Логотип exploitDog
bind:CVE-2022-43613
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-43613

Количество 3

Количество 3

nvd логотип

CVE-2022-43613

почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Corel CorelDRAW Graphics Suite 23.5.0.506. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. When parsing CGM files, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16356.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-jvxm-jqvh-vw8w

почти 3 года назад

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Corel CorelDRAW Graphics Suite 23.5.0.506. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. When parsing CGM files, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16356.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2022-06743

около 4 лет назад

Уязвимость графического редактора векторной графики CorelDRAW Graphics Suite (ранее CorelDRAW), связанная с недостаточной проверкой длины пользовательских данных перед их копированием в буфер на основе стека, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-43613

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Corel CorelDRAW Graphics Suite 23.5.0.506. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. When parsing CGM files, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16356.

CVSS3: 7.8
2%
Низкий
почти 3 года назад
github логотип
GHSA-jvxm-jqvh-vw8w

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Corel CorelDRAW Graphics Suite 23.5.0.506. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CGM files. When parsing CGM files, the process does not properly validate the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16356.

CVSS3: 7.8
2%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-06743

Уязвимость графического редактора векторной графики CorelDRAW Graphics Suite (ранее CorelDRAW), связанная с недостаточной проверкой длины пользовательских данных перед их копированием в буфер на основе стека, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
2%
Низкий
около 4 лет назад

Уязвимостей на страницу