Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 23 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 |
Tue, 08 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens jt2go |
|
CPEs | cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:* | |
Vendors & Products |
Siemens
Siemens jt2go |
|
Metrics |
ssvc
|
Tue, 08 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-10-08T18:03:27.584Z
Reserved: 2024-07-23T10:56:51.267Z
Link: CVE-2024-41902

Updated: 2024-10-08T18:03:19.079Z

Status : Analyzed
Published: 2024-10-08T09:15:11.453
Modified: 2024-10-23T14:16:24.277
Link: CVE-2024-41902

No data.

No data.