You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to
https://nvd.nist.gov
An official website of the United States government
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
AND
OR
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2017.4 up to (including) 2018.4
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2019.1 up to (excluding) 2019.1.15f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2019.2 up to (excluding) 2019.2.23f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2019.3 up to (including) 2019.3.17f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2020.1 up to (excluding) 2020.1.18f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2020.2 up to (excluding) 2020.2.8f1
*cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2019.4 up to (excluding) 2019.4.41f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2020.3 up to (excluding) 2020.3.49f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2021.1 up to (excluding) 2021.1.29f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2021.2 up to (excluding) 2021.2.20f1
*cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2021.3 up to (excluding) 2021.3.45f2
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2022.1 up to (excluding) 2022.1.25f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 2022.2 up to (excluding) 2022.2.23f1
*cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2022.3 up to (excluding) 2022.3.62f2
*cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2023.1 up to (excluding) 2023.1.22f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 6000.1 up to (excluding) 6000.1.17f1
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 6000.2 up to (excluding) 6000.2.6f2
*cpe:2.3:a:unity:editor:*:*:*:*:-:*:*:* versions from (including) 6000.3 up to (excluding) 6000.3.0b4
*cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 2023.2 up to (excluding) 2023.2.22f1
*cpe:2.3:a:unity:editor:*:*:*:*:lts:*:*:* versions from (including) 6000.0 up to (excluding) 6000.0.58f2
*cpe:2.3:a:unity:editor:2017.1.2p4+:*:*:*:-:*:*:*
*cpe:2.3:a:unity:editor:2017.2.0p4+:*:*:*:-:*:*:*
*cpe:2.3:a:unity:editor:2017.3.0b9+:*:*:*:-:*:*:*
OR
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
Added
Reference Type
MITRE: https://flatt.tech/research/posts/arbitrary-code-execution-in-unity-runtime/ Types: Exploit, Third Party Advisory