A vulnerability was found in Openscad and classified as critical. Affected by this issue is the function import of the component DXF Format Handler. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2022-0496. The attack needs to be done within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Smarty up to 3.1.38. It has been declared as critical. This vulnerability affects unknown code of the component Function Handler. The manipulation leads to code injection.
This vulnerability was named CVE-2021-26120. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Samba. Affected is the function gnutls_rnd of the file lib/util/genrand.c of the component GnuTLS. The manipulation leads to insufficiently random values.
This vulnerability is traded as CVE-2022-1615. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Smarty up to 3.1.38. It has been classified as critical. This affects the function $smarty.template_object of the component Sandbox Mode. The manipulation leads to sandbox issue.
This vulnerability is uniquely identified as CVE-2021-26119. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Smarty up to 3.1.44/4.1.0. Affected is an unknown function. The manipulation leads to code injection.
This vulnerability is traded as CVE-2022-29221. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in cmark-gfm up to 0.29.0.gfm.5. It has been classified as problematic. This affects an unknown part of the component Autolink Extension. The manipulation leads to resource consumption.
This vulnerability is uniquely identified as CVE-2022-39209. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ISC BIND up to 9.18.27/9.18.27-S1/9.19.24. It has been classified as critical. Affected is an unknown function of the component DNS Messages over TCP Handler. The manipulation leads to resource consumption.
This vulnerability is traded as CVE-2024-0760. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in sssd. Affected by this issue is some unknown functionality of the component GPO Policy. The manipulation leads to race condition.
This vulnerability is handled as CVE-2023-3758. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in Django up to 2.2.17/3.0.11/3.1.5. It has been classified as critical. Affected is the function django.utils.archive.extract of the component Archive Handler. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2021-3281. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in cpython up to 3.6.12/3.7.9/3.8.7/3.9.1. Affected is the function urllib.parse.parse_qsl/urllib.parse.parse_qs. The manipulation leads to http request smuggling.
This vulnerability is traded as CVE-2021-23336. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Django up to 2.2.19/3.0.13/3.1.7. It has been classified as critical. This affects an unknown part of the component MultiPartParser. The manipulation leads to pathname traversal.
This vulnerability is uniquely identified as CVE-2021-28658. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Django up to 2.2.20/3.1.8/3.2.0. It has been declared as critical. Affected by this vulnerability is the function MultiPartParser/UploadedFile/FieldFile of the component File Name Handler. The manipulation leads to pathname traversal.
This vulnerability is known as CVE-2021-31542. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in libtar. Affected is the function tar_close of the file libtar.c. The manipulation leads to use after free.
This vulnerability is traded as CVE-2021-33640. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability was found in GNU Libtasn1 up to 4.18.x and classified as problematic. Affected by this issue is the function asn1_encode_simple_der. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2021-46848. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Advancecomp 2.3. This issue affects the function __interceptor_memcpy of the file /sanitizer_common/sanitizer_common_interceptors.inc. The manipulation leads to heap-based buffer overflow.
The identification of this vulnerability is CVE-2022-35020. The attack may be initiated remotely. There is no exploit available.