{"id":"CVE-2021-45847","details":"Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file.","modified":"2026-04-10T04:42:01.598116Z","published":"2022-01-25T14:15:08.860Z","references":[{"type":"FIX","url":"https://github.com/slic3r/Slic3r/issues/5120"},{"type":"FIX","url":"https://github.com/slic3r/Slic3r/issues/5118"},{"type":"FIX","url":"https://github.com/slic3r/Slic3r/issues/5119"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/slic3r/Slic3r","events":[{"introduced":"0"},{"last_affected":"3ba8e0f36948276d3620a8627449e17f183ced54"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.3.0"}]}}],"versions":["0.5.0","0.5.1","0.5.2","0.5.3","0.5.4","0.5.5","0.5.5a","0.5.5b","0.5.6","0.5.7","0.6.0","0.7.0","0.7.1","0.7.2b","0.8.0","0.8.1","0.8.2","0.8.3","0.8.4","0.9.0","0.9.1","0.9.2","0.9.3","0.9.4","0.9.5","0.9.7","0.9.9","1.0.0RC1","1.1.0","1.1.1","1.1.2","1.1.3","1.1.4","1.2.0","1.2.1","1.2.2","1.2.3","1.2.4","1.2.5","1.2.6","1.2.7","1.2.8","1.2.9","1.3.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-45847.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}