This could allow an attacker to execute code in the context of the current process.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siemens
Siemens solid Edge Se2026 |
|
| Vendors & Products |
Siemens
Siemens solid Edge Se2026 |
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack Buffer Overflow in Solid Edge SE2026 PAR File Parsing |
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2026-05-12T08:21:20.461Z
Reserved: 2026-05-06T09:51:05.262Z
Link: CVE-2026-44412
No data.
Status : Awaiting Analysis
Published: 2026-05-12T10:16:46.567
Modified: 2026-05-12T14:19:41.400
Link: CVE-2026-44412
No data.
OpenCVE Enrichment
Updated: 2026-05-12T11:15:14Z