Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-27438 | 28 3cx, Boom, Caphyon and 25 more | 98 Call Flow Designer, Crm Template Generator, Boomtv Streamer Portal and 95 more | 2022-10-19 | 5.1 MEDIUM | 8.1 HIGH |
Caphyon Ltd Advanced Installer 19.3 and earlier and many products that use the updater from Advanced Installer (Advanced Updater) are affected by a remote code execution vulnerability via the CustomDetection parameter in the update check function. To exploit this vulnerability, a user must start an affected installation to trigger the update check. | |||||
CVE-2020-28594 | 1 Prusa3d | 1 Prusaslicer | 2022-08-31 | 6.8 MEDIUM | 7.8 HIGH |
A use-after-free vulnerability exists in the _3MF_Importer::_handle_end_model() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2020-28596 | 1 Prusa3d | 1 Prusaslicer | 2022-08-31 | 6.8 MEDIUM | 7.8 HIGH |
A stack-based buffer overflow vulnerability exists in the Objparser::objparse() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2020-28595 | 1 Prusa3d | 1 Prusaslicer | 2022-08-31 | 6.8 MEDIUM | 7.8 HIGH |
An out-of-bounds write vulnerability exists in the Obj.cpp load_obj() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted obj file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. | |||||
CVE-2020-28598 | 1 Prusa3d | 1 Prusaslicer | 2022-08-24 | 6.8 MEDIUM | 7.8 HIGH |
An out-of-bounds write vulnerability exists in the Admesh stl_fix_normal_directions() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted AMF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. |