3.3
CVSSv3

CVE-2021-44444

Published: 14/12/2021 Updated: 14/10/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15052)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens jt open toolkit

siemens jt utilities

Exploits

Proof of concept for the remote code execution vulnerability in MSDT known as Follina ...

Github Repositories

POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina

POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina Info : New Microsoft Office zero-day used in attacks to execute PowerShell Summary On the 29th of May 2022, the Nao_Sec team, an independent Cyber Security Research Team, discovered a malicious Office document shared on Virustotal This document is using an unusual, but known scheme to infect its victims The scheme

POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina

POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina Info : New Microsoft Office zero-day used in attacks to execute PowerShell Summary On the 29th of May 2022, the Nao_Sec team, an independent Cyber Security Research Team, discovered a malicious Office document shared on Virustotal This document is using an unusual, but known scheme to infect its victims The scheme

POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina

POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina Info : New Microsoft Office zero-day used in attacks to execute PowerShell Summary On the 29th of May 2022, the Nao_Sec team, an independent Cyber Security Research Team, discovered a malicious Office document shared on Virustotal This document is using an unusual, but known scheme to infect its victims The scheme