cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2022-22888
2022-01-20T23:15:07.860
Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_op_object_find_own in /ecma/operations/ecma-objects.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4848" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4848
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision [4592143](https://github.com/jerryscript-project/jerryscript/commit/4592143400910769707477bc2282a6c6601c9a31) ###### Build platform Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64) Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./too...
Stack-overflow in ecma-objects (ecma_op_object_find_own)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4848/comments
1
2021-12-07T10:36:37Z
2022-01-12T02:04:53Z
https://github.com/jerryscript-project/jerryscript/issues/4848
1,073,189,379
4,848
CVE-2022-22890
2022-01-20T23:15:07.920
There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' failed at /jerry-core/parser/js/js-scanner-util.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4847" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4847
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision [4592143](https://github.com/jerryscript-project/jerryscript/commit/4592143400910769707477bc2282a6c6601c9a31) ###### Build platform Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64) Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ``` ....
Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' in js-scanner-util (scanner_pop_literal_pool)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4847/comments
1
2021-12-07T08:52:59Z
2022-01-12T02:04:34Z
https://github.com/jerryscript-project/jerryscript/issues/4847
1,073,083,583
4,847
CVE-2022-22891
2022-01-21T00:15:07.700
Jerryscript 3.0.0 was discovered to contain a SEGV vulnerability via ecma_ref_object_inline in /jerry-core/ecma/base/ecma-gc.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4871" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4871
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --debug ...
SEGV in ecma_ref_object_inline of ecma-gc.c
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4871/comments
0
2021-12-09T07:38:01Z
2022-01-12T02:05:15Z
https://github.com/jerryscript-project/jerryscript/issues/4871
1,075,248,187
4,871
CVE-2022-22892
2022-01-21T00:15:07.747
There is an Assertion 'ecma_is_value_undefined (value) || ecma_is_value_null (value) || ecma_is_value_boolean (value) || ecma_is_value_number (value) || ecma_is_value_string (value) || ecma_is_value_bigint (value) || ecma_is_value_symbol (value) || ecma_is_value_object (value)' failed at jerry-core/ecma/base/ecma-helpe...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4872" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4872
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --deb...
Assertion 'ecma_is_value_undefined (value) || ecma_is_value_null (value) || ecma_is_value_boolean (value) || ecma_is_value_number (value) || ecma_is_value_string (value) || ecma_is_value_bigint (value) || ecma_is_value_symbol (value) || ecma_is_value_object (value)' failed in ecma-helpers-value(ecma_check_value_type_i...
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4872/comments
0
2021-12-09T07:41:05Z
2022-01-12T02:05:47Z
https://github.com/jerryscript-project/jerryscript/issues/4872
1,075,250,208
4,872
CVE-2022-22893
2022-01-21T00:15:07.790
Jerryscript 3.0.0 was discovered to contain a stack overflow via vm_loop.lto_priv.304 in /jerry-core/vm/vm.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4901" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4901
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [42523bd6](https://github.com/jerryscript-project/jerryscript/commit/42523bd6e2b114755498c9f68fd78545f9b33476) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash python ./tools/build.py --cle...
Stack-overflow in vm_loop.lto_priv.304 of vm.c
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4901/comments
0
2021-12-13T09:33:54Z
2022-01-12T02:03:50Z
https://github.com/jerryscript-project/jerryscript/issues/4901
1,078,286,757
4,901
CVE-2022-22894
2022-01-21T00:15:07.833
Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_lcache_lookup in /jerry-core/ecma/base/ecma-lcache.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4890" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4890
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --deb...
Stack-overflow in ecma_lcache_lookup (ecma-lcache.c)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4890/comments
0
2021-12-09T14:27:01Z
2022-01-12T02:08:57Z
https://github.com/jerryscript-project/jerryscript/issues/4890
1,075,634,585
4,890
CVE-2022-22895
2022-01-21T00:15:07.880
Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via ecma_utf8_string_to_number_by_radix in /jerry-core/ecma/base/ecma-helpers-conversion.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4850" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4850
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
JerryScript-DCO-1.0-Signed-off-by: Robert Fancsik robert.fancsik@h-lab.eu
Fix buffer overflow in string radix conversion
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4850/comments
0
2021-12-07T14:15:32Z
2021-12-07T14:28:11Z
https://github.com/jerryscript-project/jerryscript/pull/4850
1,073,404,012
4,850
CVE-2022-22895
2022-01-21T00:15:07.880
Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via ecma_utf8_string_to_number_by_radix in /jerry-core/ecma/base/ecma-helpers-conversion.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4850" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4882
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --deb...
Heap-buffer-overflow in ecma_utf8_string_to_number_by_radix (ecma-helpers-conversion.c)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4882/comments
3
2021-12-09T13:20:38Z
2022-01-12T02:08:24Z
https://github.com/jerryscript-project/jerryscript/issues/4882
1,075,566,600
4,882
CVE-2021-46234
2022-01-21T21:15:08.627
A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_node_unregister () at scenegraph/base_scenegraph.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2023" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2023
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_node_unregister () at scenegraph/base_scenegraph.c:682
https://api.github.com/repos/gpac/gpac/issues/2023/comments
0
2022-01-03T12:52:03Z
2022-01-04T09:53:09Z
https://github.com/gpac/gpac/issues/2023
1,092,485,366
2,023
CVE-2021-46236
2022-01-21T21:15:08.667
A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_sg_vrml_field_pointer_del () at scenegraph/vrml_tools.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2024" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2024
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_sg_vrml_field_pointer_del () at scenegraph/vrml_tools.c:667
https://api.github.com/repos/gpac/gpac/issues/2024/comments
0
2022-01-03T12:56:20Z
2022-01-04T10:19:41Z
https://github.com/gpac/gpac/issues/2024
1,092,488,021
2,024
CVE-2021-46237
2022-01-21T21:15:08.713
An untrusted pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_node_unregister () at scenegraph/base_scenegraph.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2033" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2033
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Untrusted pointer dereference in gf_node_unregister () at scenegraph/base_scenegraph.c:710
https://api.github.com/repos/gpac/gpac/issues/2033/comments
0
2022-01-05T09:17:46Z
2022-01-05T10:26:12Z
https://github.com/gpac/gpac/issues/2033
1,094,139,713
2,033
CVE-2021-46238
2022-01-21T21:15:08.753
GPAC v1.1.0 was discovered to contain a stack overflow via the function gf_node_get_name () at scenegraph/base_scenegraph.c. This vulnerability can lead to a program crash, causing a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2027" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2027
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
stack overflow in gf_node_get_name () at scenegraph/base_scenegraph.c:1293
https://api.github.com/repos/gpac/gpac/issues/2027/comments
0
2022-01-03T13:30:56Z
2022-01-04T10:19:42Z
https://github.com/gpac/gpac/issues/2027
1,092,514,876
2,027
CVE-2021-46239
2022-01-21T21:15:08.797
The binary MP4Box in GPAC v1.1.0 was discovered to contain an invalid free vulnerability via the function gf_free () at utils/alloc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2026" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2026
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Invalid free in MP4Box
https://api.github.com/repos/gpac/gpac/issues/2026/comments
0
2022-01-03T13:18:56Z
2022-01-04T10:19:42Z
https://github.com/gpac/gpac/issues/2026
1,092,505,386
2,026
CVE-2021-46240
2022-01-21T21:15:08.840
A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_dump_vrml_sffield () at scene_manager/scene_dump.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2028" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2028
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_dump_vrml_sffield () at scene_manager/scene_dump.c:588
https://api.github.com/repos/gpac/gpac/issues/2028/comments
0
2022-01-03T13:46:36Z
2022-01-04T10:19:42Z
https://github.com/gpac/gpac/issues/2028
1,092,526,001
2,028
CVE-2021-46311
2022-01-21T21:15:09.017
A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_sg_destroy_routes () at scenegraph/vrml_route.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2038" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2038
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Null Pointer Dereference in gf_sg_destroy_routes()at scenegraph/vrml_route.c:126
https://api.github.com/repos/gpac/gpac/issues/2038/comments
0
2022-01-09T06:44:25Z
2022-01-11T17:35:41Z
https://github.com/gpac/gpac/issues/2038
1,097,120,299
2,038
CVE-2021-46313
2022-01-21T21:15:09.060
The binary MP4Box in GPAC v1.0.1 was discovered to contain a segmentation fault via the function __memmove_avx_unaligned_erms (). This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2039" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/gpac/gpac/issues/2039
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
A segmentation fault in MP4Box
https://api.github.com/repos/gpac/gpac/issues/2039/comments
0
2022-01-09T07:07:05Z
2022-01-11T17:35:42Z
https://github.com/gpac/gpac/issues/2039
1,097,123,366
2,039
CVE-2021-44988
2022-01-25T01:15:07.640
Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4890" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4891
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64) ###### Build steps ```bash ./tools/build.py --clea...
Stack-overflow in ecma_find_named_property (ecma-helpers.c)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4891/comments
1
2021-12-09T14:33:33Z
2021-12-09T14:35:17Z
https://github.com/jerryscript-project/jerryscript/issues/4891
1,075,642,418
4,891
CVE-2021-44992
2022-01-25T01:15:07.690
There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4875" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobil...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4875
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 Commit: [8ba0d1b](https://github.com/jerryscript-project/jerryscript/commit/8ba0d1b6ee5a065a42f3b306771ad8e3c0d819bc) Version: v2.4.0 ###### B...
Assertion 'ecma_object_is_typedarray (obj_p)' failed in ecma-typedarray-object(ecma_get_typedarray_id)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4875/comments
0
2021-12-09T09:08:53Z
2022-01-12T02:06:25Z
https://github.com/jerryscript-project/jerryscript/issues/4875
1,075,325,382
4,875
CVE-2021-44993
2022-01-25T01:15:07.730
There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4876" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobil...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4876
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --deb...
Assertion 'ecma_is_value_boolean (base_value)' failed in ecma_op_get_value_object_base (ecma-get-put-value).
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4876/comments
0
2021-12-09T09:48:50Z
2022-01-12T02:06:45Z
https://github.com/jerryscript-project/jerryscript/issues/4876
1,075,367,669
4,876
CVE-2021-44994
2022-01-25T01:15:07.773
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4894
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
## JerryScript commit hash 55acdf2048b390d0f56f12e64dbfb2559f0e70ad ## Build platform Ubuntu 20.04 LTS ## Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g \ --strip=...
Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4894/comments
1
2021-12-09T14:53:08Z
2022-01-14T09:05:39Z
https://github.com/jerryscript-project/jerryscript/issues/4894
1,075,663,454
4,894
CVE-2021-44994
2022-01-25T01:15:07.773
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4895
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --debug...
Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at ecma-objects.c(ecma_object_get_class_name)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4895/comments
3
2021-12-09T14:58:57Z
2022-01-12T02:09:35Z
https://github.com/jerryscript-project/jerryscript/issues/4895
1,075,669,945
4,895
CVE-2021-46474
2022-01-25T01:15:07.817
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiEvalCodeSub in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/57
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub
https://api.github.com/repos/pcmacdon/jsish/issues/57/comments
1
2021-12-24T09:47:27Z
2022-01-12T02:12:21Z
https://github.com/pcmacdon/jsish/issues/57
1,088,279,556
57
CVE-2021-46475
2022-01-25T01:15:07.853
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsi_ArraySliceCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/64" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/64
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd
https://api.github.com/repos/pcmacdon/jsish/issues/64/comments
0
2021-12-24T10:33:23Z
2021-12-26T17:16:57Z
https://github.com/pcmacdon/jsish/issues/64
1,088,304,005
64
CVE-2021-46477
2022-01-25T01:15:07.893
Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/63" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/63
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor
https://api.github.com/repos/pcmacdon/jsish/issues/63/comments
0
2021-12-24T10:32:32Z
2022-01-12T02:13:42Z
https://github.com/pcmacdon/jsish/issues/63
1,088,303,589
63
CVE-2021-46478
2022-01-25T01:15:07.930
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/60" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/60
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack
https://api.github.com/repos/pcmacdon/jsish/issues/60/comments
0
2021-12-24T09:50:51Z
2022-01-12T02:12:56Z
https://github.com/pcmacdon/jsish/issues/60
1,088,281,295
60
CVE-2021-46480
2022-01-25T01:15:07.970
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/61" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/61
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete
https://api.github.com/repos/pcmacdon/jsish/issues/61/comments
0
2021-12-24T10:30:42Z
2022-01-12T02:13:11Z
https://github.com/pcmacdon/jsish/issues/61
1,088,302,674
61
CVE-2021-46481
2022-01-25T01:15:08.010
Jsish v3.5.0 was discovered to contain a memory leak via linenoise at src/linenoise.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/55" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/55
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Memory leaks in linenoise src/linenoise.c:1061
https://api.github.com/repos/pcmacdon/jsish/issues/55/comments
0
2021-12-24T09:44:48Z
2022-01-12T02:11:57Z
https://github.com/pcmacdon/jsish/issues/55
1,088,278,241
55
CVE-2021-46482
2022-01-25T01:15:08.050
Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/66" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/66
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor
https://api.github.com/repos/pcmacdon/jsish/issues/66/comments
0
2021-12-24T10:35:07Z
2022-01-12T02:14:08Z
https://github.com/pcmacdon/jsish/issues/66
1,088,304,812
66
CVE-2021-46483
2022-01-25T01:15:08.090
Jsish v3.5.0 was discovered to contain a heap buffer overflow via BooleanConstructor at src/jsiBool.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/62" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/62
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor
https://api.github.com/repos/pcmacdon/jsish/issues/62/comments
0
2021-12-24T10:31:27Z
2022-01-12T02:13:25Z
https://github.com/pcmacdon/jsish/issues/62
1,088,303,083
62
CVE-2021-46089
2022-01-25T15:15:08.203
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3331" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/jeecgboot/jeecg-boot/issues/3331
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### version: <=3.0 ##### precondition: After logged in the website,click 流程管理 proxy burp,the parameter "column" can be made SQL injection. ##### Screenshot & code : <img width="1240" alt="图片" src="https://user-images.githubusercontent.com/25843151/147641725-71a3c7a3-c4d4-41f8-af76-b875641e2cbf.png"> ...
There is an SQL injection vulnerability that can operate the database with root privileges.
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3331/comments
3
2021-12-29T08:36:51Z
2022-01-21T02:04:30Z
https://github.com/jeecgboot/JeecgBoot/issues/3331
1,090,357,318
3,331
CVE-2021-46087
2022-01-25T16:15:09.013
In jfinal_cms >= 5.1 0, there is a storage XSS vulnerability in the background system of CMS. Because developers do not filter the parameters submitted by the user input form, any user with background permission can affect the system security by entering malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EF2DC8E-81C2-4E53-A709-EC9490E00A3F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/jflyfox/jfinal_cms/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a storage XSS vulnerability in the modification of jfinal_CMS user's personal information. The attacker can insert malicious XSS code into the modification of personal information, and then successfully trigger XSS attack when the administrator user views the user's personal information. First, register a use...
A Stored XSS vulnerability exists in jfinal_cms v5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/19/comments
1
2020-06-03T14:27:59Z
2021-06-15T03:31:10Z
https://github.com/jflyfox/jfinal_cms/issues/19
630,044,323
19
CVE-2021-46484
2022-01-27T21:15:08.343
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_IncrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/73" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/73
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount
https://api.github.com/repos/pcmacdon/jsish/issues/73/comments
1
2021-12-24T10:41:10Z
2021-12-28T03:39:04Z
https://github.com/pcmacdon/jsish/issues/73
1,088,307,699
73
CVE-2021-46485
2022-01-27T21:15:08.427
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_ValueIsNumber at src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/70" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/70
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
SEGV src/jsiValue.c:418 in Jsi_ValueIsNumber
https://api.github.com/repos/pcmacdon/jsish/issues/70/comments
0
2021-12-24T10:38:22Z
2022-01-12T02:15:00Z
https://github.com/pcmacdon/jsish/issues/70
1,088,306,373
70
CVE-2021-46486
2022-01-27T21:15:08.470
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via jsi_ArraySpliceCmd at src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/65" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/65
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
SEGV src/jsiArray.c:1172 in jsi_ArraySpliceCmd
https://api.github.com/repos/pcmacdon/jsish/issues/65/comments
1
2021-12-24T10:34:07Z
2022-01-12T02:13:57Z
https://github.com/pcmacdon/jsish/issues/65
1,088,304,355
65
CVE-2021-46487
2022-01-27T21:15:08.517
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x18e506. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/72" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/72
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x18e506)
https://api.github.com/repos/pcmacdon/jsish/issues/72/comments
0
2021-12-24T10:39:45Z
2022-01-12T02:15:13Z
https://github.com/pcmacdon/jsish/issues/72
1,088,306,982
72
CVE-2021-46488
2022-01-27T21:15:08.560
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via jsi_ArrayConcatCmd at src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/68" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/68
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
SEGV src/jsiArray.c:311 in jsi_ArrayConcatCmd
https://api.github.com/repos/pcmacdon/jsish/issues/68/comments
0
2021-12-24T10:36:54Z
2022-01-12T02:14:32Z
https://github.com/pcmacdon/jsish/issues/68
1,088,305,652
68
CVE-2021-46489
2022-01-27T21:15:08.603
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_DecrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/74" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount
https://api.github.com/repos/pcmacdon/jsish/issues/74/comments
0
2021-12-24T10:41:50Z
2021-12-27T15:24:09Z
https://github.com/pcmacdon/jsish/issues/74
1,088,308,024
74
CVE-2021-46490
2022-01-27T21:15:08.647
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via NumberConstructor at src/jsiNumber.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/67" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/67
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
SEGV src/jsiNumber.c:93 in NumberConstructor
https://api.github.com/repos/pcmacdon/jsish/issues/67/comments
2
2021-12-24T10:35:45Z
2022-01-12T02:14:20Z
https://github.com/pcmacdon/jsish/issues/67
1,088,305,078
67
CVE-2021-46491
2022-01-27T21:15:08.690
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_CommandPkgOpts at src/jsiCmds.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/69" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/69
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
SEGV src/jsiCmds.c:785 in Jsi_CommandPkgOpts
https://api.github.com/repos/pcmacdon/jsish/issues/69/comments
7
2021-12-24T10:37:33Z
2022-01-12T02:14:45Z
https://github.com/pcmacdon/jsish/issues/69
1,088,305,979
69
CVE-2021-46492
2022-01-27T21:15:08.733
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_FunctionInvoke at src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/71" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/71
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
SEGV src/jsiFunc.c:786 in Jsi_FunctionInvoke
https://api.github.com/repos/pcmacdon/jsish/issues/71/comments
0
2021-12-24T10:38:56Z
2021-12-27T03:47:20Z
https://github.com/pcmacdon/jsish/issues/71
1,088,306,590
71
CVE-2021-46494
2022-01-27T21:15:08.777
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueLookupBase in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/78" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/78
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase
https://api.github.com/repos/pcmacdon/jsish/issues/78/comments
0
2021-12-24T10:45:48Z
2022-01-12T02:16:10Z
https://github.com/pcmacdon/jsish/issues/78
1,088,309,877
78
CVE-2021-46495
2022-01-27T21:15:08.827
Jsish v3.5.0 was discovered to contain a heap-use-after-free via DeleteTreeValue in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/82" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/82
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue
https://api.github.com/repos/pcmacdon/jsish/issues/82/comments
0
2021-12-24T10:48:59Z
2021-12-28T02:31:29Z
https://github.com/pcmacdon/jsish/issues/82
1,088,311,523
82
CVE-2021-46496
2022-01-27T21:15:08.870
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/83" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/83
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
MEMLEAK NOW: Heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree
https://api.github.com/repos/pcmacdon/jsish/issues/83/comments
2
2021-12-24T10:49:33Z
2021-12-28T02:31:03Z
https://github.com/pcmacdon/jsish/issues/83
1,088,311,780
83
CVE-2021-46497
2022-01-27T21:15:08.917
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_UserObjDelete in src/jsiUserObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/84" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/84
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete
https://api.github.com/repos/pcmacdon/jsish/issues/84/comments
0
2021-12-24T10:50:28Z
2021-12-27T16:51:37Z
https://github.com/pcmacdon/jsish/issues/84
1,088,312,235
84
CVE-2021-46498
2022-01-27T21:15:08.957
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_wswebsocketObjFree in src/jsiWebSocket.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/81" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/81
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree
https://api.github.com/repos/pcmacdon/jsish/issues/81/comments
0
2021-12-24T10:48:23Z
2021-12-28T02:31:29Z
https://github.com/pcmacdon/jsish/issues/81
1,088,311,213
81
CVE-2021-46499
2022-01-27T21:15:09.003
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/76" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/76
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove
https://api.github.com/repos/pcmacdon/jsish/issues/76/comments
0
2021-12-24T10:44:21Z
2022-01-12T02:15:38Z
https://github.com/pcmacdon/jsish/issues/76
1,088,309,178
76
CVE-2021-46500
2022-01-27T21:15:09.047
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ArgTypeCheck in src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/85" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/85
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck
https://api.github.com/repos/pcmacdon/jsish/issues/85/comments
2
2021-12-24T10:51:56Z
2021-12-26T22:47:18Z
https://github.com/pcmacdon/jsish/issues/85
1,088,313,003
85
CVE-2021-46501
2022-01-27T21:15:09.097
Jsish v3.5.0 was discovered to contain a heap-use-after-free via SortSubCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/86" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free src/jsiArray.c:958 in SortSubCmd
https://api.github.com/repos/pcmacdon/jsish/issues/86/comments
0
2021-12-24T10:52:55Z
2021-12-26T22:47:42Z
https://github.com/pcmacdon/jsish/issues/86
1,088,313,466
86
CVE-2021-46502
2022-01-27T21:15:09.143
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/87" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/87
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d)
https://api.github.com/repos/pcmacdon/jsish/issues/87/comments
0
2021-12-24T10:53:39Z
2021-12-26T22:08:17Z
https://github.com/pcmacdon/jsish/issues/87
1,088,313,832
87
CVE-2021-46503
2022-01-27T21:15:09.187
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/88" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/88
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
https://api.github.com/repos/pcmacdon/jsish/issues/88/comments
0
2021-12-24T10:54:21Z
2021-12-26T20:57:24Z
https://github.com/pcmacdon/jsish/issues/88
1,088,314,163
88
CVE-2021-46504
2022-01-27T21:15:09.233
There is an Assertion 'vp != resPtr' failed at jsiEval.c in Jsish v3.5.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Assertion `vp != resPtr' failed at jsiEval.c:1020: jsiEvalSubscript.
https://api.github.com/repos/pcmacdon/jsish/issues/51/comments
0
2021-12-24T09:40:19Z
2022-01-12T02:02:10Z
https://github.com/pcmacdon/jsish/issues/51
1,088,275,965
51
CVE-2021-46505
2022-01-27T21:15:09.277
Jsish v3.5.0 was discovered to contain a stack overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Stack-overflow in (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5)
https://api.github.com/repos/pcmacdon/jsish/issues/53/comments
0
2021-12-24T09:43:02Z
2022-01-12T02:11:35Z
https://github.com/pcmacdon/jsish/issues/53
1,088,277,342
53
CVE-2021-46506
2022-01-27T21:15:09.323
There is an Assertion 'v->d.lval != v' failed at src/jsiValue.c in Jsish v3.5.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Assertion `v->d.lval != v' failed at src/jsiValue.c:181: ValueFree.
https://api.github.com/repos/pcmacdon/jsish/issues/52/comments
0
2021-12-24T09:41:38Z
2022-01-12T02:03:28Z
https://github.com/pcmacdon/jsish/issues/52
1,088,276,639
52
CVE-2021-46507
2022-01-27T21:15:09.367
Jsish v3.5.0 was discovered to contain a stack overflow via Jsi_LogMsg at src/jsiUtils.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` #...
Stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg
https://api.github.com/repos/pcmacdon/jsish/issues/54/comments
0
2021-12-24T09:43:48Z
2022-01-12T02:11:46Z
https://github.com/pcmacdon/jsish/issues/54
1,088,277,734
54
CVE-2021-46508
2022-01-27T21:15:09.413
There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/188
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCE...
Assertion `i < parts_cnt' failed at src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t).
https://api.github.com/repos/cesanta/mjs/issues/188/comments
0
2021-12-31T05:23:32Z
2022-01-12T02:18:33Z
https://github.com/cesanta/mjs/issues/188
1,091,424,362
188
CVE-2021-46509
2022-01-27T21:15:09.460
Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/200" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/200
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ...
Stack-overflow mjs/src/mjs_json.c:102:7 in snquote
https://api.github.com/repos/cesanta/mjs/issues/200/comments
0
2021-12-31T05:43:04Z
2022-01-12T02:20:01Z
https://github.com/cesanta/mjs/issues/200
1,091,428,300
200
CVE-2021-46510
2022-01-27T21:15:09.507
There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/185" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/185
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(TOP_...
Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed src/mjs_gc.c:354: gc_mark_string.
https://api.github.com/repos/cesanta/mjs/issues/185/comments
0
2021-12-31T05:20:39Z
2022-01-12T02:18:09Z
https://github.com/cesanta/mjs/issues/185
1,091,423,652
185
CVE-2021-46511
2022-01-27T21:15:09.550
There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/183
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP...
Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c:372: mjs_pop_val
https://api.github.com/repos/cesanta/mjs/issues/183/comments
0
2021-12-31T05:18:57Z
2022-01-12T02:17:55Z
https://github.com/cesanta/mjs/issues/183
1,091,423,222
183
CVE-2021-46512
2022-01-27T21:15:09.593
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_apply at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/202" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/202
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) Version: ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_S...
SEGV src/mjs_exec.c:1155 in mjs_apply
https://api.github.com/repos/cesanta/mjs/issues/202/comments
0
2021-12-31T07:29:20Z
2021-12-31T07:29:20Z
https://github.com/cesanta/mjs/issues/202
1,091,456,612
202
CVE-2021-46513
2022-01-27T21:15:09.633
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/189" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/189
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOUR...
Global-buffer-overflow mjs/src/mjs_string.c:58:15 in mjs_mk_string
https://api.github.com/repos/cesanta/mjs/issues/189/comments
0
2021-12-31T05:24:24Z
2021-12-31T05:49:18Z
https://github.com/cesanta/mjs/issues/189
1,091,424,556
189
CVE-2021-46514
2022-01-27T21:15:09.677
There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/187" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/187
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES)...
Assertion `ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *).
https://api.github.com/repos/cesanta/mjs/issues/187/comments
0
2021-12-31T05:22:41Z
2021-12-31T08:13:20Z
https://github.com/cesanta/mjs/issues/187
1,091,424,159
187
CVE-2021-46515
2022-01-27T21:15:09.723
There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/186" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/186
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(...
Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c:949: mjs_execute.
https://api.github.com/repos/cesanta/mjs/issues/186/comments
0
2021-12-31T05:21:24Z
2022-01-12T02:18:21Z
https://github.com/cesanta/mjs/issues/186
1,091,423,861
186
CVE-2021-46516
2022-01-27T21:15:09.767
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/201" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/201
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCE...
SEGV mjs/src/mjs_core.c:348:13 in mjs_stack_size
https://api.github.com/repos/cesanta/mjs/issues/201/comments
0
2021-12-31T07:26:25Z
2021-12-31T07:26:25Z
https://github.com/cesanta/mjs/issues/201
1,091,455,737
201
CVE-2021-46517
2022-01-27T21:15:09.813
There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/184" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/184
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(...
Assertion `mjs_stack_size(&mjs->scopes) > 0' failed src/mjs_exec.c:725: mjs_execute.
https://api.github.com/repos/cesanta/mjs/issues/184/comments
0
2021-12-31T05:19:48Z
2021-12-31T05:46:31Z
https://github.com/cesanta/mjs/issues/184
1,091,423,443
184
CVE-2021-46518
2022-01-27T21:15:09.857
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/195" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS...
Heap-buffer-overflow src/mjs_core.c:288 in mjs_disown
https://api.github.com/repos/cesanta/mjs/issues/195/comments
0
2021-12-31T05:37:12Z
2022-01-12T02:18:56Z
https://github.com/cesanta/mjs/issues/195
1,091,427,107
195
CVE-2021-46519
2022-01-27T21:15:09.900
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/194" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $...
Heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length
https://api.github.com/repos/cesanta/mjs/issues/194/comments
0
2021-12-31T05:36:16Z
2021-12-31T05:36:16Z
https://github.com/cesanta/mjs/issues/194
1,091,426,932
194
CVE-2021-46520
2022-01-27T21:15:09.947
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/193" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/193
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)...
Heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf
https://api.github.com/repos/cesanta/mjs/issues/193/comments
0
2021-12-31T05:35:03Z
2021-12-31T05:35:03Z
https://github.com/cesanta/mjs/issues/193
1,091,426,673
193
CVE-2021-46521
2022-01-27T21:15:09.990
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_...
Global-buffer-overflow mjs/src/common/str_util.c:180:14 in c_vsnprintf
https://api.github.com/repos/cesanta/mjs/issues/190/comments
0
2021-12-31T05:25:14Z
2022-01-12T02:18:45Z
https://github.com/cesanta/mjs/issues/190
1,091,424,729
190
CVE-2021-46522
2022-01-27T21:15:10.033
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)...
Heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53)
https://api.github.com/repos/cesanta/mjs/issues/196/comments
0
2021-12-31T05:38:16Z
2022-01-12T02:19:08Z
https://github.com/cesanta/mjs/issues/196
1,091,427,319
196
CVE-2021-46523
2022-01-27T21:15:10.077
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ...
Heap-buffer-overflow mjs/src/mjs_json.c:154:13 in to_json_or_debug
https://api.github.com/repos/cesanta/mjs/issues/198/comments
0
2021-12-31T05:40:39Z
2022-01-12T02:19:30Z
https://github.com/cesanta/mjs/issues/198
1,091,427,798
198
CVE-2021-46524
2022-01-27T21:15:10.117
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/192" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/192
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)...
Heap-buffer-overflow src/mjs_json.c:81 in snquote
https://api.github.com/repos/cesanta/mjs/issues/192/comments
0
2021-12-31T05:33:31Z
2021-12-31T05:33:31Z
https://github.com/cesanta/mjs/issues/192
1,091,426,355
192
CVE-2021-46525
2022-01-27T21:15:10.160
Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/199" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/199
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_C...
Heap-use-after-free src/mjs_exec.c:1156 in mjs_apply
https://api.github.com/repos/cesanta/mjs/issues/199/comments
0
2021-12-31T05:41:58Z
2022-01-12T02:19:47Z
https://github.com/cesanta/mjs/issues/199
1,091,428,077
199
CVE-2021-46526
2022-01-27T21:15:10.207
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/191
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
Global-buffer-overflow src/mjs_json.c:81 in snquote
https://api.github.com/repos/cesanta/mjs/issues/191/comments
0
2021-12-31T05:31:36Z
2021-12-31T05:31:36Z
https://github.com/cesanta/mjs/issues/191
1,091,425,933
191
CVE-2021-46527
2022-01-27T21:15:10.250
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/197" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/197
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $...
Heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring
https://api.github.com/repos/cesanta/mjs/issues/197/comments
0
2021-12-31T05:39:31Z
2022-01-12T02:19:19Z
https://github.com/cesanta/mjs/issues/197
1,091,427,555
197
CVE-2021-46528
2022-01-27T21:15:10.293
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x5361e. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/208" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/208
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP...
SEGV (/usr/local/bin/mjs+0x5361e)
https://api.github.com/repos/cesanta/mjs/issues/208/comments
0
2021-12-31T07:44:06Z
2021-12-31T07:44:06Z
https://github.com/cesanta/mjs/issues/208
1,091,460,498
208
CVE-2021-46529
2022-01-27T21:15:10.337
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8814e. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/210" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/210
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/usr/local/bin/mjs+0x8814e)
https://api.github.com/repos/cesanta/mjs/issues/210/comments
0
2021-12-31T07:46:17Z
2022-01-12T02:20:50Z
https://github.com/cesanta/mjs/issues/210
1,091,461,061
210
CVE-2021-46530
2022-01-27T21:15:10.380
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_execute at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/206" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/206
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_exec.c:823 in mjs_execute
https://api.github.com/repos/cesanta/mjs/issues/206/comments
0
2021-12-31T07:41:02Z
2022-01-12T02:20:23Z
https://github.com/cesanta/mjs/issues/206
1,091,459,702
206
CVE-2021-46531
2022-01-27T21:15:10.423
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8d28e. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/211" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/211
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/usr/local/bin/mjs+0x8d28e)
https://api.github.com/repos/cesanta/mjs/issues/211/comments
0
2021-12-31T07:48:04Z
2021-12-31T07:48:04Z
https://github.com/cesanta/mjs/issues/211
1,091,461,538
211
CVE-2021-46532
2022-01-27T21:15:10.467
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via exec_expr at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/203" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/203
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_exec.c:347 in exec_expr
https://api.github.com/repos/cesanta/mjs/issues/203/comments
0
2021-12-31T07:34:16Z
2022-01-12T02:20:11Z
https://github.com/cesanta/mjs/issues/203
1,091,457,962
203
CVE-2021-46534
2022-01-27T21:15:10.510
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via getprop_builtin_foreign at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/204" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/204
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP...
SEGV src/mjs_exec.c:501 in getprop_builtin_foreign
https://api.github.com/repos/cesanta/mjs/issues/204/comments
0
2021-12-31T07:36:20Z
2021-12-31T07:36:20Z
https://github.com/cesanta/mjs/issues/204
1,091,458,500
204
CVE-2021-46535
2022-01-27T21:15:10.553
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0xe533e. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/209" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/209
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) Version: ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_S...
SEGV (/usr/local/bin/mjs+0xe533e)
https://api.github.com/repos/cesanta/mjs/issues/209/comments
0
2021-12-31T07:45:23Z
2022-01-12T02:20:36Z
https://github.com/cesanta/mjs/issues/209
1,091,460,822
209
CVE-2021-46537
2022-01-27T21:15:10.597
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x9a30e. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/212" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/212
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/usr/local/bin/mjs+0x9a30e)
https://api.github.com/repos/cesanta/mjs/issues/212/comments
0
2021-12-31T07:49:30Z
2021-12-31T07:49:30Z
https://github.com/cesanta/mjs/issues/212
1,091,461,914
212
CVE-2021-46538
2022-01-27T21:15:10.643
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_compact_strings at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/216" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/216
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_gc.c:406 in gc_compact_strings
https://api.github.com/repos/cesanta/mjs/issues/216/comments
0
2021-12-31T07:56:05Z
2022-01-12T02:21:15Z
https://github.com/cesanta/mjs/issues/216
1,091,463,608
216
CVE-2021-46539
2022-01-27T21:15:10.687
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x45a1f. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/217" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/217
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x45a1f)
https://api.github.com/repos/cesanta/mjs/issues/217/comments
0
2021-12-31T07:57:19Z
2022-01-12T02:21:26Z
https://github.com/cesanta/mjs/issues/217
1,091,463,932
217
CVE-2021-46540
2022-01-27T21:15:10.730
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_get_mjs at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/214" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/214
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP...
SEGV src/mjs_builtin.c:105 in mjs_get_mjs
https://api.github.com/repos/cesanta/mjs/issues/214/comments
0
2021-12-31T07:53:19Z
2021-12-31T07:53:19Z
https://github.com/cesanta/mjs/issues/214
1,091,462,899
214
CVE-2021-46541
2022-01-27T21:15:10.773
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c6ae. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/222" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/222
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/usr/local/bin/mjs+0x2c6ae)
https://api.github.com/repos/cesanta/mjs/issues/222/comments
0
2021-12-31T08:03:15Z
2021-12-31T08:03:15Z
https://github.com/cesanta/mjs/issues/222
1,091,465,836
222
CVE-2021-46542
2022-01-27T21:15:10.817
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_print at src/mjs_builtin.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/215" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/215
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_builtin.c:18 in mjs_print
https://api.github.com/repos/cesanta/mjs/issues/215/comments
0
2021-12-31T07:54:36Z
2022-01-12T02:21:03Z
https://github.com/cesanta/mjs/issues/215
1,091,463,219
215
CVE-2021-46543
2022-01-27T21:15:10.860
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x18e810. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/219" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/219
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x18e810)
https://api.github.com/repos/cesanta/mjs/issues/219/comments
0
2021-12-31T07:59:21Z
2022-01-12T02:21:48Z
https://github.com/cesanta/mjs/issues/219
1,091,464,458
219
CVE-2021-46544
2022-01-27T21:15:10.903
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x59e19. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/220" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/220
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x59e19)
https://api.github.com/repos/cesanta/mjs/issues/220/comments
0
2021-12-31T08:00:38Z
2022-01-12T02:22:12Z
https://github.com/cesanta/mjs/issues/220
1,091,464,835
220
CVE-2021-46545
2022-01-27T21:15:10.947
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x4b44b. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/218" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/218
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x4b44b)
https://api.github.com/repos/cesanta/mjs/issues/218/comments
0
2021-12-31T07:58:22Z
2022-01-12T02:21:37Z
https://github.com/cesanta/mjs/issues/218
1,091,464,190
218
CVE-2021-46546
2022-01-27T21:15:10.990
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_next at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/213" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/213
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_object.c:255 in mjs_next
https://api.github.com/repos/cesanta/mjs/issues/213/comments
0
2021-12-31T07:50:54Z
2021-12-31T07:50:54Z
https://github.com/cesanta/mjs/issues/213
1,091,462,280
213
CVE-2021-46547
2022-01-27T21:15:11.033
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x2c17e. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/221" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/221
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV (/usr/local/bin/mjs+0x2c17e)
https://api.github.com/repos/cesanta/mjs/issues/221/comments
0
2021-12-31T08:01:57Z
2021-12-31T08:01:57Z
https://github.com/cesanta/mjs/issues/221
1,091,465,349
221
CVE-2021-46548
2022-01-27T21:15:11.093
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via add_lineno_map_item at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/228" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/228
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_bcode.c:15 in add_lineno_map_item
https://api.github.com/repos/cesanta/mjs/issues/228/comments
0
2021-12-31T08:09:27Z
2022-01-12T02:22:49Z
https://github.com/cesanta/mjs/issues/228
1,091,467,987
228
CVE-2021-46549
2022-01-27T21:15:11.137
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via parse_cval_type at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/224" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/224
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_ffi.c:50 in parse_cval_type
https://api.github.com/repos/cesanta/mjs/issues/224/comments
0
2021-12-31T08:05:23Z
2021-12-31T08:05:23Z
https://github.com/cesanta/mjs/issues/224
1,091,466,611
224
CVE-2021-46550
2022-01-27T21:15:11.183
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via free_json_frame at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/230" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/230
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_C...
SEGV src/mjs_json.c:323 in free_json_frame
https://api.github.com/repos/cesanta/mjs/issues/230/comments
0
2021-12-31T08:11:01Z
2022-01-12T02:23:13Z
https://github.com/cesanta/mjs/issues/230
1,091,468,550
230
CVE-2021-46553
2022-01-27T21:15:11.227
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_set_internal at src/mjs_object.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/226" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/226
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_object.c:207 in mjs_set_internal
https://api.github.com/repos/cesanta/mjs/issues/226/comments
0
2021-12-31T08:07:24Z
2022-01-12T02:22:36Z
https://github.com/cesanta/mjs/issues/226
1,091,467,307
226
CVE-2021-46554
2022-01-27T21:15:11.270
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_json_stringify at src/mjs_json.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/229" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/229
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_json.c:273 in mjs_json_stringify
https://api.github.com/repos/cesanta/mjs/issues/229/comments
0
2021-12-31T08:10:12Z
2022-01-12T02:23:01Z
https://github.com/cesanta/mjs/issues/229
1,091,468,269
229
CVE-2021-46556
2022-01-27T21:15:11.317
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_bcode_insert_offset at src/mjs_bcode.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/227" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/227
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T...
SEGV src/mjs_bcode.c:67 in mjs_bcode_insert_offset
https://api.github.com/repos/cesanta/mjs/issues/227/comments
0
2021-12-31T08:08:18Z
2021-12-31T08:08:18Z
https://github.com/cesanta/mjs/issues/227
1,091,467,592
227
CVE-2016-3735
2022-01-28T20:15:08.437
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they kn...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": null, "url": "http://piwigo.org/release-2.8.1%2C" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "294E7F72-0D7D-4B0C-B05E-B58EFB07CF35", "versionEndExcluding": "2.8.1", "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Piwigo/Piwigo/issues/470%2C
null
github.com
[ "Piwigo", "Piwigo" ]
Current functions used to generate random strings are not "that much random" (depending on the PHP version and operating system).
increase randomness on generate_key
https://api.github.com/repos/Piwigo/Piwigo/issues/470/comments
0
2016-04-26T09:03:40Z
2018-01-15T12:20:36Z
https://github.com/Piwigo/Piwigo/issues/470
151,080,998
470
CVE-2022-23887
2022-01-28T21:15:10.197
YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete user accounts via /admin/admin_manage/delete.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/59
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
This vulnerability allows arbitrary users to be deleted, There is a user with ID 3, ![image](https://user-images.githubusercontent.com/89461075/150460342-a09eccf1-8611-42e2-a52d-336b307df441.png) Click delete and capture the package to generate the POC of CSRF, ![image](https://user-images.githubusercontent.com/8...
YzmCMS V6. 3. CSRF vulnerability exists in the official version(YzmCMS V6.3 正式版存在csrf漏洞)
https://api.github.com/repos/yzmcms/yzmcms/issues/59/comments
1
2022-01-21T03:30:48Z
2022-02-14T02:59:09Z
https://github.com/yzmcms/yzmcms/issues/59
1,110,013,040
59