{"vulnerability": "CVE-2023-38076", "sightings": [{"uuid": "87e50bcb-c402-4d53-8866-dc2f9765e3fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38076", "type": "seen", "source": "https://t.me/cibsecurity/70259", "content": "\u203c CVE-2023-38076 \u203c\n\nA vulnerability has been identified in JT2Go (All versions &lt; V14.3.0.1), Teamcenter Visualization V13.3 (All versions &lt; V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions &lt; V14.1.0.11), Teamcenter Visualization V14.2 (All versions &lt; V14.2.0.6), Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.1). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21041)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T14:22:53.000000Z"}]}