Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-44432 | Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. |
Tue, 20 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2025-05-20T17:47:22.591Z
Reserved: 2022-09-21T00:00:00.000Z
Link: CVE-2022-41191
Updated: 2024-08-03T12:35:49.502Z
Status : Modified
Published: 2022-10-11T21:15:22.307
Modified: 2025-05-20T18:15:43.903
Link: CVE-2022-41191
No data.
OpenCVE Enrichment
No data.
EUVD