Логотип exploitDog
bind:CVE-2023-25873
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-25873

Количество 3

Количество 3

nvd логотип

CVE-2023-25873

почти 3 года назад

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-9phq-hgh6-4m2f

почти 3 года назад

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-01432

почти 3 года назад

Уязвимость программного обеспечения для 3D-дизайна Substance 3D Stager, связанная с чтением за границами буфера в памяти, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-25873

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-9phq-hgh6-4m2f

Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01432

Уязвимость программного обеспечения для 3D-дизайна Substance 3D Stager, связанная с чтением за границами буфера в памяти, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу