Логотип exploitDog
bind:CVE-2023-25869
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25869

Количество 3

Количество 3

nvd логотип

CVE-2023-25869

почти 3 года назад

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-m2q3-w4f2-83p6

почти 3 года назад

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-01427

почти 3 года назад

Уязвимость программного обеспечения для 3D-дизайна Substance 3D Stager, связанная с чтением за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-25869

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-m2q3-w4f2-83p6

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01427

Уязвимость программного обеспечения для 3D-дизайна Substance 3D Stager, связанная с чтением за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу