📦 3d Visual Enterprise Author

by Sap

🔍 What is 3d Visual Enterprise Author?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2022-41185

HIGH CVSS 7.8 Oct 11, 2022

This vulnerability in SAP 3D Visual Enterprise Author allows remote code execution when a user opens a malicious Visual Design Stream (.vds) file. Attackers can exploit improper memory management to t...

CVE-2022-41180

HIGH CVSS 7.8 Oct 11, 2022

This vulnerability in SAP 3D Visual Enterprise Author allows remote code execution when a user opens a malicious PDF file. Attackers can exploit improper memory management in PDFPublishing.dll to trig...

CVE-2022-41177

HIGH CVSS 7.8 Oct 11, 2022

This vulnerability in SAP 3D Visual Enterprise Author allows remote code execution when a user opens a malicious IGES file. Attackers can exploit improper memory management to execute arbitrary code o...

CVE-2022-41172

HIGH CVSS 7.8 Oct 11, 2022

This vulnerability allows remote code execution when a user opens a malicious AutoCAD DXF file in SAP 3D Visual Enterprise Author. Attackers can exploit improper memory management to trigger stack-bas...

CVE-2022-39808

HIGH CVSS 7.8 Oct 11, 2022

CVE-2022-39808 is a memory corruption vulnerability in SAP 3D Visual Enterprise Author that allows remote code execution when a user opens a malicious Wavefront Object (.obj) file. Attackers can explo...

CVE-2022-41168

HIGH CVSS 7.8 Oct 11, 2022

This vulnerability allows remote code execution when a user opens a malicious CATIA5 Part (.catpart) file in SAP 3D Visual Enterprise Author version 9. Attackers can exploit improper memory management...

CVE-2022-39803

HIGH CVSS 7.8 Oct 11, 2022

This vulnerability in SAP 3D Visual Enterprise Author allows remote code execution when a user opens a malicious ACIS Part and Assembly (.sat) file. Attackers can exploit improper memory management to...

CVE-2022-39805

HIGH CVSS 7.8 Oct 11, 2022

This vulnerability in SAP 3D Visual Enterprise Author allows remote code execution when a user opens a malicious Computer Graphics Metafile (.cgm) file. Attackers can exploit improper memory managemen...