Логотип exploitDog
bind:CVE-2025-59489
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59489

Количество 4

Количество 4

nvd логотип

CVE-2025-59489

около 1 месяца назад

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2025-59489

около 1 месяца назад

MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-427p-ppg4-cg5q

около 1 месяца назад

Unity Editor 2019.1 through 6000.3 could allow remote attackers to exploit file loading and Local File Inclusion (LFI) mechanisms via a crafted local application because of an Untrusted Search Path. This could permit unauthorized manipulation of runtime resources and third-party integrations. The issue could affect applications built using Unity and deployed across Android, Windows, macOS, and Linux platforms.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2025-13636

5 месяцев назад

Уязвимость интегрированной среды разработки (IDE) Unity Editor, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-59489

Unity Runtime before 2025-10-02 on Android, Windows, macOS, and Linux allows argument injection that can result in loading of library code from an unintended location. If an application was built with a version of Unity Editor that had the vulnerable Unity Runtime code, then an adversary may be able to execute code on, and exfiltrate confidential information from, the machine on which that application is running. NOTE: product status is provided for Unity Editor because that is the information available from the Supplier. However, updating Unity Editor typically does not address the effects of the vulnerability; instead, it is necessary to rebuild and redeploy all affected applications.

CVSS3: 7.4
0%
Низкий
около 1 месяца назад
msrc логотип
CVE-2025-59489

MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability

CVSS3: 8.4
0%
Низкий
около 1 месяца назад
github логотип
GHSA-427p-ppg4-cg5q

Unity Editor 2019.1 through 6000.3 could allow remote attackers to exploit file loading and Local File Inclusion (LFI) mechanisms via a crafted local application because of an Untrusted Search Path. This could permit unauthorized manipulation of runtime resources and third-party integrations. The issue could affect applications built using Unity and deployed across Android, Windows, macOS, and Linux platforms.

CVSS3: 8.4
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-13636

Уязвимость интегрированной среды разработки (IDE) Unity Editor, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.4
0%
Низкий
5 месяцев назад

Уязвимостей на страницу