  • Veröffentlicht 10.08.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:14:48

A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library lacks proper validation while parsing user-supplied OBJ files that could cause an out of bounds access to an uninitialized pointer. An attac...

  • EPSS 0.58%
  • Veröffentlicht 08.06.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:27

The ugeom2d.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past ...

  • EPSS 0.78%
  • Veröffentlicht 08.06.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 06:05:27

The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past th...

  • EPSS 0.3%
  • Veröffentlicht 27.05.2021 17:15:07
  • Zuletzt bearbeitet 21.11.2024 05:58:05

Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.

  • EPSS 0.3%
  • Veröffentlicht 27.05.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:58:05

Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds...

  • EPSS 0.7%
  • Veröffentlicht 27.05.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:58:05

When opening a specially crafted 3DXML file, the application containing Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior could disclose arbitrary files to remo...

  • EPSS 0.62%
  • Veröffentlicht 27.05.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:58:06

Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer...

  • EPSS 0.3%
  • Veröffentlicht 27.05.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 05:58:06

Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing PRT files. This could lead to pointer dereferences o...