<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Substance_3d_painter on CVE Alert &amp; Security Feed</title><link>https://cvealert.net/products/substance_3d_painter/</link><description>Recent content in Substance_3d_painter on CVE Alert &amp; Security Feed</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 12 May 2026 18:17:11 +0000</lastBuildDate><atom:link href="https://cvealert.net/products/substance_3d_painter/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-34675</title><link>https://cvealert.net/posts/cve-2026-34675/</link><pubDate>Tue, 12 May 2026 18:17:11 +0000</pubDate><guid>https://cvealert.net/posts/cve-2026-34675/</guid><description>Substance3D - Painter versions 12.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.</description></item><item><title>CVE-2026-34676</title><link>https://cvealert.net/posts/cve-2026-34676/</link><pubDate>Tue, 12 May 2026 18:17:11 +0000</pubDate><guid>https://cvealert.net/posts/cve-2026-34676/</guid><description>Substance3D - Painter versions 12.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.</description></item></channel></rss>