Show filters
197 Total Results
Displaying 171-180 of 197
Sort by:
Attacker Value
Unknown

CVE-2020-26999

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
A vulnerability has been identified in JT2Go (All versions < V13.1.0.2), Teamcenter Visualization (All versions < V13.1.0.2). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information. (ZDI-CAN-12042)
Attacker Value
Unknown

CVE-2020-27000

Disclosure Date: February 09, 2021 (last updated February 22, 2025)
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing BMP files. This can result in a memory corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12018)
Attacker Value
Unknown

CVE-2021-25178

Disclosure Date: January 18, 2021 (last updated February 22, 2025)
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution.
Attacker Value
Unknown

CVE-2021-25176

Disclosure Date: January 18, 2021 (last updated February 22, 2025)
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart).
Attacker Value
Unknown

CVE-2021-25175

Disclosure Date: January 18, 2021 (last updated February 22, 2025)
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Conversion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart).
Attacker Value
Unknown

CVE-2021-25173

Disclosure Date: January 18, 2021 (last updated February 22, 2025)
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
Attacker Value
Unknown

CVE-2021-25177

Disclosure Date: January 18, 2021 (last updated February 22, 2025)
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart).
Attacker Value
Unknown

CVE-2021-25174

Disclosure Date: January 18, 2021 (last updated February 22, 2025)
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).
Attacker Value
Unknown

CVE-2020-26985

Disclosure Date: January 12, 2021 (last updated February 22, 2025)
A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of RGB and SGI files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11986, ZDI-CAN-11994)
Attacker Value
Unknown

CVE-2020-26987

Disclosure Date: January 12, 2021 (last updated February 22, 2025)
A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12016, ZDI-CAN-12017)