{"vulnerability": "CVE-2023-38075", "sightings": [{"uuid": "b83c1658-64ec-4e91-b096-77aab590af62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38075", "type": "seen", "source": "https://t.me/cibsecurity/70263", "content": "\u203c CVE-2023-38075 \u203c\n\nA vulnerability has been identified in JT2Go (All versions &lt; V14.3.0.1), Teamcenter Visualization V13.3 (All versions &lt; V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions &lt; V14.1.0.11), Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.6), Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.1). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20842)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T14:22:58.000000Z"}]}