CVE-2021-32280
https://notcve.org/view.php?id=CVE-2021-32280
An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8. Se ha detectado un problema en fig2dev antes de la versión 3.2.8.. • https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html https://lists.debian.org/debian-lts-announce/2023/01/msg00044.html https://sourceforge.net/p/mcj/fig2dev/ci/f17a3b8a7d54c1bc56ab92512531772a0b3ec991 https://sourceforge.net/p/mcj/tickets/107 • CWE-476: NULL Pointer Dereference •
CVE-2021-40690 – Bypass of the secureValidation property
https://notcve.org/view.php?id=CVE-2021-40690
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element. Todas las versiones de Apache Santuario - XML Security for Java anteriores a 2.2.3 y 2.1.7 son vulnerables a un problema donde la propiedad "secureValidation" no es pasada correctamente cuando es creado un KeyInfo a partir de un elemento KeyInfoReference. Esto permite a un atacante abusar de una transformación XPath para extraer cualquier archivo local .xml en un elemento RetrievalMethod • https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa%40%3Ccommits.tomee.apache.org%3E https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59%40%3Cissues.cxf.apache.org%3E https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28%40%3Ccommits.tomee.apache.org%3E https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4% • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2020-21535
https://notcve.org/view.php?id=CVE-2020-21535
fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c. fig2dev versión 3.2.7b, contiene un fallo de segmentación en la función gencgm_start del archivo gencgm.c • https://cwe.mitre.org/data/definitions/125.html https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html https://sourceforge.net/p/mcj/tickets/62 • CWE-125: Out-of-bounds Read •
CVE-2020-21534
https://notcve.org/view.php?id=CVE-2020-21534
fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c. fig2dev versión 3.2.7b, contiene un desbordamiento del buffer global en la función get_line en el archivo read.c • https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html https://sourceforge.net/p/mcj/tickets/58 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2020-21533
https://notcve.org/view.php?id=CVE-2020-21533
fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c. fig2dev versión 3.2.7b, contiene un desbordamiento del buffer de la pila en la función read_textobject en el archivo read.c • https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html https://sourceforge.net/p/mcj/tickets/59 • CWE-787: Out-of-bounds Write •