Page 254 of 11030 results (0.100 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

10 May 2023 — Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 5%CPEs: 1EXPL: 0

10 May 2023 — Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

10 May 2023 — Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

10 May 2023 — Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. • https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html • CWE-787: Out-of-bounds Write •

CVSS: 9.0EPSS: 0%CPEs: 9EXPL: 0

10 May 2023 — This flaw allows attackers with network access to pass specially crafted web content files, causing a denial of service or arbitrary code execution. • https://access.redhat.com/errata/RHSA-2023:2653 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for root which is stored using weak encryption. This vulnerability allows attackers to connect to the TELNET service (or UART) by using the exposed credentials. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_PRA.md • CWE-326: Inadequate Encryption Strength CWE-798: Use of Hard-coded Credentials •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 was discovered to contain a hard-coded default password for the RTSP feed. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_RTSPa.md • CWE-798: Use of Hard-coded Credentials •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows unauthenticated remote code execution via an XML document. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_uRCE.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

10 May 2023 — Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access. • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_NCD.md • CWE-319: Cleartext Transmission of Sensitive Information CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

10 May 2023 — Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows attackers to update the device with crafted firmware • https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_MU.md • CWE-354: Improper Validation of Integrity Check Value •