Page 45 of 224 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0005 https://www.zerodayinitiative.com/advisories/ZDI-21-1528 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley ContextCapture 10.18.0.232. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. • https://www.bentley.com/en/common-vulnerability-exposure/be-2021-0001 https://www.zerodayinitiative.com/advisories/ZDI-21-1359 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley ContextCapture 10.18.0.232. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. • https://www.bentley.com/en/common-vulnerability-exposure/be-2021-0001 https://www.zerodayinitiative.com/advisories/ZDI-21-1367 • CWE-125: Out-of-bounds Read •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local users to gain privileges via a Trojan horse (1) mptools.dll, (2) baseman.dll, (3) wintab32.dll, or (4) wintab.dll file in the current working directory, as demonstrated by a directory that contains a .hln or .rdl file. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de ruta de búsqueda no confiable en MicroStation v7.1 permite a usuarios locales obtener privilegios a través de un troyano (1) mptools.dll, (2) baseman.dll, (3) Archivo wintab.dll wintab32.dll, o (4) en el actual directorio de trabajo, como lo demuestra un directorio que contiene un hln. o. rdl. NOTA: algunos de estos detalles han sido obtenidos a partir de información de terceros. • https://github.com/otofoto/CVE-2010-5230 http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0320.html http://secunia.com/advisories/41106 •