Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39260 | A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 23 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 |
Tue, 08 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siemens
Siemens jt2go |
|
| CPEs | cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Siemens
Siemens jt2go |
|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-10-08T18:03:27.584Z
Reserved: 2024-07-23T10:56:51.267Z
Link: CVE-2024-41902
Updated: 2024-10-08T18:03:19.079Z
Status : Analyzed
Published: 2024-10-08T09:15:11.453
Modified: 2024-10-23T14:16:24.277
Link: CVE-2024-41902
No data.
OpenCVE Enrichment
No data.
EUVD