{"vulnerability": "CVE-2023-38071", "sightings": [{"uuid": "956d3f30-84e7-473b-8034-0fdc0fea55ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38071", "type": "seen", "source": "https://t.me/cibsecurity/70265", "content": "\u203c CVE-2023-38071 \u203c\n\nA vulnerability has been identified in JT2Go (All versions &lt; V14.3.0.1), Teamcenter Visualization V13.3 (All versions &lt; V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions &lt; V14.1.0.11), Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.6), Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.1). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20824)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T14:22:59.000000Z"}]}