| Summary | A stack-based out-of-bounds read vulnerability in VrmlData_Scene::ReadLine in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because the quoted-string escape handler uses ptr[++anOffset] without proper bounds checking, which can read past the end of a fixed-size stack buffer. |
|---|---|
| Publication Date | May 2, 2026, 1:16 a.m. |
| Registration Date | May 2, 2026, 4:07 a.m. |
| Last Update | May 2, 2026, 1:16 a.m. |