Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
edge vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2021-27382
A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing of PAR files...
Siemens Solid Edge Se2020
Siemens Solid Edge Se2021
NA
CVE-2023-30985
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 3), Solid Edge SE2023 (All versions < V223.0 Update 2). Affected applications contain an out of bounds read past the end of an allocated buffer while parsing a specially crafted OBJ file....
Siemens Solid Edge Se2023 -
Siemens Solid Edge Se2023 Update 0001
NA
CVE-2023-30986
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 3), Solid Edge SE2023 (All versions < V223.0 Update 2). Affected applications contain a memory corruption vulnerability while parsing specially crafted STP files. This could allow an mali...
Siemens Solid Edge Se2023 -
Siemens Solid Edge Se2023 Update 0001
NA
CVE-2023-49121
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an malicious user to execute code in the context of the ...
Siemens Solid Edge Se2023 223.0
Siemens Solid Edge Se2023
NA
CVE-2023-49122
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an malicious user to execute code in the context of the ...
Siemens Solid Edge Se2023 223.0
Siemens Solid Edge Se2023
NA
CVE-2023-49123
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an malicious user to execute code in the context of the ...
Siemens Solid Edge Se2023 223.0
Siemens Solid Edge Se2023
NA
CVE-2023-49124
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an malicious user to execute c...
Siemens Solid Edge Se2023 223.0
Siemens Solid Edge Se2023
NA
CVE-2023-49126
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an malicious user to execute c...
Siemens Solid Edge Se2023 223.0
Siemens Solid Edge Se2023
NA
CVE-2023-49127
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an malicious user to execute c...
Siemens Solid Edge Se2023 223.0
Siemens Solid Edge Se2023
NA
CVE-2023-49128
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an malicious user to execute co...
Siemens Solid Edge Se2023 223.0
Siemens Solid Edge Se2023
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »