Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-12086 | 2 Blender, Debian | 2 Blender, Debian Linux | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable integer overflow exists in the 'BKE_mesh_calc_normals_tessface' functionality of the Blender open-source 3d creation suite. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open a .blend file in order to trigger this vulnerability. | |||||
CVE-2017-12082 | 2 Blender, Debian | 2 Blender, Debian Linux | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable integer overflow exists in the 'CustomData' Mesh loading functionality of the Blender open-source 3d creation suite. A .blend file with a specially crafted external data file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to edit an object within a .blend library in their Scene in order to trigger this vulnerability. | |||||
CVE-2017-12105 | 2 Blender, Debian | 2 Blender, Debian Linux | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. | |||||
CVE-2017-12104 | 2 Blender, Debian | 2 Blender, Debian Linux | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c draws a Particle object. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. | |||||
CVE-2017-12103 | 2 Blender, Debian | 2 Blender, Debian Linux | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c converts text rendered as a font into a curve. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. | |||||
CVE-2022-26501 | 1 Veeam | 1 Backup \& Replication | 2023-02-02 | 10.0 HIGH | 9.8 CRITICAL |
Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2). | |||||
CVE-2022-26500 | 1 Veeam | 1 Backup \& Replication | 2023-02-02 | 6.5 MEDIUM | 8.8 HIGH |
Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows remote authenticated users access to internal API functions that allows attackers to upload and execute arbitrary code. | |||||
CVE-2018-3871 | 1 Acdsystems | 1 Canvas Draw | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable out-of-bounds write exists in the PCX parsing functionality of Canvas Draw version 4.0.0. A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability and gain code execution. A different vulnerability than CVE-2018-3870. | |||||
CVE-2018-3870 | 1 Acdsystems | 1 Canvas Draw | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable out-of-bounds write exists in the PCX parsing functionality of Canvas Draw version 4.0.0. A specially crafted PCX image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a PCX image to trigger this vulnerability and gain code execution. A different vulnerability than CVE-2018-3871. | |||||
CVE-2018-3860 | 1 Acdsystems | 1 Canvas Draw | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable out-of-bounds write exists in the TIFF parsing functionality of Canvas Draw version 4.0.0. A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain the ability to execute code. A different vulnerability than CVE-2018-3859. | |||||
CVE-2018-3859 | 1 Acdsystems | 1 Canvas Draw | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable out-of-bounds write exists in the TIFF parsing functionality of Canvas Draw version 4.0.0. A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain code execution. A different vulnerability than CVE-2018-3860. | |||||
CVE-2018-3858 | 1 Acdsystems | 1 Canvas Draw | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap overflow exists in the TIFF parsing functionality of Canvas Draw version 4.0.0. A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain the ability to execute code. A different vulnerability than CVE-2018-3857. | |||||
CVE-2018-3857 | 1 Acdsystems | 1 Canvas Draw | 2023-02-02 | 6.8 MEDIUM | 7.8 HIGH |
An exploitable heap overflow exists in the TIFF parsing functionality of Canvas Draw version 4.0.0. A specially crafted TIFF image processed via the application can lead to an out-of-bounds write, overwriting arbitrary data. An attacker can deliver a TIFF image to trigger this vulnerability and gain code execution. A different vulnerability than CVE-2018-3858. | |||||
CVE-2021-43666 | 2 Arm, Debian | 2 Mbed Tls, Debian Linux | 2023-02-02 | 5.0 MEDIUM | 7.5 HIGH |
A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password's length is 0. | |||||
CVE-2022-25515 | 1 Nothings | 1 Stb Truetype.h | 2023-02-02 | 5.0 MEDIUM | 6.5 MEDIUM |
** DISPUTED ** stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function ttULONG() at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input. | |||||
CVE-2021-20607 | 1 Mitsubishielectric | 3 Ezsocket, Gx Works2, Melsoft Navigator | 2023-02-02 | 4.3 MEDIUM | 5.5 MEDIUM |
Integer Underflow vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior, Mitsubishi Electric MELSOFT Navigator versions 2.84N and prior and Mitsubishi Electric EZSocket versions 5.4 and prior allows an attacker to cause a DoS condition in the software by getting a user to open malicious project file specially crafted by an attacker. | |||||
CVE-2020-35576 | 1 Tp-link | 2 Tl-wr841n, Tl-wr841n Firmware | 2023-02-02 | 9.0 HIGH | 8.8 HIGH |
A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577. | |||||
CVE-2022-3541 | 1 Linux | 1 Linux Kernel | 2023-02-02 | N/A | 7.8 HIGH |
A vulnerability classified as critical has been found in Linux Kernel. This affects the function spl2sw_nvmem_get_mac_address of the file drivers/net/ethernet/sunplus/spl2sw_driver.c of the component BPF. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211041 was assigned to this vulnerability. | |||||
CVE-2022-37767 | 1 Pebbletemplates | 1 Pebble Templates | 2023-02-02 | N/A | 9.8 CRITICAL |
** DISPUTED ** Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. NOTE: the vendor disputes this because input to the Pebble templating engine is intended to include arbitrary Java code, and thus either the input should not arrive from an untrusted source, or else the application using the engine should apply restrictions to the input. The engine is not responsible for validating the input. | |||||
CVE-2022-25516 | 1 Nothings | 1 Stb Truetype.h | 2023-02-02 | 5.0 MEDIUM | 6.5 MEDIUM |
** DISPUTED ** stb_truetype.h v1.26 was discovered to contain a heap-buffer-overflow via the function stbtt__find_table at stb_truetype.h. NOTE: Third party has disputed stating that the source code has also a disclaimer that it should only be used with trusted input. |