7.8
CVE-2021-26826
- EPSS 0.65%
- Veröffentlicht 08.02.2021 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:56:52
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Godotengine ≫ Godot Engine Version <= 3.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.65% | 0.7 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.