13 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric vertices section within an OFF file. Existen múltiples vulnerabilidades de desbordamiento de búfer en la región stack de la memoria en la funcionalidad readOFF.cpp de libi... • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing comments within the geometric faces section within an OFF file. Existen múltiples vulnerabilidades de desbordamiento de búfer en la región stack de la memoria en la funcionalidad readOFF.cpp de libigl ... • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric vertices of an OFF file. Existen múltiples vulnerabilidades de desbordamiento de búfer en la región stack de la memoria en la funcionalidad readOFF.cpp de libigl v2.4.0. Un archivo .off espec... • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing the header of an OFF file. Existen múltiples vulnerabilidades de desbordamiento de búfer en la región stack de la memoria en la funcionalidad readOFF.cpp de libigl v2.4.0. Un archivo .off especialmente... • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple stack-based buffer overflow vulnerabilities exist in the readOFF.cpp functionality of libigl v2.4.0. A specially-crafted .off file can lead to a buffer overflow. An attacker can arbitrary code execution to trigger these vulnerabilities.This vulnerability exists within the code responsible for parsing geometric faces of an OFF file. Existen múltiples vulnerabilidades de desbordamiento de búfer en la región stack de la memoria en la funcionalidad readOFF.cpp de libigl v2.4.0. Un archivo .off especial... • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1784 • CWE-121: Stack-based Buffer Overflow •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — An out-of-bounds write vulnerability exists in the PlyFile ply_cast_ascii functionality of libigl v2.5.0. A specially crafted .ply file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. Existe una vulnerabilidad de escritura fuera de los límites en la funcionalidad PlyFile ply_cast_ascii de libigl v2.5.0. Un archivo .ply especialmente manipulado puede provocar un desbordamiento del búfer del montón. • https://talosintelligence.com/vulnerability_reports/TALOS-2023-1879 • CWE-122: Heap-based Buffer Overflow •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_element_field` function while handling an `ascii`.msh` file. Existen múltiples vulnerabilidades de validación de índice de matriz incorrecta en la funcionalidad readMSH de libigl v2.5.0. Un archivo .msh especia... • https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_element_field` function while handling an `binary`.msh` file. Existen múltiples vulnerabilidades de validación de índice de matriz incorrecta en la funcionalidad readMSH de libigl v2.5.0. Un archivo .msh especi... • https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_node_field` function while handling an `ascii`.msh` file. Existen múltiples vulnerabilidades de validación de índice de matriz incorrecta en la funcionalidad readMSH de libigl v2.5.0. Un archivo .msh especialme... • https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

28 May 2024 — Multiple improper array index validation vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the `igl::MshLoader::parse_nodes` function while handling an `ascii`.msh` file. Existen múltiples vulnerabilidades de validación de índice de matriz incorrecta en la funcionalidad readMSH de libigl v2.5.0. Un archivo .msh especialmente m... • https://talosintelligence.com/vulnerability_reports/TALOS-2024-1926 • CWE-787: Out-of-bounds Write •