{"vulnerability": "CVE-2023-38074", "sightings": [{"uuid": "2de4a63a-1f76-41ae-933d-cdc7a1d48098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38074", "type": "seen", "source": "https://t.me/cibsecurity/70275", "content": "\u203c CVE-2023-38074 \u203c\n\nA vulnerability has been identified in JT2Go (All versions &lt; V14.3.0.1), Teamcenter Visualization V13.3 (All versions &lt; V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions &lt; V14.1.0.11), Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.6), Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.1). The affected application contains a type confusion vulnerability while parsing WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20840)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T14:23:10.000000Z"}]}