
CVE-2022-1427 – Out-of-bounds Read in mrb_obj_is_kind_of in in mruby/mruby
https://notcve.org/view.php?id=CVE-2022-1427
22 Apr 2022 — . # Impact: Possible arbitrary code execution if being exploited. • https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b • CWE-125: Out-of-bounds Read •

CVE-2022-26674 – ASUS RT-AX88U - Format String
https://notcve.org/view.php?id=CVE-2022-26674
22 Apr 2022 — ASUS RT-AX88U has a Format String vulnerability, which allows an unauthenticated remote attacker to write to arbitrary memory address and perform remote arbitrary code execution, arbitrary system operation or disrupt service. • https://www.twcert.org.tw/tw/cp-132-6043-0f72c-1.html • CWE-134: Use of Externally-Controlled Format String •

CVE-2022-28820 – Adobe Consulting Services Reflected Cross-Site Scripting Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2022-28820
21 Apr 2022 — ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in /apps/acs-commons/content/page-compare.html endpoint via the a and b GET parameters. User input submitted via these parameters is not validated or sanitised. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. ... • https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-29537 – Debian Security Advisory 5411-1
https://notcve.org/view.php?id=CVE-2022-29537
20 Apr 2022 — La función gp_rtp_builder_do_hevc en el archivo ietf/rtp_pck_mpeg4.c en GPAC 2.0.0, presenta una lectura excesiva del búfer en la región heap de la memoria, como es demostrado en MP4Box Multiple vulnerabilities have been discovered in GPAC, the worst of which could lead to arbitrary code execution. • https://github.com/gpac/gpac/issues/2173 • CWE-125: Out-of-bounds Read •

CVE-2020-35632 – Gentoo Linux Security Advisory 202305-34
https://notcve.org/view.php?id=CVE-2020-35632
18 Apr 2022 — Se presenta una vulnerabilidad de lectura fuera de límites en el archivo Nef_S2/SNC_io_parser.h en la función SNC_io_parser(EW)::read_sface() sfh-)boundary_entry_objects Edge_of Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVE-2020-35631 – Gentoo Linux Security Advisory 202305-34
https://notcve.org/view.php?id=CVE-2020-35631
18 Apr 2022 — Se presenta una vulnerabilidad de lectura fuera de límites en el archivo Nef_S2/SNC_io_parser.h en la función SNC_io_parser(EW)::read_sface() SD.link_as_face_cycle() Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVE-2020-35630 – Gentoo Linux Security Advisory 202305-34
https://notcve.org/view.php?id=CVE-2020-35630
18 Apr 2022 — Se presenta una vulnerabilidad de lectura fuera de límites en el archivo Nef_S2/SNC_io_parser.h en la función SNC_io_parser(EW)::read_sface() sfh-)center_vertex() Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVE-2020-35629 – Gentoo Linux Security Advisory 202305-34
https://notcve.org/view.php?id=CVE-2020-35629
18 Apr 2022 — Se presenta una vulnerabilidad de lectura fuera de límites en el archivo Nef_S2/SNC_io_parser.h en la función SNC_io_parser(EW)::read_sloop() slh-)facet() Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVE-2020-28635 – Gentoo Linux Security Advisory 202305-34
https://notcve.org/view.php?id=CVE-2020-28635
18 Apr 2022 — Se presenta una vulnerabilidad de lectura fuera de límites en el archivo Nef_S2/SNC_io_parser.h en la función SNC_io_parser(EW)::read_sedge() seh-)facet() Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •

CVE-2020-28634 – Gentoo Linux Security Advisory 202305-34
https://notcve.org/view.php?id=CVE-2020-28634
18 Apr 2022 — Se presenta una vulnerabilidad de lectura fuera de límites en el archivo Nef_S2/SNC_io_parser.h en la función SNC_io_parser(EW)::read_sedge() seh-)next() Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. • https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html • CWE-125: Out-of-bounds Read CWE-129: Improper Validation of Array Index •