This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Tecnomatix Plant Simulation. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
More Stories
mujs-1.0.9-2.el8
FEDORA-EPEL-2025-141926b526 Packages in this update: mujs-1.0.9-2.el8 Update description: Backport upstream fix for CVE-2021-33796. https://nvd.nist.gov/vuln/detail/CVE-2021-33796 Read More
USN-7435-1: Protocol Buffers vulnerability
It was discovered that Protocol Buffers incorrectly handled memory when receiving malicious input using the Java bindings. An attacker could...
golang-1.23.8-1.fc40
FEDORA-2025-f974cb8ce5 Packages in this update: golang-1.23.8-1.fc40 Update description: Includes security fixes to the net/http package, as well as bug fixes...
golang-1.23.8-1.fc41
FEDORA-2025-77ace1a41b Packages in this update: golang-1.23.8-1.fc41 Update description: Includes security fixes to the net/http package, as well as bug fixes...
USN-7434-1: Perl vulnerability
It was discovered that Perl incorrectly handled transliterating non-ASCII bytes. A remote attacker could use this issue to cause Perl...
perl-5.40.2-517.fc42
FEDORA-2025-26c0346398 Packages in this update: perl-5.40.2-517.fc42 Update description: Fix CVE-2024-56406 Read More