A user may be tricked into opening a malicious FBX file which may exploit a use-after-free vulnerability in FBX’s Review causing the application to reference a memory location controlled by an unauthorized third party, thereby running arbitrary code on the system.
CPE | Name | Operator | Version |
---|---|---|---|
fbx_review | le | 1.5.0 |