Количество 4
Количество 4
CVE-2021-39847
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.
CVE-2021-39847
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.
CVE-2021-39847
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-ba ...
GHSA-pfx6-w2h7-5g2x
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-39847 XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-39847 XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-39847 XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-ba ... | CVSS3: 7.8 | 0% Низкий | больше 4 лет назад | |
GHSA-pfx6-w2h7-5g2x XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу