Логотип exploitDog
bind:CVE-2024-45142
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-45142

Количество 3

Количество 3

nvd логотип

CVE-2024-45142

больше 1 года назад

Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability allows an attacker to write a controlled value to an arbitrary memory location, potentially leading to code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-f3c7-cxhx-4h8j

больше 1 года назад

Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability allows an attacker to write a controlled value to an arbitrary memory location, potentially leading to code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2024-08424

больше 1 года назад

Уязвимость программного обеспечения для 3D-дизайна Substance 3D Stager, связанная с записью произвольного значения в любое произвольное место и переполнением буфера, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-45142

Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability allows an attacker to write a controlled value to an arbitrary memory location, potentially leading to code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-f3c7-cxhx-4h8j

Substance3D - Stager versions 3.0.3 and earlier are affected by a Write-what-where Condition vulnerability that could allow an attacker to execute arbitrary code in the context of the current user. This vulnerability allows an attacker to write a controlled value to an arbitrary memory location, potentially leading to code execution. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-08424

Уязвимость программного обеспечения для 3D-дизайна Substance 3D Stager, связанная с записью произвольного значения в любое произвольное место и переполнением буфера, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу