Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4xcw-w9g9-vg97

Опубликовано: 11 окт. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)

A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)

EPSS

Процентиль: 20%
0.00062
Низкий

7.8 High

CVSS3

Дефекты

CWE-824

Связанные уязвимости

CVSS3: 7.8
nvd
больше 3 лет назад

A vulnerability has been identified in JTTK (All versions < V11.1.1.0), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The JTTK library is vulnerable to an uninitialized pointer reference vulnerability while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-16973)

EPSS

Процентиль: 20%
0.00062
Низкий

7.8 High

CVSS3

Дефекты

CWE-824