Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36527 | Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32201. |
Mon, 23 Dec 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-12-23T21:30:35.359Z
Reserved: 2023-05-11T00:00:00.000Z
Link: CVE-2023-32273
Updated: 2024-08-02T15:10:24.376Z
Status : Modified
Published: 2023-06-19T05:15:09.443
Modified: 2024-12-23T22:15:07.290
Link: CVE-2023-32273
No data.
OpenCVE Enrichment
No data.
EUVD