{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T23:17:31.786","vulnerabilities":[{"cve":{"id":"CVE-2023-51744","sourceIdentifier":"productcert@siemens.com","published":"2024-01-09T10:15:21.657","lastModified":"2024-11-21T08:38:43.213","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain a null pointer dereference vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to crash the application causing denial of service condition."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones &lt; V14.3.0.6), Teamcenter Visualization V13.3 (Todas las versiones &lt; V13.3.0.13), Teamcenter Visualization V14.1 (Todas las versiones &lt; V14.1.0.12), Teamcenter Visualization V14.2 (todas las versiones "}],"metrics":{"cvssMetricV31":[{"source":"productcert@siemens.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*","versionEndExcluding":"14.3.0.6","matchCriteriaId":"46A0DA84-3D17-4B66-8D2A-F3508436032C"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*","versionStartIncluding":"13.3.0","versionEndExcluding":"13.3.0.13","matchCriteriaId":"AD077F2B-E8A3-4766-91C4-BA42747301BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1","versionEndExcluding":"14.1.0.12","matchCriteriaId":"E256021C-A93A-4D2C-B3BA-6A26F1735418"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*","versionStartIncluding":"14.2","versionEndExcluding":"14.2.0.9","matchCriteriaId":"69855C2B-0F94-45CE-A7DD-D87A4E4C608C"},{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*","versionStartIncluding":"14.3","versionEndExcluding":"14.3.0.6","matchCriteriaId":"E21BB537-ED57-4F27-B9C9-1E5816F2F294"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-794653.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-794653.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}