This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Category Archives: Advisories
ZDI-23-186: Siemens Tecnomatix Plant Simulation SPP File Parsing Uninitialized Pointer Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-23-185: Siemens Tecnomatix Plant Simulation SPP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-23-184: Siemens Tecnomatix Plant Simulation SPP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-23-183: Siemens Tecnomatix Plant Simulation SPP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI-23-182: Siemens Solid Edge Viewer STL File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
python-django3-3.2.18-1.fc38
FEDORA-2023-a74513bda8
Packages in this update:
python-django3-3.2.18-1.fc38
Update description:
Security fixes for CVE-2022-24580 and CVE-2023-41323
python-django3-3.2.18-1.el8
FEDORA-EPEL-2023-934b856e97
Packages in this update:
python-django3-3.2.18-1.el8
Update description:
Security fixes for CVE-2022-24580 and CVE-2023-41323
python-django3-3.2.18-1.fc36
FEDORA-2023-3d775d93be
Packages in this update:
python-django3-3.2.18-1.fc36
Update description:
Security fixes for CVE-2022-24580 and CVE-2023-41323
python-django3-3.2.18-1.fc37
FEDORA-2023-bde7913e5a
Packages in this update:
python-django3-3.2.18-1.fc37
Update description:
Security fixes for CVE-2022-24580 and CVE-2023-41323