### [CVE-2022-0496](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0496) ![](https://img.shields.io/static/v1?label=Product&message=openscad&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Not-Known.%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-119%20-%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer.&color=brighgreen) ### Description A vulnerbiility was found in Openscad, where a DXF-format drawing with particular (not necessarily malformed!) properties may cause an out-of-bounds memory access when imported using import(). ### POC #### Reference - https://github.com/openscad/openscad/issues/4037 #### Github No PoCs found on GitHub currently.