![]() ![]() ![]() In addition, the affected application contains an out-of-bounds read past the end of an allocated buffer while parsing X_T files. This could allow an attacker to execute code in the context of the current process.ĬVE-2022-39140 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.8. In another issue, the affected application contains an out-of-bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.ĬVE-2022-39139 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.8. This could allow an attacker to execute code in the context of the current process.ĬVE-2022-39138 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.8.Īlso, the affected application contains an out-of-bounds write past the end of an allocated buffer while parsing specially crafted X_T files. In addition, the affected application contains an out-of-bounds write past the end of an allocated buffer while parsing specially crafted X_T files. ![]() An attacker could leverage this vulnerability to leak information in the context of the current process.ĬVE-2022-39137 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 3.3. ![]() In one vulnerability, the affected application is vulnerable to out-of-bounds read past the end of an allocated buffer when parsing X_T files. Simcenter Femap, a modeling and simulation software ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |