Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
blender vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2009-3850
Blender 2.34, 2.35a, 2.40, and 2.49b allows remote malicious users to execute arbitrary code via a .blend file that contains Python statements in the onLoad action of a ScriptLink SDNA.
Blender Blender 2.49b
Blender Blender 2.35a
Blender Blender 2.34
Blender Blender 2.40
1 EDB exploit
828
VMScore
CVE-2007-1253
Eval injection vulnerability in the (a) kmz_ImportWithMesh.py Script for Blender 0.1.9h, as used in (b) Blender prior to 2.43, allows user-assisted remote malicious users to execute arbitrary Python code by importing a crafted (1) KML or (2) KMZ file.
Blender Blender 2.37a
Blender Blender 2.36
Blender Blender 2.25
Blender Blender
770
VMScore
CVE-2002-0079
Buffer overflow in the chunked encoding transfer mechanism in Internet Information Server (IIS) 4.0 and 5.0 Active Server Pages allows malicious users to cause a denial of service or execute arbitrary code.
Microsoft Internet Information Services 5.0
Microsoft Internet Information Server 4.0
4 EDB exploits
760
VMScore
CVE-2002-0724
Buffer overflow in SMB (Server Message Block) protocol in Microsoft Windows NT, Windows 2000, and Windows XP allows malicious users to cause a denial of service (crash) via a SMB_COM_TRANSACTION packet with a request for the (1) NetShareEnum, (2) NetServerEnum2, or (3) NetServerE...
Microsoft Windows 2000
Microsoft Windows Nt 4.0
Microsoft Windows Xp
2 EDB exploits
755
VMScore
CVE-2005-3302
Eval injection vulnerability in bvh_import.py in Blender 2.36 allows malicious users to execute arbitrary Python code via a hierarchy element in a .bvh file, which is supplied to an eval function call.
Blender Blender 2.36
Debian Debian Linux 3.1
1 EDB exploit
755
VMScore
CVE-2002-0148
Cross-site scripting vulnerability in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote malicious users to execute arbitrary script as other users via an HTTP error page.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
1 EDB exploit
668
VMScore
CVE-2005-4470
Heap-based buffer overflow in the get_bhead function in readfile.c in Blender BlenLoader 2.0 up to and including 2.40pre allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a .blend file with a negative bhead.len ...
Blender Blenloader 2.27
Blender Blenloader 2.28
Blender Blenloader 2.28a
Blender Blenloader 2.34
Blender Blenloader 2.35
Blender Blenloader 2.25
Blender Blenloader 2.26
Blender Blenloader 2.33
Blender Blenloader 2.33a
Blender Blenloader
Blender Blenloader 2.0
Blender Blenloader 2.04
Blender Blenloader 2.31a
Blender Blenloader 2.32
Blender Blenloader 2.39
Blender Blenloader 2.40 Alpha
Blender Blenloader 2.28c
Blender Blenloader 2.30
Blender Blenloader 2.37
Blender Blenloader 2.37a
668
VMScore
CVE-2005-3151
Buffer overflow in blenderplay in Blender Player 2.37a allows malicious users to execute arbitrary code via a long command line argument.
Blender Blender 2.37a
668
VMScore
CVE-2002-0364
Buffer overflow in the chunked encoding transfer mechanism in IIS 4.0 and 5.0 allows malicious users to execute arbitrary code via the processing of HTR request sessions, aka "Heap Overrun in HTR Chunked Encoding Could Enable Web Server Compromise."
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
668
VMScore
CVE-2002-0071
Buffer overflow in the ism.dll ISAPI extension that implements HTR scripting in Internet Information Server (IIS) 4.0 and 5.0 allows malicious users to cause a denial of service or execute arbitrary code via HTR requests with long variable names.
Microsoft Internet Information Server 4.0
Microsoft Internet Information Services 5.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »