‼ CVE-2020-28620 ‼
📖 Read
via "National Vulnerability Database".
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_edge() eh->center_vertex():.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28614 ‼
📖 Read
via "National Vulnerability Database".
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_vertex() vh->shalfedges_begin().📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28621 ‼
📖 Read
via "National Vulnerability Database".
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_edge() eh->out_sedge().📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35630 ‼
📖 Read
via "National Vulnerability Database".
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() sfh->center_vertex().📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27853 ‼
📖 Read
via "National Vulnerability Database".
Authenticated (author or higher role) Stored Cross-Site Scripting (XSS) in Contest Gallery (WordPress plugin) <= 13.1.0.9📖 Read
via "National Vulnerability Database".
‼ CVE-2020-35631 ‼
📖 Read
via "National Vulnerability Database".
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() SD.link_as_face_cycle().📖 Read
via "National Vulnerability Database".
‼ CVE-2022-25226 ‼
📖 Read
via "National Vulnerability Database".
ThinVNC version 1.0b1 allows an unauthenticated user to bypass the authentication process via 'http://thin-vnc:8080/cmd?cmd=connect' by obtaining a valid SID without any kind of authentication. It is possible to achieve code execution on the server by sending keyboard or mouse events to the server.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-1341 ‼
📖 Read
via "National Vulnerability Database".
An issue was discovered in in bwm-ng v0.6.2. An arbitrary null write exists in get_cmdln_options() function in src/options.c.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-46122 ‼
📖 Read
via "National Vulnerability Database".
Tp-Link TL-WR840N (EU) v6.20 Firmware (0.9.1 4.17 v0001.0 Build 201124 Rel.64328n) is vulnerable to Buffer Overflow via the Password reset feature.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-6099 ‼
📖 Read
via "National Vulnerability Database".
An exploitable code execution vulnerability exists in the file format parsing functionality of Graphisoft BIMx Desktop Viewer 2019.2.2328. A specially crafted file can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-23975 ‼
📖 Read
via "National Vulnerability Database".
Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to activate any installed plugin.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27530 ‼
📖 Read
via "National Vulnerability Database".
A maliciously crafted TIF or PICT file in Autodesk AutoCAD 2022, 2021, 2020, 2019 can be used to write beyond the allocated buffer through Buffer overflow vulnerability. This vulnerability may be exploited to execute arbitrary code.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42781 ‼
📖 Read
via "National Vulnerability Database".
Heap buffer overflow issues were found in Opensc before version 0.22.0 in pkcs15-oberthur.c that could potentially crash programs using the library.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3652 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in 389-ds-base. If an asterisk is imported as password hashes, either accidentally or maliciously, then instead of being inactive, any password will successfully match during authentication. This flaw allows an attacker to successfully authenticate as a user whose password was disabled.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-27652 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in cri-o, where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42779 ‼
📖 Read
via "National Vulnerability Database".
A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3503 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3624 ‼
📖 Read
via "National Vulnerability Database".
There is an integer overflow vulnerability in dcraw. When the victim runs dcraw with a maliciously crafted X3F input image, arbitrary code may be executed in the victim's system.📖 Read
via "National Vulnerability Database".
‼ CVE-2020-28635 ‼
📖 Read
via "National Vulnerability Database".
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sedge() seh->facet().📖 Read
via "National Vulnerability Database".
‼ CVE-2021-3681 ‼
📖 Read
via "National Vulnerability Database".
A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.📖 Read
via "National Vulnerability Database".
‼ CVE-2021-42780 ‼
📖 Read
via "National Vulnerability Database".
A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library.📖 Read
via "National Vulnerability Database".