{"vulnerability": "CVE-2023-38073", "sightings": [{"uuid": "65ea9e8e-e19a-4f1d-a0a2-21a9d7c83ac0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38073", "type": "seen", "source": "https://t.me/cibsecurity/70264", "content": "\u203c CVE-2023-38073 \u203c\n\nA vulnerability has been identified in JT2Go (All versions &lt; V14.3.0.1), Teamcenter Visualization V13.3 (All versions &lt; V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions &lt; V14.1.0.11), Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.6), Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.1). The affected application contains a type confusion vulnerability while parsing WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20826)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T14:22:58.000000Z"}]}