Логотип exploitDog
bind:CVE-2022-43609
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-43609

Количество 3

Количество 3

nvd логотип

CVE-2022-43609

почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of IronCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. When parsing the VECTOR element, the process does not properly initialize a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17672.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-4rpc-xhhq-h2cq

почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of IronCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. When parsing the VECTOR element, the process does not properly initialize a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17672.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2022-07210

больше 3 лет назад

Уязвимость программы для трехмерного моделирования IronCAD, связанная с использованием неинициализированного указателя, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-43609

This vulnerability allows remote attackers to execute arbitrary code on affected installations of IronCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. When parsing the VECTOR element, the process does not properly initialize a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17672.

CVSS3: 7.8
2%
Низкий
почти 3 года назад
github логотип
GHSA-4rpc-xhhq-h2cq

This vulnerability allows remote attackers to execute arbitrary code on affected installations of IronCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. When parsing the VECTOR element, the process does not properly initialize a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17672.

CVSS3: 7.8
2%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-07210

Уязвимость программы для трехмерного моделирования IronCAD, связанная с использованием неинициализированного указателя, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу