cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-47434,https://securityvulnerability.io/vulnerability/CVE-2024-47434,Out-of-Bounds Write Vulnerability in Adobe Substance3D Painter,"Substance3D Painter versions 10.1.0 and earlier contain an out-of-bounds write vulnerability that allows for arbitrary code execution in the context of the user executing the application. To exploit this vulnerability, a user must open a specially crafted malicious file. This can lead to unauthorized actions, prompting significant security concerns that necessitate immediate attention and remediation. Users of affected versions should consider applying updates or patches as recommended by Adobe to mitigate the risks associated with this vulnerability.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47436,https://securityvulnerability.io/vulnerability/CVE-2024-47436,Out-of-Bounds Read Vulnerability in Substance3D Painter by Adobe,"Substance3D Painter, specifically versions 10.1.0 and earlier, is susceptible to an out-of-bounds read vulnerability. This flaw may enable attackers to disclose sensitive memory data by leveraging user interaction through malicious file handling. The vulnerability bypasses common mitigations such as Address Space Layout Randomization (ASLR), emphasizing the need for users to exercise caution when opening files from untrusted sources.",Adobe,Substance 3d Painter,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47428,https://securityvulnerability.io/vulnerability/CVE-2024-47428,Out-of-Bounds Write Vulnerability in Substance3D Painter by Adobe,"An out-of-bounds write vulnerability exists in Substance3D Painter versions 10.1.0 and earlier, posing a risk of arbitrary code execution if exploited. This security flaw requires user interaction, as a victim must open a specially crafted malicious file. Once executed, the vulnerability could allow attackers to manipulate the software and potentially compromise the user's system. It is crucial for users to ensure the use of updated software versions to mitigate the risks associated with this vulnerability.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47429,https://securityvulnerability.io/vulnerability/CVE-2024-47429,Out-of-Bounds Write Vulnerability in Substance3D Painter by Adobe,"Substance3D Painter, a software product by Adobe, is susceptible to an out-of-bounds write vulnerability present in versions 10.1.0 and earlier. This vulnerability may enable attackers to execute arbitrary code within the context of the user operating the software. Exploiting this issue necessitates user interaction; specifically, a victim must open a maliciously crafted file to trigger the vulnerability. Users are encouraged to apply the latest security updates to mitigate the risk associated with this issue.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47430,https://securityvulnerability.io/vulnerability/CVE-2024-47430,Out-of-Bounds Write Vulnerability in Substance3D Painter by Adobe,"Substance3D Painter versions 10.1.0 and earlier are vulnerable to an out-of-bounds write issue that can allow attackers to execute arbitrary code within the context of the affected user. Successful exploitation necessitates that the user opens a specifically crafted malicious file. This vulnerability can have significant implications, highlighting the necessity for users to be cautious when handling untrusted files.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47431,https://securityvulnerability.io/vulnerability/CVE-2024-47431,Heap-based Buffer Overflow in Substance3D Painter by Adobe,"A Heap-based Buffer Overflow vulnerability exists in Adobe Substance3D Painter, specifically in versions 10.1.0 and earlier. This vulnerability allows for arbitrary code execution within the context of the current user. Successful exploitation of this issue necessitates user interaction, as it requires the victim to open a specially crafted malicious file. This underscores the importance of remaining vigilant about file origins and the potential risks associated with executing unknown or untrusted files in affected versions.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006900000153109431,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47432,https://securityvulnerability.io/vulnerability/CVE-2024-47432,Out-of-Bounds Write Vulnerability in Substance3D Painter by Adobe,"Substance3D Painter, a product developed by Adobe, is affected by a vulnerability that allows for out-of-bounds write operations in its architecture. This issue exists in versions 10.1.0 and earlier, posing a risk for users who may unwittingly open compromised files. Successfully exploiting this vulnerability requires user interaction; thus, a user must open a malicious file. If exploited, it could lead to arbitrary code execution within the security context of the affected user, highlighting the importance of caution when handling potentially harmful files.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47433,https://securityvulnerability.io/vulnerability/CVE-2024-47433,Out-of-Bounds Write Vulnerability in Substance3D - Painter by Adobe,"An out-of-bounds write vulnerability exists in Substance3D - Painter that affects versions 10.1.0 and earlier. This vulnerability allows attackers to perform arbitrary code execution within the context of the current user. Exploitations necessitate user interaction whereby the victim must open a specially crafted file. This creates potential risks for users, highlighting the importance of vigilance and updating to mitigate exposure.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47435,https://securityvulnerability.io/vulnerability/CVE-2024-47435,Out-of-Bounds Read Vulnerability in Adobe Substance3D Painter,"Substance3D Painter versions 10.1.0 and earlier are susceptible to an out-of-bounds read vulnerability, potentially allowing attackers to disclose sensitive memory data. This issue arises when a user opens a crafted file, enabling the attacker to bypass security measures like Address Space Layout Randomization (ASLR). Vigilance is required as user interaction is necessary for exploitation, emphasizing the importance of caution when handling untrusted files.",Adobe,Substance 3d Painter,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47437,https://securityvulnerability.io/vulnerability/CVE-2024-47437,Out-of-Bounds Read Vulnerability in Substance3D Painter by Adobe,"Versions 10.1.0 and earlier of Adobe's Substance3D Painter are vulnerable to an out-of-bounds read issue, which may allow attackers to access sensitive data from memory. This vulnerability requires the user to open a specially crafted file to exploit. Successful exploitation can bypass security measures like Address Space Layout Randomization (ASLR), potentially exposing a victim's data. Users are advised to be cautious of unknown files and to update to the latest version to mitigate risks.",Adobe,Substance 3d Painter,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47438,https://securityvulnerability.io/vulnerability/CVE-2024-47438,Memory Manipulation in Substance3D Painter by Adobe,"Substance3D Painter, developed by Adobe, is vulnerable to a Write-what-where condition present in versions 10.1.0 and earlier. This flaw permits an attacker to manipulate memory contents by writing a controlled value at a specified memory location. The exploitation of this vulnerability can lead to the exposure of sensitive memory data. Importantly, the successful execution of this attack requires that the user opens a malicious file, making user awareness and vigilance critical.",Adobe,Substance 3d Painter,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47439,https://securityvulnerability.io/vulnerability/CVE-2024-47439,NULL Pointer Dereference Vulnerability in Substance3D Painter by Adobe,"Substance3D Painter versions 10.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability. This flaw allows an attacker to exploit the application through specially crafted files, potentially leading to an application crash and resulting in a denial-of-service state. User interaction is necessary for exploitation, as the victim must open a malicious file to trigger the vulnerability. Action should be taken to update the software to mitigate these risks.",Adobe,Substance 3d Painter,5.5,MEDIUM,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-47440,https://securityvulnerability.io/vulnerability/CVE-2024-47440,Out-of-Bounds Read Vulnerability in Adobe Substance3D Painter,"Adobe Substance3D Painter versions up to 10.1.0 experience an out-of-bounds read vulnerability, potentially allowing unauthorized access to sensitive memory. An attacker could exploit this flaw by enticing a user to open a specially crafted file, which could facilitate bypassing security features like Address Space Layout Randomization (ASLR). This emphasizes the importance of safeguarding user interactions and ensuring that any file accessed is from a trusted source.",Adobe,Substance 3d Painter,5.5,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-49515,https://securityvulnerability.io/vulnerability/CVE-2024-49515,Untrusted Search Path Vulnerability in Substance3D Painter by Adobe,"An untrusted search path vulnerability is present in Substance3D Painter, impacting versions 10.1.0 and earlier. This flaw may allow attackers to execute arbitrary code by manipulating the search path used by the application to locate essential resources. When the application is tricked into searching for critical programs in untrusted locations, a malicious actor can insert paths that lead to harmful executable files. Exploitation of this vulnerability requires user interaction, as the victim must open a specially crafted file that triggers the execution of the malicious code. This poses significant risks, especially in environments where users interact with external files.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-49516,https://securityvulnerability.io/vulnerability/CVE-2024-49516,Out-of-Bounds Write Vulnerability in Substance3D Painter by Adobe,"The vulnerability presents an out-of-bounds write issue in Substance3D Painter versions up to 10.1.0. Exploitation of this flaw may allow for arbitrary code execution within the context of a user. Successful exploitation necessitates user interaction, specifically requiring that the user opens a specially crafted malicious file. As a result, this could pose a significant risk to user systems, emphasizing the need for caution when interacting with potentially harmful files.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-49517,https://securityvulnerability.io/vulnerability/CVE-2024-49517,Heap-based Buffer Overflow in Substance3D Painter Affects Adobe Products,"A heap-based buffer overflow vulnerability exists in Adobe Substance3D Painter versions 10.1.0 and earlier. This vulnerability allows an attacker to execute arbitrary code in the context of the current user, posing significant risks when a victim inadvertently opens a malicious file. User interaction is required for exploitation, emphasizing the importance of cautious file handling to mitigate potential attacks.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006900000153109431,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-49518,https://securityvulnerability.io/vulnerability/CVE-2024-49518,Out-of-Bounds Write Vulnerability in Substance3D Painter by Adobe,"Substance3D Painter versions 10.1.0 and earlier exhibit a vulnerability characterized by an out-of-bounds write issue. This flaw can potentially enable attackers to execute arbitrary code within the context of the current user. Exploiting this vulnerability necessitates user interaction, as a victim would need to open a specially crafted malicious file. Users of affected versions are advised to apply necessary patches to mitigate risks associated with this vulnerability.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0 CVE-2024-49520,https://securityvulnerability.io/vulnerability/CVE-2024-49520,Out-of-Bounds Write Vulnerability in Substance3D Painter Affecting Adobe Products,"Adobe Substance3D Painter versions up to and including 10.1.0 are vulnerable to an out-of-bounds write issue that may allow for arbitrary code execution within the context of the current user. This vulnerability requires user interaction, as the attack necessitates that the victim opens a crafted file designed to exploit the flaw. Users of affected versions are advised to exercise cautious behavior when handling unknown or suspicious files to mitigate potential risks associated with this vulnerability.",Adobe,Substance 3d Painter,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-11-12T20:15:00.000Z,0