Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
blender blender vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2009-3850
Blender 2.34, 2.35a, 2.40, and 2.49b allows remote malicious users to execute arbitrary code via a .blend file that contains Python statements in the onLoad action of a ScriptLink SDNA.
Blender Blender 2.49b
Blender Blender 2.35a
Blender Blender 2.34
Blender Blender 2.40
1 EDB exploit
NA
CVE-2009-38503
Core Security Technologies Advisory - Blender embeds a python interpreter to extend its functionality. Blender .blend project files can be modified to execute arbitrary commands without user intervention by design. An attacker can take full control of the machine where Blender is...
6.9
CVSSv2
CVE-2008-4863
Untrusted search path vulnerability in BPY_interface in Blender 2.46 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function.
Blender Blender 2.46
6.9
CVSSv2
CVE-2008-1103
Multiple unspecified vulnerabilities in Blender have unknown impact and attack vectors, related to "temporary file issues."
Blender Blender
6.8
CVSSv2
CVE-2008-1102
Stack-based buffer overflow in the imb_loadhdr function in Blender 2.45 allows user-assisted remote malicious users to execute arbitrary code via a .blend file that contains a crafted Radiance RGBE image.
Blender Blender 2.45
9.3
CVSSv2
CVE-2007-1253
Eval injection vulnerability in the (a) kmz_ImportWithMesh.py Script for Blender 0.1.9h, as used in (b) Blender prior to 2.43, allows user-assisted remote malicious users to execute arbitrary Python code by importing a crafted (1) KML or (2) KMZ file.
Blender Blender 2.37a
Blender Blender 2.36
Blender Blender 2.25
Blender Blender
7.5
CVSSv2
CVE-2005-4470
Heap-based buffer overflow in the get_bhead function in readfile.c in Blender BlenLoader 2.0 up to and including 2.40pre allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a .blend file with a negative bhead.len ...
Blender Blenloader 2.27
Blender Blenloader 2.28
Blender Blenloader 2.28a
Blender Blenloader 2.34
Blender Blenloader 2.35
Blender Blenloader 2.25
Blender Blenloader 2.26
Blender Blenloader 2.33
Blender Blenloader 2.33a
Blender Blenloader
Blender Blenloader 2.0
Blender Blenloader 2.04
Blender Blenloader 2.31a
Blender Blenloader 2.32
Blender Blenloader 2.39
Blender Blenloader 2.40 Alpha
Blender Blenloader 2.28c
Blender Blenloader 2.30
Blender Blenloader 2.37
Blender Blenloader 2.37a
5.1
CVSSv2
CVE-2005-3354
Stack-based buffer overflow in the ldif_get_line function in ldif.c of Sylpheed prior to 2.1.6 allows user-assisted malicious users to execute arbitrary code by having local users import LDIF files with long lines.
Sylpheed Sylpheed 0.9.5
Sylpheed Sylpheed 0.9.6
Sylpheed Sylpheed 1.0.3
Sylpheed Sylpheed 1.0.4
Sylpheed Sylpheed 2.1.2
Sylpheed Sylpheed 2.1.3
Sylpheed Sylpheed 0.9.7
Sylpheed Sylpheed 0.9.8
Sylpheed Sylpheed 2.0
Sylpheed Sylpheed 2.0.1
Sylpheed Sylpheed 2.1.4
Sylpheed Sylpheed 2.1.5
Sylpheed Sylpheed 0.9.11
Sylpheed Sylpheed 0.9.12
Sylpheed Sylpheed 0.9.4
Sylpheed Sylpheed 1.0.1
Sylpheed Sylpheed 1.0.2
Sylpheed Sylpheed 2.1
Sylpheed Sylpheed 2.1.1
Sylpheed Sylpheed 0.8.11
Sylpheed Sylpheed 0.9.10
Sylpheed Sylpheed 0.9.9
7.5
CVSSv2
CVE-2005-3302
Eval injection vulnerability in bvh_import.py in Blender 2.36 allows malicious users to execute arbitrary Python code via a hierarchy element in a .bvh file, which is supplied to an eval function call.
Blender Blender 2.36
Debian Debian Linux 3.1
1 EDB exploit
7.5
CVSSv2
CVE-2005-3151
Buffer overflow in blenderplay in Blender Player 2.37a allows malicious users to execute arbitrary code via a long command line argument.
Blender Blender 2.37a
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »