Show filters
101 Total Results
Displaying 1-10 of 101
Sort by:
Attacker Value
Unknown

CVE-2022-41211

Disclosure Date: November 08, 2022 (last updated February 24, 2025)
Due to lack of proper memory management, when a victim opens manipulated file received from untrusted sources in SAP 3D Visual Enterprise Author and SAP 3D Visual Enterprise Viewer, Arbitrary Code Execution can be triggered when payload forces:Re-use of dangling pointer which refers to overwritten space in memory. The accessed memory must be filled with code to execute the attack. Therefore, repeated success is unlikely.Stack-based buffer overflow. Since the memory overwritten is random, based on access rights of the memory, repeated success is not assured.
Attacker Value
Unknown

CVE-2022-35171

Disclosure Date: July 12, 2022 (last updated February 24, 2025)
When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below
Attacker Value
Unknown

CVE-2022-27655

Disclosure Date: April 12, 2022 (last updated February 23, 2025)
When a user opens a manipulated Universal 3D (.u3d, 3difr.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.
Attacker Value
Unknown

CVE-2022-27654

Disclosure Date: April 12, 2022 (last updated February 23, 2025)
When a user opens a manipulated Photoshop Document (.psd, 2d.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.
Attacker Value
Unknown

CVE-2022-26109

Disclosure Date: April 12, 2022 (last updated February 23, 2025)
When a user opens a manipulated Portable Document Format (.pdf, PDFView.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.
Attacker Value
Unknown

CVE-2022-26108

Disclosure Date: April 12, 2022 (last updated February 23, 2025)
When a user opens a manipulated Picture Exchange (.pcx, 2d.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.
Attacker Value
Unknown

CVE-2022-26107

Disclosure Date: April 12, 2022 (last updated February 23, 2025)
When a user opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.
Attacker Value
Unknown

CVE-2022-26106

Disclosure Date: April 12, 2022 (last updated February 23, 2025)
When a user opens a manipulated Computer Graphics Metafile (.cgm, CgmCore.dll) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application.
Attacker Value
Unknown

CVE-2022-22537

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
When a user opens a manipulated Tagged Image File Format (.tiff, 2d.x3d)) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below.
Attacker Value
Unknown

CVE-2022-22539

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
When a user opens a manipulated JPEG file format (.jpg, 2d.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below.