Adobe Dimension 3.4.11

CPE Details

Adobe Dimension 3.4.11
3.4.11
2024-08-27
15h08 +00:00
2024-08-27
15h08 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:adobe:dimension:3.4.11:*:*:*:*:*:*:*

Informations

Vendor

adobe

Product

dimension

Version

3.4.11

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-45146 2024-10-09 08h51 +00:00 Dimension versions 4.0.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
7.8
Haute
CVE-2024-45150 2024-10-09 08h51 +00:00 Dimension versions 4.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
7.8
Haute
CVE-2024-34125 2024-08-14 14h55 +00:00 Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
5.5
Moyen
CVE-2024-41865 2024-08-14 14h55 +00:00 Dimension versions 3.4.11 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate file. This could occur if the application uses a search path to locate executables or libraries. Exploitation of this issue requires user interaction.
7.8
Haute
CVE-2024-34126 2024-08-14 14h55 +00:00 Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
5.5
Moyen
CVE-2024-20789 2024-08-14 14h55 +00:00 Dimension versions 3.4.11 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
7.8
Haute
CVE-2024-34124 2024-08-14 14h55 +00:00 Dimension versions 3.4.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
7.8
Haute
CVE-2024-20790 2024-08-14 14h55 +00:00 Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
5.5
Moyen