cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-52994,https://securityvulnerability.io/vulnerability/CVE-2024-52994,Out-of-Bounds Write Vulnerability in Substance3D - Sampler by Adobe,"Substance3D - Sampler versions 4.5.1 and earlier contain an out-of-bounds write vulnerability that allows attackers to execute arbitrary code in the context of the current user. Successful exploitation necessitates user interaction, whereby the victim must open a specially crafted malicious file. This could lead to potential security risks and system compromise. Users of affected versions are advised to apply necessary updates and exercise caution when handling unknown files.",Adobe,Substance 3d Sampler,7.8,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52995,https://securityvulnerability.io/vulnerability/CVE-2024-52995,Heap-based Buffer Overflow in Substance3D Sampler by Adobe,"The Substance3D Sampler software produced by Adobe contains a vulnerability characterized as a Heap-based Buffer Overflow in versions 4.5.1 and earlier. This security issue can potentially allow an attacker to execute arbitrary code within the context of the user currently operating the software. Successful exploitation necessitates user interaction, specifically requiring the user to open a malicious file crafted to trigger the memory overflow. This vulnerability poses significant risks, emphasizing the importance of user awareness and software updates to mitigate such threats.",Adobe,Substance 3d Sampler,7.8,HIGH,0.0006900000153109431,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0 CVE-2024-52996,https://securityvulnerability.io/vulnerability/CVE-2024-52996,Heap-Based Buffer Overflow in Substance3D Sampler by Adobe,"Substance3D Sampler versions 4.5.1 and earlier contain a Heap-based Buffer Overflow vulnerability that allows for arbitrary code execution within the context of the current user. This issue necessitates user interaction, as the exploitation requires the victim to open a specially crafted malicious file. Prompt security measures and updates are imperative for users to mitigate potential risks associated with this vulnerability.",Adobe,Substance 3d Sampler,7.8,HIGH,0.0006900000153109431,false,,false,false,false,,,false,false,,2024-12-10T21:15:00.000Z,0