Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
blender blender vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2009-3850
Blender 2.34, 2.35a, 2.40, and 2.49b allows remote malicious users to execute arbitrary code via a .blend file that contains Python statements in the onLoad action of a ScriptLink SDNA.
Blender Blender 2.35a
Blender Blender 2.49b
Blender Blender 2.40
Blender Blender 2.34
1 EDB exploit
9.3
CVSSv2
CVE-2007-1253
Eval injection vulnerability in the (a) kmz_ImportWithMesh.py Script for Blender 0.1.9h, as used in (b) Blender prior to 2.43, allows user-assisted remote malicious users to execute arbitrary Python code by importing a crafted (1) KML or (2) KMZ file.
Blender Blender 2.36
Blender Blender
Blender Blender 2.37a
Blender Blender 2.25
7.5
CVSSv2
CVE-2005-4470
Heap-based buffer overflow in the get_bhead function in readfile.c in Blender BlenLoader 2.0 up to and including 2.40pre allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a .blend file with a negative bhead.len ...
Blender Blenloader 2.35
Blender Blenloader 2.31a
Blender Blenloader 2.28a
Blender Blenloader 2.30
Blender Blenloader 2.32
Blender Blenloader 2.39
Blender Blenloader 2.25
Blender Blenloader 2.28c
Blender Blenloader 2.0
Blender Blenloader
Blender Blenloader 2.37
Blender Blenloader 2.27
Blender Blenloader 2.34
Blender Blenloader 2.33
Blender Blenloader 2.28
Blender Blenloader 2.04
Blender Blenloader 2.33a
Blender Blenloader 2.37a
Blender Blenloader 2.40 Alpha
Blender Blenloader 2.26
7.5
CVSSv2
CVE-2005-3302
Eval injection vulnerability in bvh_import.py in Blender 2.36 allows malicious users to execute arbitrary Python code via a hierarchy element in a .bvh file, which is supplied to an eval function call.
Blender Blender 2.36
Debian Debian Linux 3.1
1 EDB exploit
7.5
CVSSv2
CVE-2005-3151
Buffer overflow in blenderplay in Blender Player 2.37a allows malicious users to execute arbitrary code via a long command line argument.
Blender Blender 2.37a
7.5
CVSSv2
CVE-2002-0724
Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows malicious users to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerE...
Microsoft Windows Nt 4.0
Microsoft Windows 2000
Microsoft Windows Xp
2 EDB exploits
7.5
CVSSv2
CVE-2002-0364
Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows malicious users to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise."
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 4.0
7.5
CVSSv2
CVE-2002-0071
Buffer overflow in the ism.dll ISAPI extension that implements HTR scripting in Internet Information Server (IIS) 4.0 and 5.0 allows malicious users to cause a denial of service or execute arbitrary code via HTR requests with long variable names.
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 4.0
7.5
CVSSv2
CVE-2002-0074
Cross-site scripting vulnerability in Help File search facility for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote malicious users to embed scripts into another user's session.
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 4.0
7.5
CVSSv2
CVE-2002-0075
Cross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote malicious users to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message.
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »