cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2022-47657
2023-01-05T16:15:10.233
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2355" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2355
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662
https://api.github.com/repos/gpac/gpac/issues/2355/comments
0
2022-12-17T10:31:33Z
2022-12-17T11:29:28Z
https://github.com/gpac/gpac/issues/2355
1,501,315,271
2,355
CVE-2022-47658
2023-01-05T16:15:10.447
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2356" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2356
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
buffer overflow in function gf_hevc_read_vps_bs_internal of media_tools/av_parsers.c:8039
https://api.github.com/repos/gpac/gpac/issues/2356/comments
0
2022-12-17T10:31:37Z
2022-12-17T11:29:29Z
https://github.com/gpac/gpac/issues/2356
1,501,315,341
2,356
CVE-2022-47659
2023-01-05T16:15:10.670
GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2354" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2354
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data
https://api.github.com/repos/gpac/gpac/issues/2354/comments
0
2022-12-17T10:31:30Z
2022-12-17T11:29:28Z
https://github.com/gpac/gpac/issues/2354
1,501,315,203
2,354
CVE-2022-47660
2023-01-05T16:15:10.890
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2357" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2357
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
integer overflow in isomedia/isom_write.c:4931
https://api.github.com/repos/gpac/gpac/issues/2357/comments
0
2022-12-17T10:31:40Z
2022-12-17T11:29:29Z
https://github.com/gpac/gpac/issues/2357
1,501,315,390
2,357
CVE-2022-47661
2023-01-05T16:15:11.103
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2358" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2358
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description heap-buffer-overf...
heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
https://api.github.com/repos/gpac/gpac/issues/2358/comments
0
2022-12-18T10:23:38Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2358
1,501,850,698
2,358
CVE-2022-47662
2023-01-05T16:15:11.400
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2359" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2359
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description segment fault (/s...
Infinite recursion in Media_GetSample isomedia/media.c:662
https://api.github.com/repos/gpac/gpac/issues/2359/comments
0
2022-12-18T10:23:42Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2359
1,501,850,761
2,359
CVE-2022-47663
2023-01-05T16:15:11.623
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2360" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2360
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description buffer overflow i...
buffer overflow in h263dmx_process filters/reframe_h263.c:609
https://api.github.com/repos/gpac/gpac/issues/2360/comments
0
2022-12-18T10:23:45Z
2022-12-19T11:26:13Z
https://github.com/gpac/gpac/issues/2360
1,501,850,806
2,360
CVE-2023-23456
2023-01-12T19:15:24.693
A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160381" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB529776-278E-419A-B8E1-F7A101A77E24", "versionEndExcluding": "2022-11-24", "versionEndIncluding": null, "versionStartEx...
https://github.com/upx/upx/issues/632
[ "Exploit", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggest...
heap-buffer-overflow in PackTmt::pack
https://api.github.com/repos/upx/upx/issues/632/comments
1
2022-11-24T06:26:03Z
2022-11-27T23:14:58Z
https://github.com/upx/upx/issues/632
1,462,826,378
632
CVE-2023-23457
2023-01-12T19:15:24.810
A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160382" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "191334EB-C1FD-4A4C-A48A-139452FD5DF4", "versionEndExcluding": "2022-11-23", "versionEndIncluding": null, "versionStartEx...
https://github.com/upx/upx/issues/631
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
This issue tracker is **ONLY** used for reporting bugs. Please use [stackoverflow](https://stackoverflow.com) for supporting issues. <!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## ...
SEGV on PackLinuxElf64::invert_pt_dynamic
https://api.github.com/repos/upx/upx/issues/631/comments
1
2022-11-24T02:21:53Z
2022-11-27T23:16:30Z
https://github.com/upx/upx/issues/631
1,462,658,711
631
CVE-2022-47105
2023-01-19T16:15:11.277
Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4393" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "7BB811AB-8B4F-4A5A-8851-B617184A298A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/4393
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号:3.4.4 ##### 前端版本:vue2版 ##### 问题描述:sql注入检测代码存在绕过. ##### 截图&代码: SqlInjectionUtil类中sql的注释正则为 ```java private final static Pattern SQL_ANNOTATION = Pattern.compile("/\\*.*\\*/"); ``` .无法匹配到%0A, 导致可以利用/\*%0A\*/绕过 关键字检测后存在空格,导致绕过 ```java private final static String XSS_STR = "and |extractvalue|u...
jeecg-boot3.4.4 存在sql注入漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4393/comments
2
2022-12-10T09:17:39Z
2022-12-23T06:03:37Z
https://github.com/jeecgboot/JeecgBoot/issues/4393
1,488,266,227
4,393
CVE-2021-29368
2023-01-20T19:15:13.250
Session fixation vulnerability in CuppaCMS thru commit 4c9b742b23b924cf4c1f943f48b278e06a17e297 on November 12, 2019 allows attackers to gain access to arbitrary user sessions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:*:*:*:*:*:*:*:*", "matchCriteriaId": "25182935-24F3-4028-A4E5-95BB51377EB7", "versionEndExcluding": null, "versionEndIncluding": "2019-11-12", "versionStart...
https://github.com/CuppaCMS/CuppaCMS/issues/8
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
**Cuppa CMS is prone to a session fixation attack.** Description: Session Fixation is an attack that permits an attacker to hijack a valid user session. The attack explores a limitation in the way the web application manages the session ID, more specifically the vulnerable web application. When authenticating a user, ...
Session Fixation in CuppaCMS
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/8/comments
1
2020-06-16T17:01:59Z
2020-07-01T14:53:11Z
https://github.com/CuppaCMS/CuppaCMS/issues/8
639,831,189
8
CVE-2022-45537
2023-01-20T19:15:16.093
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_LIST_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/34/comments
1
2022-11-14T08:44:20Z
2023-02-20T10:13:49Z
https://github.com/weng-xianhu/eyoucms/issues/34
1,447,630,496
34
CVE-2022-45538
2023-01-20T19:15:16.160
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_GOBACK_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/35/comments
1
2022-11-14T08:49:28Z
2023-02-20T10:13:18Z
https://github.com/weng-xianhu/eyoucms/issues/35
1,447,638,304
35
CVE-2022-45539
2023-01-20T19:15:16.223
EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/38" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file adding with reflected-XSS in the get ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/38/comments
1
2022-11-14T09:06:48Z
2023-02-20T08:22:13Z
https://github.com/weng-xianhu/eyoucms/issues/38
1,447,664,065
38
CVE-2022-45540
2023-01-20T19:15:16.287
EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value "name" if the value contains a malformed UTF-8 char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article type adding with reflected-XSS in ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/37/comments
1
2022-11-14T09:00:48Z
2023-02-20T08:36:11Z
https://github.com/weng-xianhu/eyoucms/issues/37
1,447,653,340
37
CVE-2022-45541
2023-01-20T19:15:16.347
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value "value" if the value contains a non-integer char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article attribute type changing with refle...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/36/comments
1
2022-11-14T08:56:29Z
2023-02-20T10:01:25Z
https://github.com/weng-xianhu/eyoucms/issues/36
1,447,647,465
36
CVE-2022-45542
2023-01-20T19:15:16.400
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter "filename" when editing any file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
https://github.com/weng-xianhu/eyoucms/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file management editor with reflected-XSS ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/33/comments
1
2022-11-14T08:34:33Z
2023-02-20T10:49:48Z
https://github.com/weng-xianhu/eyoucms/issues/33
1,447,617,306
33
CVE-2022-48007
2023-01-27T18:15:14.947
A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1835" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4CE9B7C-3D2B-4876-B8E3-5EE46628EA5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1835
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hello, I found Stored XSS in Piwigo version 13.4.0. **Impact:** In this way, ordinary users can be promoted to administrator users. **Here are the complete attack steps:** 1. Register an ordinary user. ![image](https://user-images.githubusercontent.com/71068573/208852813-4ff58926-0e8b-4940-bb4d-dcba99b4aeae.png)...
Piwigo-13.4.0-Stored XSS Vulnerability in User-Agent
https://api.github.com/repos/Piwigo/Piwigo/issues/1835/comments
0
2022-12-21T08:21:08Z
2022-12-25T10:25:36Z
https://github.com/Piwigo/Piwigo/issues/1835
1,505,891,189
1,835
CVE-2022-48006
2023-01-30T22:15:12.463
An arbitrary file upload vulnerability in taocms v3.0.2 allows attackers to execute arbitrary code via a crafted PHP file. This vulnerability is exploited via manipulation of the upext variable at /include/Model/Upload.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
This is the latest 3.0.2 version of taocms. Organize and utilize steps in two steps: Step1: Audit the source code "include/Model/Upload.php", line 33, the filename extension can be controlled by modifying variable "upext": <img width="1339" alt="image" src="https://user-images.githubusercontent.com/39691787/208...
File upload vulnerability exists by modifying Upload.php configuration in backend.
https://api.github.com/repos/taogogo/taocms/issues/35/comments
0
2022-12-21T08:22:48Z
2022-12-21T08:22:48Z
https://github.com/taogogo/taocms/issues/35
1,505,893,165
35
CVE-2023-22975
2023-02-03T17:15:09.073
A cross-site scripting (XSS) vulnerability in JFinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter under /front/person/profile.html.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/jflyfox/jfinal_cms/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
## Summary There is XSS vulnerability below! The reason for the vulnerability is that there is no filter on user input. According to the guidelines of CMS, We can create a user, and we can control the user's account number, password and email and so on..... ## Exploition After, There are many ways to trigger th...
XSS vulnerability exists in jfinal_cms V5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/53/comments
1
2022-12-29T15:35:31Z
2022-12-29T15:35:55Z
https://github.com/jflyfox/jfinal_cms/issues/53
1,513,842,062
53
CVE-2021-36535
2023-02-03T18:15:10.653
Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/175" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/cesanta/mjs/issues/175
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
### Built: Jun 30 2021 ### Details: heap-based buffer overflow **mjs.c:7617** in **mjs_set_errorf** ### Command: ./mjs -f Heap_Buffer_Overflow.js ### Result: ==2419050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000178 at pc 0x55555557f3ed bp 0x7fffffffcf40 sp 0x7fffffffcf30 READ of ...
Heap-based Buffer Overflow Vulnerability
https://api.github.com/repos/cesanta/mjs/issues/175/comments
4
2021-06-30T07:10:17Z
2021-07-27T07:17:09Z
https://github.com/cesanta/mjs/issues/175
933,378,748
175
CVE-2021-36569
2023-02-03T18:15:11.290
Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /users/delete/2.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/578" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/daylightstudio/FUEL-CMS/issues/578
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
Hi: FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a user account via a post ID to /users/delete/2 ![image](https://user-images.githubusercontent.com/12816285/124211514-caee0e00-db1f-11eb-8d92-cfe57274f4b4.png) POC: ![image](https://user-images.githubusercontent.com/128...
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/578/comments
0
2021-07-02T02:26:46Z
2021-08-10T17:49:19Z
https://github.com/daylightstudio/FUEL-CMS/issues/578
935,354,402
578
CVE-2021-36570
2023-02-03T18:15:11.393
Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /permissions/delete/2---.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/579" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/daylightstudio/FUEL-CMS/issues/579
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a Permission via a post ID to /permissions/delete/2 ![image](https://user-images.githubusercontent.com/12816285/124212110-f45b6980-db20-11eb-8087-154ca9d707ab.png) POC: ![image](https://user-images.githubusercontent.com/128162...
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/579/comments
0
2021-07-02T02:35:59Z
2021-07-03T01:33:05Z
https://github.com/daylightstudio/FUEL-CMS/issues/579
935,357,769
579
CVE-2021-37304
2023-02-03T18:15:11.770
An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/2793" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2", "versionEndExcluding": null, "versionEndIncluding": "2.4.5", "versionStartExcluding":...
https://github.com/jeecgboot/jeecg-boot/issues/2793
[ "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 2.4.5 ![image](https://user-images.githubusercontent.com/15991940/125751270-42b4ea1e-4ae3-4b8c-a669-b03eca42ac19.png) ##### 问题描述: Unauthorized access to the httptrace interface reveals sensitive information such as user cookies ##### 截图&代码: api interface http://Ip:8080/jeecg-boot/actuator/httptra...
[security issue] The jeecg-boot version is less than or equal to 2.4.5 httptrace interface has unauthorized access and leaks sensitive information such as user cookies
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2793/comments
1
2021-07-15T08:12:15Z
2021-07-15T10:06:18Z
https://github.com/jeecgboot/JeecgBoot/issues/2793
945,118,917
2,793
CVE-2021-37305
2023-02-03T18:15:11.890
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/2794" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2", "versionEndExcluding": null, "versionEndIncluding": "2.4.5", "versionStartExcluding":...
https://github.com/jeecgboot/jeecg-boot/issues/2794
[ "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: <=2.4.5 ##### 问题描述: ###### 1. leaks sensitive information api uri: /sys/user/querySysUser?username=admin ![image](https://user-images.githubusercontent.com/15991940/125753825-06d1da62-e1d7-4270-9076-c3802880c76d.png) leaks sensitive information such as phone .etc ###### 2. Enumerate usernames api ur...
[2 secueiry issue]jeecg-boot <= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2794/comments
1
2021-07-15T08:32:21Z
2021-08-05T07:02:44Z
https://github.com/jeecgboot/JeecgBoot/issues/2794
945,135,797
2,794
CVE-2022-45755
2023-02-08T19:15:11.600
Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/39" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/39
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version:V1.6.0-UTF8-SP1 ![屏幕截图1](https://user-images.githubusercontent.com/83074322/202837935-26b30126-1f5f-4047-82f2-f92859b1b81e.jpg) 1. Go to the background --> basic information--> home page description ![图片2](https://user-images.githubusercontent.com/83074322/202837990-8acd9355-f6bd-4392-80ca-377a52eab003.png) ...
Vulnerability: EyouCMS v1.6.0 has a vulnerability that stores cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/39/comments
1
2022-11-19T06:37:02Z
2023-02-20T08:21:46Z
https://github.com/weng-xianhu/eyoucms/issues/39
1,456,264,360
39
CVE-2023-0841
2023-02-15T14:15:13.283
A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": null, "url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw" }, { "source": "cna@vuldb.com", "tags": null, "url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4" }, { "source": "cna@vuldb.com", "tags": nu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*", "matchCriteriaId": "BF8AB1FE-492D-4281-B779-FD501A50998C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/gpac/gpac/issues/2396
null
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677
https://api.github.com/repos/gpac/gpac/issues/2396/comments
1
2023-02-09T14:19:15Z
2023-02-13T16:32:29Z
https://github.com/gpac/gpac/issues/2396
1,577,978,840
2,396
CVE-2022-46440
2023-02-24T02:15:10.377
ttftool v0.9.2 was discovered to contain a segmentation violation via the readU16 function at ttf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthias...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# SEGV ## env ubuntu20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1) ttftool - part of swftools 0.9.2 ## sample [poc.zip](https://github.com/matthiaskramm/swftools/files/10101243/poc.zip) ## crash ``` ./ttftool poc1 AddressSanitizer:DEADLYSIGNAL ===================================================...
The function readU16 in ttf.c appears SEGV
https://api.github.com/repos/swftools/swftools/issues/194/comments
0
2022-11-28T07:04:36Z
2022-11-28T07:04:36Z
https://github.com/swftools/swftools/issues/194
1,465,918,774
194
CVE-2021-34167
2023-02-24T21:15:10.627
Cross Site Request Forgery (CSRF) vulnerability in taoCMS 3.0.2 allows remote attackers to gain escalated privileges via taocms/admin/admin.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/taogogo/taocms/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
After the administrator logged in, when he opened following malicious pages, CSRF(Cross Site Request Forgery) vulnerabilities occurred. **poc:** **one.html—add a new account which has administrator privileges** ```html <html><body> <script type="text/javascript"> function post(url,fields) { var p = document...
There are two CSRF vulnerabilities that can add administrator account and change administrator password
https://api.github.com/repos/taogogo/taocms/issues/6/comments
1
2021-05-30T17:59:11Z
2021-07-29T13:55:44Z
https://github.com/taogogo/taocms/issues/6
906,833,744
6
CVE-2023-24751
2023-03-01T15:15:11.393
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://github.com/strukturag/libde265/issues/379" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debia...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/379
[ "Exploit", "Patch", "Vendor Advisory" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function mc_chroma at motion.cc:244 # Version ``` git log commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD) ``` # Steps to reproduce ``` git clone https://github.com/strukturag/libde265.git cd libde265 ./autogen...
NULL Pointer Dereference in function mc_chroma at motion.cc:244
https://api.github.com/repos/strukturag/libde265/issues/379/comments
2
2023-01-28T03:15:32Z
2023-03-04T07:38:40Z
https://github.com/strukturag/libde265/issues/379
1,560,664,401
379
CVE-2023-24752
2023-03-01T15:15:11.447
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/378" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/378
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987 # Version ``` git log commit 1cf2999583ef8a90e11933ed70908e4e2c2d8872 (HEAD -> master, origin/master, origin/HEAD) ``` # Steps to reproduce ``` git clone https://github.com/strukturag/libde26...
NULL Pointer Dereference in function ff_hevc_put_hevc_epel_pixels_8_sse at sse-motion.cc:987
https://api.github.com/repos/strukturag/libde265/issues/378/comments
2
2023-01-28T02:54:24Z
2023-03-04T07:39:03Z
https://github.com/strukturag/libde265/issues/378
1,560,655,877
378
CVE-2023-24754
2023-03-01T15:15:11.510
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/382" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/382
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237 # Version ``` git log commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD) Author: Dirk Farin <dirk.farin@gmail.com> Date: Sat Jan 28 15:03:34 2023 +0100 ...
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:237
https://api.github.com/repos/strukturag/libde265/issues/382/comments
2
2023-01-29T08:14:34Z
2023-03-04T07:40:02Z
https://github.com/strukturag/libde265/issues/382
1,561,180,454
382
CVE-2023-24755
2023-03-01T15:15:11.577
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_weighted_pred_8_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/384" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/384
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69 # Version ``` git log commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD) Author: Dirk Farin <dirk.farin@gmail.com> Date: Sat Jan 28 15:03:34 2023 +0100 ``...
NULL Pointer Dereference in function put_weighted_pred_8_fallback at fallback-motion.cc:69
https://api.github.com/repos/strukturag/libde265/issues/384/comments
2
2023-01-29T08:15:40Z
2023-03-04T07:40:24Z
https://github.com/strukturag/libde265/issues/384
1,561,180,905
384
CVE-2023-24756
2023-03-01T15:15:11.623
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_unweighted_pred_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/380" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/380
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116 # Version ``` git log commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD) Author: Dirk Farin <dirk.farin@gmail.com> Date: Sat Jan 28 15:03:34 2023 +0100 `...
NULL Pointer Dereference in function ff_hevc_put_unweighted_pred_8_sse at sse-motion.cc:116
https://api.github.com/repos/strukturag/libde265/issues/380/comments
1
2023-01-29T08:12:53Z
2023-03-04T07:41:52Z
https://github.com/strukturag/libde265/issues/380
1,561,180,071
380
CVE-2023-24757
2023-03-01T15:15:11.683
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/385" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/385
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179 # Version ``` git log commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD) Author: Dirk Farin <dirk.farin@gmail.com> Date: Sat Jan 28 15:03:34 2023 +0100 ...
NULL Pointer Dereference in function put_unweighted_pred_16_fallback at fallback-motion.cc:179
https://api.github.com/repos/strukturag/libde265/issues/385/comments
2
2023-01-29T08:16:20Z
2023-03-04T07:42:01Z
https://github.com/strukturag/libde265/issues/385
1,561,181,036
385
CVE-2023-24758
2023-03-01T15:15:11.743
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/383" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/383
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254 # Version ``` git log commit 7ea8e3cbb010bc02fa38419e87ed2281d7933850 (HEAD -> master, origin/master, origin/HEAD) Author: Dirk Farin <dirk.farin@gmail.com> Date: Sat Jan 28 15:03:34 2023 +0100 ...
NULL Pointer Dereference in function ff_hevc_put_weighted_pred_avg_8_sse at sse-motion.cc:254
https://api.github.com/repos/strukturag/libde265/issues/383/comments
2
2023-01-29T08:15:05Z
2023-03-04T07:42:17Z
https://github.com/strukturag/libde265/issues/383
1,561,180,747
383
CVE-2023-25221
2023-03-01T15:15:11.803
Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function in motion.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/388" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C99171A4-8D0A-441C-98FE-0D24B39BFFE4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/388
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894 # Version ``` git log commit bfb6de155f9fb015d2904cb4ef07809f17995276 (HEAD -> master, origin/master, origin/HEAD) Author: Dirk Farin <dirk.farin@gmail.com> Date: Sun Jan 29 12:20:48 2023 +0100 ``` ...
heap-buffer-overflow in function derive_spatial_luma_vector_prediction at motion.cc:1894
https://api.github.com/repos/strukturag/libde265/issues/388/comments
2
2023-01-30T00:57:44Z
2023-03-04T07:42:32Z
https://github.com/strukturag/libde265/issues/388
1,561,547,743
388
CVE-2023-25222
2023-03-01T15:15:11.860
A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/615" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/LibreDWG/libredwg/issues/615
[ "Exploit", "Vendor Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
# Description heap-buffer-overflow in function bit_read_RC at bits.c:320 # Version ``` git log commit 3c90dc6641e11e486666940d7f354d2df54503d6 (HEAD -> master, tag: 0.12.5.5010, origin/master, origin/HEAD) Author: Michal Josef Špaček <michal.josef.spacek@gmail.com> Date: Fri Jan 27 18:50:08 2023 +0100 ...
heap-buffer-overflow in function bit_read_RC at bits.c:320
https://api.github.com/repos/LibreDWG/libredwg/issues/615/comments
1
2023-01-30T08:00:12Z
2023-04-29T20:50:44Z
https://github.com/LibreDWG/libredwg/issues/615
1,561,928,009
615
CVE-2022-3162
2023-03-01T19:15:25.457
Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API gr...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/113756" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1780A92B-C6FB-410B-8374-88D1D296816A", "versionEndExcluding": null, "versionEndIncluding": "1.22.15", "versionStar...
https://github.com/kubernetes/kubernetes/issues/113756
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a ...
CVE-2022-3162: Unauthorized read of Custom Resources
https://api.github.com/repos/kubernetes/kubernetes/issues/113756/comments
17
2022-11-08T21:33:07Z
2022-12-08T03:40:09Z
https://github.com/kubernetes/kubernetes/issues/113756
1,440,934,711
113,756
CVE-2022-3294
2023-03-01T19:15:25.570
Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/113757" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "38E275C4-8711-435F-85D8-073116D467CF", "versionEndExcluding": "1.22.16", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/113757
[ "Patch", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) A security issue was discovered in Kubernetes where users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an u...
CVE-2022-3294: Node address isn't always verified when proxying
https://api.github.com/repos/kubernetes/kubernetes/issues/113757/comments
2
2022-11-08T21:33:26Z
2023-04-27T08:27:18Z
https://github.com/kubernetes/kubernetes/issues/113757
1,440,935,103
113,757
CVE-2022-47664
2023-03-03T15:15:10.887
Libde265 1.0.9 is vulnerable to Buffer Overflow in ff_hevc_put_hevc_qpel_pixels_8_sse
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/368" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/368
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*) # Version info ``` dec265 v1.0.9 -------------- usage: dec265 [options] videofile.bin The video file must be a raw bitstream,...
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x2b6bbb) in ff_hevc_put_hevc_qpel_pixels_8_sse(short*, long, unsigned char const*, long, int, int, short*)
https://api.github.com/repos/strukturag/libde265/issues/368/comments
7
2022-12-18T10:37:01Z
2023-03-06T17:51:27Z
https://github.com/strukturag/libde265/issues/368
1,501,854,902
368
CVE-2022-47665
2023-03-03T15:15:10.960
Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int)
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/strukturag/libde265/issues/369" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8186C657-3009-4756-B2AC-531BD7926074", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/strukturag/libde265/issues/369
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "strukturag", "libde265" ]
# Description heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int) # Version info ``` dec265 v1.0.9 -------------- usage: dec265 [options] videofile.bin The video file must be a raw bitstream, or a stream with NAL units (option -n). options...
heap-buffer-overflow (libde265/build/libde265/libde265.so+0x1ec50d) in de265_image::set_SliceAddrRS(int, int, int)
https://api.github.com/repos/strukturag/libde265/issues/369/comments
5
2022-12-18T10:37:03Z
2023-03-06T17:51:06Z
https://github.com/strukturag/libde265/issues/369
1,501,854,985
369
CVE-2023-24789
2023-03-06T16:15:10.187
jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4511" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "83D5D7DD-38EF-48F6-8C18-F75891A91B66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/jeecgboot/jeecg-boot/issues/4511
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
Use the system default account password to log in to the system. In the visual design menu - report design, see Figure 1 for details. <img width="1512" alt="截屏2023-01-29 22 01 08" src="https://user-images.githubusercontent.com/32299945/215331278-68f86a40-1199-463a-b0f0-5441746c7eb1.png"> Then click New Report, see F...
There is a sql injection vulnerability in the jeecg 3.4.4 building block report
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4511/comments
3
2023-01-29T14:16:41Z
2023-11-01T01:16:34Z
https://github.com/jeecgboot/JeecgBoot/issues/4511
1,561,308,445
4,511
CVE-2023-27114
2023-03-10T02:15:58.403
radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/radareorg/radare2/commit/a15067a8eaa836bcc24b0882712c14d1baa66509" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/radareorg/radare2/issues/21363" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "51E5C30E-2343-42D6-B6FA-C50BCFA549AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/radareorg/radare2/issues/21363
[ "Exploit", "Issue Tracking" ]
github.com
[ "radareorg", "radare2" ]
## Description When parsing the wasm file with r2, using the `pd` command may result in a segmentation fault, because `NULL` was incorrectly passed to `strdup`. ## Environment ```sh # date Mon Feb 20 02:38:13 AKST 2023 # r2 -v radare2 5.8.3 0 @ linux-x86-64 git.5.8.3 commit: 5.8.3 build: 2023-02-16__23:25...
Segmentation fault in wasm_dis at p/wasm/wasm.c:1112
https://api.github.com/repos/radareorg/radare2/issues/21363/comments
1
2023-02-20T11:48:06Z
2023-02-20T12:30:07Z
https://github.com/radareorg/radare2/issues/21363
1,591,704,755
21,363
CVE-2023-27102
2023-03-15T15:15:09.617
Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/393" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg000...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/393
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Desctiption A SEGV has occurred when running program dec265 NULL Pointer Dereference in function decoder_context::process_slice_segment_header at decctx.cc:2007:20 ### Version ``` dec265 v1.0.11 git log commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD) Merge: 3a...
SEGV:occured in function decoder_context::process_slice_segment_header at decctx.cc:2007:20
https://api.github.com/repos/strukturag/libde265/issues/393/comments
2
2023-02-20T13:07:39Z
2023-06-13T13:34:07Z
https://github.com/strukturag/libde265/issues/393
1,591,846,415
393
CVE-2023-27103
2023-03-15T15:15:09.670
Libde265 v1.0.11 was discovered to contain a heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/394" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg000...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "75BAF096-8BC3-4430-930C-8F3E6266C21D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/strukturag/libde265/issues/394
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
### Desctiption A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc:1259:41 ### Version ``` dec265 v1.0.11 git log commit fef32a7761993702c699dfbe3699e44374eb44b5 (HEAD -> master, origin/master, origin/HEAD) Merge: 3aea5a45 c2b60f1c Author...
A heap-buffer-overflow has occurred when running program dec265 in function derive_collocated_motion_vectors at motion.cc
https://api.github.com/repos/strukturag/libde265/issues/394/comments
3
2023-02-22T03:28:35Z
2023-04-16T20:29:41Z
https://github.com/strukturag/libde265/issues/394
1,594,397,865
394
CVE-2023-27783
2023-03-16T15:15:10.717
An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/780" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcprepla...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/780
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a reachable assertion in `tcpedit_dlt_cleanup()` when when the user uses `tcprewrite` to open a crafted pcap file in `DLT_JUNIPER_ETHER` mode. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` ...
[Bug] Reachable assertion in tcpedit_dlt_cleanup() at plugins/dlt_plugins.c
https://api.github.com/repos/appneta/tcpreplay/issues/780/comments
5
2023-03-01T03:10:46Z
2023-06-12T11:10:36Z
https://github.com/appneta/tcpreplay/issues/780
1,604,155,785
780
CVE-2023-27784
2023-03-16T15:15:10.767
An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause a denial of service via the read_hexstring function at the utils.c:309 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/787" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/787
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `read_hexstring()` when the user passes empty user dlink string to `tcprewrite` with option `--user-dlink` when the program process the pcap file whose data link type is DLT_USER0. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay ...
[Bug] NULL Pointer Dereference in read_hexstring() at utils.c:309
https://api.github.com/repos/appneta/tcpreplay/issues/787/comments
1
2023-03-01T14:29:21Z
2023-06-05T02:12:40Z
https://github.com/appneta/tcpreplay/issues/787
1,605,081,875
787
CVE-2023-27785
2023-03-16T15:15:10.823
An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse endpoints function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/785" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/785
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `parse_endpoints()` when the user passes empty endpoints string to `tcprewrite` with option `--endpoints`. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. G...
[Bug] NULL Pointer Dereference in parse_endpoints() at cidr.c:367
https://api.github.com/repos/appneta/tcpreplay/issues/785/comments
1
2023-03-01T13:05:12Z
2023-06-05T02:11:48Z
https://github.com/appneta/tcpreplay/issues/785
1,604,942,692
785
CVE-2023-27786
2023-03-16T15:15:10.877
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/782" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcprepla...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/782
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `macinstring()` when the user passes empty mac string to `tcpprep` in Source MAC split mode. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./...
[Bug] NULL Pointer Dereference in macinstring() at mac.c:120
https://api.github.com/repos/appneta/tcpreplay/issues/782/comments
2
2023-03-01T08:19:59Z
2023-06-05T02:10:12Z
https://github.com/appneta/tcpreplay/issues/782
1,604,494,155
782
CVE-2023-27787
2023-03-16T15:15:10.940
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/788" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/788
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a NULL Pointer Dereference in `parse_list()` when the user passes specific size (i.e., 2) of include string to `tcpprep` with option `--include`. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ...
[Bug] NULL Pointer Dereference in parse_list() at list.c:81
https://api.github.com/repos/appneta/tcpreplay/issues/788/comments
1
2023-03-02T01:58:00Z
2023-06-05T02:13:05Z
https://github.com/appneta/tcpreplay/issues/788
1,605,978,257
788
CVE-2023-27788
2023-03-16T15:15:11.000
An issue found in TCPrewrite v.4.4.3 allows a remote attacker to cause a denial of service via the ports2PORT function at the portmap.c:69 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/786" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/786
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a reachable assertion in `ports2PORT()` when the user passes empty portmap string to `tcprewrite` with option `--portmap`. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ...
[Bug] Reachable assertion in ports2PORT() at portmap.c:69
https://api.github.com/repos/appneta/tcpreplay/issues/786/comments
1
2023-03-01T13:11:58Z
2023-06-05T02:12:13Z
https://github.com/appneta/tcpreplay/issues/786
1,604,953,701
786
CVE-2023-27789
2023-03-16T15:15:11.057
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the cidr2cidr function at the cidr.c:178 endpoint.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcpreplay/issues/784" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/appneta/tcprepla...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7272A798-456E-43CC-A8D2-33FF2AE16FF7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/appneta/tcpreplay/issues/784
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** There is a reachable assertion in `cidr2cidr()` when the user passes empty cidr string to `tcpprep` in CIDR-split mode. **To Reproduce** Steps to reproduce the behavior: 1. Get the Tcpreplay source code and compile it. ``` $ ./configure $ make ``` 2. Run Command `$ ./tcpprep --...
[Bug] Reachable assertion in cidr2cidr() at cidr.c:178
https://api.github.com/repos/appneta/tcpreplay/issues/784/comments
1
2023-03-01T13:03:02Z
2023-06-05T02:10:42Z
https://github.com/appneta/tcpreplay/issues/784
1,604,938,815
784
CVE-2023-1448
2023-03-17T07:15:12.093
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2388" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/3"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2388
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Heap-buffer-overflow in function gf_m2ts_process_sdt of media_tools/mpegts.c:828
https://api.github.com/repos/gpac/gpac/issues/2388/comments
2
2023-02-02T14:57:17Z
2023-03-21T04:19:07Z
https://github.com/gpac/gpac/issues/2388
1,568,208,539
2,388
CVE-2023-1449
2023-03-17T07:15:12.347
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2387" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/bl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2387
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Double free in gf_av1_reset_state media_tools/av_parsers.c:4024
https://api.github.com/repos/gpac/gpac/issues/2387/comments
2
2023-02-02T10:24:45Z
2023-03-21T04:26:10Z
https://github.com/gpac/gpac/issues/2387
1,567,763,524
2,387
CVE-2023-1452
2023-03-17T07:15:12.947
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2386" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/1....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/2386
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Buffer overflow in filters/load_text.c:353:14
https://api.github.com/repos/gpac/gpac/issues/2386/comments
2
2023-02-02T09:53:52Z
2023-03-21T04:44:47Z
https://github.com/gpac/gpac/issues/2386
1,567,701,993
2,386
CVE-2021-46877
2023-03-18T22:15:11.357
jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/3328" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Release Notes" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "439EA36C-3D2E-4B27-B36B-AECEC34E0D8A", "versionEndExcluding": "2.12.6", "versionEndIncluding": null, "version...
https://github.com/FasterXML/jackson-databind/issues/3328
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
There is a report on possible DoS attack, against certain versions of Jackson 2.10.x - 2.13.x (does not affect earlier versions like 2.9, nor future 2.14 and 3.0). CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-46877 Fix has been included in versions: * 2.12.6 * 2.13.1 No current plans to back-porting into...
Possible DoS if using JDK serialization to serialize `JsonNode` [CVE-2021-46877]
https://api.github.com/repos/FasterXML/jackson-databind/issues/3328/comments
21
2021-11-20T02:09:34Z
2023-03-24T16:49:50Z
https://github.com/FasterXML/jackson-databind/issues/3328
1,059,035,707
3,328
CVE-2023-27249
2023-03-23T02:15:12.733
swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://swfdump.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc" }, { "source": "cve@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/197
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# heap-buffer-overflow ## env ubuntu20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1) swfdump - part of swftools 0.9.2 ## sample [poc.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc) ## crash ``` ./swfdump -D poc ==2946990==ERROR: AddressSanitizer: heap-buffer-overflow on addres...
heap-buffer-overflow exists in the function swf_GetPlaceObject in swfobject.c
https://api.github.com/repos/swftools/swftools/issues/197/comments
0
2023-02-26T09:28:41Z
2023-02-26T09:28:41Z
https://github.com/swftools/swftools/issues/197
1,599,986,264
197
CVE-2021-43311
2023-03-24T20:15:08.223
A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/380" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/380
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? Multi heap-based buffer overflows were discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le32(). The issue can be triggered by different places, which can cause a denial of service. The issue is diff from [issue365](https://github.com/up...
[bug] multi heap buffer overflows in get_le32()
https://api.github.com/repos/upx/upx/issues/380/comments
2
2020-05-23T14:24:07Z
2023-04-17T18:03:04Z
https://github.com/upx/upx/issues/380
623,670,883
380
CVE-2021-43312
2023-03-24T20:15:08.270
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/379" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/379
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239. ASAN reports: ```bash ==110294==ERROR: AddressSanitizer: hea...
[bug] heap buffer overflow in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5239
https://api.github.com/repos/upx/upx/issues/379/comments
2
2020-05-23T14:21:20Z
2023-04-17T18:13:35Z
https://github.com/upx/upx/issues/379
623,670,397
379
CVE-2021-43313
2023-03-24T20:15:08.317
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/378" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/378
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688. ASAN reports: ```bash ==110358==ERROR: AddressSanitizer: hea...
[bug]heap buffer overflow in PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688
https://api.github.com/repos/upx/upx/issues/378/comments
2
2020-05-23T14:19:31Z
2023-04-17T18:19:24Z
https://github.com/upx/upx/issues/378
623,670,052
378
CVE-2021-43316
2023-03-24T20:15:08.460
A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le64().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/upx/upx/issues/381" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C95CD-E2A9-47E3-9866-FD4B7ECF14AA", "versionEndExcluding": "4.0.0", "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/381
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "upx", "upx" ]
## What's the problem (or question)? A heap-based buffer overflow was discovered in upx, during the genric pointer 'p' points to an inaccessible address in func get_le64(). The issue can cause a denial of service. The issue is diff from [issue367](https://github.com/upx/upx/issues/367) and [issue368](https://github.co...
[bug] segv fault in get_le64()
https://api.github.com/repos/upx/upx/issues/381/comments
2
2020-05-23T14:28:34Z
2023-04-17T18:34:13Z
https://github.com/upx/upx/issues/381
623,671,725
381
CVE-2020-19692
2023-04-04T15:15:07.653
Buffer Overflow vulnerabilty found in Nginx NJS v.0feca92 allows a remote attacker to execute arbitrary code via the njs_module_read in the njs_module.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nginx/njs/issues/187" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:2019-06-27:*:*:*:*:*:*:*", "matchCriteriaId": "76C92D85-F51F-4CD4-8DC4-BD4428A3C0E1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/nginx/njs/issues/187
[ "Exploit", "Issue Tracking" ]
github.com
[ "nginx", "njs" ]
# env ubuntu 18.04 njs 0feca92 gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1) # bug So, actually this is a logic bug, happened under an really interesting circumstance. the buggy function is the njs_module_read in the file njs_module.c ```c if (fstat(fd, &sb) == -1) { goto fail; } text...
Heap based buffer overflow in njs_module.c
https://api.github.com/repos/nginx/njs/issues/187/comments
2
2019-06-29T03:51:34Z
2024-05-29T06:53:25Z
https://github.com/nginx/njs/issues/187
462,261,788
187
CVE-2020-19695
2023-04-04T15:15:07.747
Buffer Overflow found in Nginx NJS allows a remote attacker to execute arbitrary code via the njs_object_property parameter of the njs/njs_vm.c function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nginx:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A4B578-8508-4F14-AF9A-8C6AF2CB12C6", "versionEndExcluding": "0.3.4", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/nginx/njs/issues/188
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
# env ubuntu 18.04 njs 0feca92 gcc version 7.4.0 (Ubuntu 7.4.0-1ubuntu1~18.04.1) built with ASAN on # bug ```javascript > (1..__proto__.length = '1', Array.prototype.slice.call(1, 0, 2)).toString() ASAN:SIGSEGV ================================================================= ==13918==ERROR: AddressSanitize...
Array elements left uninitialized in Array.prototype.slice() for primitive this values.
https://api.github.com/repos/nginx/njs/issues/188/comments
5
2019-07-03T02:04:01Z
2019-07-03T14:22:16Z
https://github.com/nginx/njs/issues/188
463,508,475
188
CVE-2020-23258
2023-04-04T15:15:08.303
An issue found in Jsish v.3.0.11 allows a remote attacker to cause a denial of service via the Jsi_ValueIsNumber function in ./src/jsiValue.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pcmacdon/jsish/issues/12" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://jsish.org/fossil/jsi2/tktview?name=2ba1d89d32" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "DC1BDF14-06F9-4F4F-86E9-CAC99C31A7BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/pcmacdon/jsish/issues/12
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pcmacdon", "jsish" ]
DongzhuoZhao added on 2020-05-11 03:55:46: git version: 4603977ef0ffdaf3d0f641ff6a361aa26e36974d save follow testcase as .js format : var v1 = new Array((()=>"toString")(), []); v1.find(isFinite); run: ./jsimin poc.js Result: zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js Segmentation ...
Illegal memory dereference in isFiniteCmd
https://api.github.com/repos/pcmacdon/jsish/issues/12/comments
2
2020-05-11T15:54:15Z
2020-05-13T06:32:08Z
https://github.com/pcmacdon/jsish/issues/12
615,992,898
12
CVE-2020-23259
2023-04-04T15:15:08.340
An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the Jsi_Strlen function in the src/jsiChar.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pcmacdon/jsish/issues/13" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://jsish.org/fossil/jsi2/tktview?name=b6bb078e00" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E", "versionEndExcluding": null, "versionEndIncluding": "3.0.11", "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/13
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pcmacdon", "jsish" ]
DongzhuoZhao added on 2020-05-11 05:31:25: git version: 4603977ef0ffdaf3d0f641ff6a361aa26e36974d save follow testcase as .js format : new Array(- 256, 0, - 2.0).forEach(encodeURI); run: ./jsimin poc.js Result: zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js Segmentation fault (core dumpe...
Null pointer dereference in url_encode
https://api.github.com/repos/pcmacdon/jsish/issues/13/comments
1
2020-05-11T16:11:11Z
2020-05-11T23:41:23Z
https://github.com/pcmacdon/jsish/issues/13
616,004,519
13
CVE-2020-23260
2023-04-04T15:15:08.373
An issue found in Jsish v.3.0.11 and before allows an attacker to cause a denial of service via the StringReplaceCmd function in the src/jsiChar.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/pcmacdon/jsish/issues/14" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://jsish.org/fossil/jsi2/tktview?name=3e211e44b1" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "633EAFF5-6C2C-4EA3-8E68-C899A78ECC1E", "versionEndExcluding": null, "versionEndIncluding": "3.0.11", "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/14
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "pcmacdon", "jsish" ]
DongzhuoZhao added on 2020-05-11 03:19:36: git version: 4603977ef0ffdaf3d0f641ff6a361aa26e36974d save follow testcase as .js format : v0=/a/g; var v1="a"; (v1).replace(v0,isFinite); run: ./jsimin poc.js Result: zdz@ubuntu:~/jsish$ ./jsimin /home/zdz/debugBug/jsi/bug/poc.js Segmentation fault (core du...
Illegal memory dereference
https://api.github.com/repos/pcmacdon/jsish/issues/14/comments
2
2020-05-11T16:20:40Z
2020-05-13T07:03:14Z
https://github.com/pcmacdon/jsish/issues/14
616,010,782
14
CVE-2023-26991
2023-04-04T15:15:09.183
SWFTools v0.9.2 was discovered to contain a stack-use-after-scope in the swf_ReadSWF2 function in lib/rfxswf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/matthiaskramm/swftools/issues/196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### Env Ubuntu 18.04 clang 11.0 swfdump v0.9.2 a part of Swftools v0.9.2 ### Reproduce POC: [poc](https://github.com/yiliang-neo/POC/raw/main/swfdump/POC-swfdump-use-after-scope.swf) command line: ``` swfdump -D poc ``` ### Debug Info ``` ==13979==ERROR: AddressSanitizer: stack-use-after-scope on addre...
stack-use-after-scope exists in function swf_ReadSWF2 in lib/rfxswf.c
https://api.github.com/repos/swftools/swftools/issues/196/comments
0
2023-02-16T07:45:42Z
2023-03-13T07:41:33Z
https://github.com/swftools/swftools/issues/196
1,587,191,755
196
CVE-2023-27727
2023-04-09T20:15:56.650
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/nginx/njs/issues/617" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/nginx/njs/issues/617
[ "Exploit", "Issue Tracking" ]
github.com
[ "nginx", "njs" ]
Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js const v1 = EvalError(EvalError); Object.defineProperty(v1, "message", { configurable: true, set: EvalError }); delete v1.message; Eval...
SEGV src/njs_function.h:155:9 in njs_function_frame
https://api.github.com/repos/nginx/njs/issues/617/comments
0
2023-02-21T02:44:30Z
2023-02-28T06:16:14Z
https://github.com/nginx/njs/issues/617
1,592,691,159
617
CVE-2023-27728
2023-04-09T20:15:56.703
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/618" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/nginx/njs/issues/618
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js Object.defineProperty([], 'a', { configurable: true, enumerable: true, get: Object}); ``` Asan ``` ==31165==ERROR: AddressSanitizer: ...
SEGV src/njs_json.c in njs_dump_is_recursive
https://api.github.com/repos/nginx/njs/issues/618/comments
0
2023-02-21T02:46:42Z
2023-02-28T06:16:14Z
https://github.com/nginx/njs/issues/618
1,592,692,581
618
CVE-2023-27729
2023-04-09T20:15:56.740
Nginx NJS v0.7.10 was discovered to contain an illegal memcpy via the function njs_vmcode_return at src/njs_vmcode.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/619" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/nginx/njs/issues/619
[ "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
This is new one, different from another Poc will be upload later Asan ``` ==20795==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fd4936f313f bp 0x7ffd1d582440 sp 0x7ffd1d581bf8 T0) ==20795==The signal is caused by a WRITE memory access. ==20795==Hint: address points to the zero page. ...
illegal memcpy during njs_vmcode_return in src/njs_vmcode.c
https://api.github.com/repos/nginx/njs/issues/619/comments
0
2023-02-24T08:36:06Z
2023-03-04T01:12:48Z
https://github.com/nginx/njs/issues/619
1,598,176,339
619
CVE-2023-27730
2023-04-09T20:15:56.780
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/nginx/njs/issues/615" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:0.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2784ECC5-66FE-4666-9B7B-6DC080357DEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/nginx/njs/issues/615
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "nginx", "njs" ]
Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js const v1 = URIError(); v1.name = URIError(); URIError && v1; ``` Asan ``` ==21471==ERROR: AddressSanitizer: SEGV on unknown address...
SEGV src/njs_lvlhsh.c:176:16 in njs_lvlhsh_find
https://api.github.com/repos/nginx/njs/issues/615/comments
0
2023-02-21T02:38:22Z
2023-02-28T06:16:13Z
https://github.com/nginx/njs/issues/615
1,592,687,556
615
CVE-2023-29576
2023-04-11T21:15:30.510
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/844" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/844
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found SEGV bug in Ap4TrunAtom.h # BUG SEGV /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=a...
SEGV Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/844/comments
0
2023-03-14T12:42:26Z
2024-02-17T17:48:33Z
https://github.com/axiomatic-systems/Bento4/issues/844
1,623,402,397
844
CVE-2023-29574
2023-04-12T13:15:07.637
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/841" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/841
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp42avc # BUG out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=...
out-of-memory in mp42avc
https://api.github.com/repos/axiomatic-systems/Bento4/issues/841/comments
1
2023-03-14T02:40:15Z
2024-02-17T17:49:29Z
https://github.com/axiomatic-systems/Bento4/issues/841
1,622,623,759
841
CVE-2023-29580
2023-04-12T13:15:07.727
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yasm/yasm/issues/215" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/z...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/215
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./config...
SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create
https://api.github.com/repos/yasm/yasm/issues/215/comments
1
2023-03-31T07:56:32Z
2024-03-21T12:41:09Z
https://github.com/yasm/yasm/issues/215
1,648,868,122
215
CVE-2023-29571
2023-04-12T15:15:13.233
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/241" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/241
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_gc.c:190:11 in gc_sweep ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/poc6.zip ...
SEGV src/mjs_gc.c:190:11 in gc_sweep
https://api.github.com/repos/cesanta/mjs/issues/241/comments
0
2023-03-06T01:35:33Z
2023-03-06T01:35:33Z
https://github.com/cesanta/mjs/issues/241
1,610,494,409
241
CVE-2023-29581
2023-04-12T16:15:19.603
yasm 1.3.0.55.g101bc has a segmentation violation in the function delete_Token at modules/preprocs/nasm/nasm-pp.c. NOTE: although a libyasm application could become unavailable if this were exploited, the vendor's position is that there is no security relevance because there is either supposed to be input validation be...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186333" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/yasm/yasm/blob/master/SECURITY.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/216
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# SEGV yasm/modules/preprocs/nasm/nasm-pp.c in delete_Token ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ....
SEGV yasm/modules/preprocs/nasm/nasm-pp.c in delete_Token
https://api.github.com/repos/yasm/yasm/issues/216/comments
13
2023-03-31T08:02:18Z
2024-03-22T12:02:52Z
https://github.com/yasm/yasm/issues/216
1,648,877,295
216
CVE-2023-29573
2023-04-13T20:15:16.690
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/840" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/840
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp4info # BUG out-of-memory (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsani...
out-of-memory in mp4info
https://api.github.com/repos/axiomatic-systems/Bento4/issues/840/comments
0
2023-03-14T02:26:20Z
2024-02-17T17:08:01Z
https://github.com/axiomatic-systems/Bento4/issues/840
1,622,614,615
840
CVE-2023-29569
2023-04-14T12:15:07.770
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/239" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/239
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi...
SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww
https://api.github.com/repos/cesanta/mjs/issues/239/comments
0
2023-03-06T01:14:12Z
2023-03-06T01:14:12Z
https://github.com/cesanta/mjs/issues/239
1,610,480,695
239
CVE-2023-29575
2023-04-21T14:15:07.373
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory", "Vendor Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/842" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/842
[ "Exploit", "Issue Tracking", "Third Party Advisory", "Vendor Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp42aac # BUG out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42aac+0x4c44dd) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=...
out-of-memory in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/842/comments
1
2023-03-14T02:50:05Z
2024-02-17T17:52:59Z
https://github.com/axiomatic-systems/Bento4/issues/842
1,622,631,441
842
CVE-2023-29579
2023-04-24T13:15:07.440
yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the component yasm/yasm+0x43b466 in vsprintf. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/214" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/rea...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/214
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
# stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./conf...
stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf
https://api.github.com/repos/yasm/yasm/issues/214/comments
1
2023-03-30T13:06:13Z
2024-03-21T12:42:39Z
https://github.com/yasm/yasm/issues/214
1,647,586,741
214
CVE-2023-29582
2023-04-24T13:15:07.483
yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr1 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189601#c3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/217" }, { "source": "cve@mitre.org", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/217
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
# stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1 ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fra...
stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1
https://api.github.com/repos/yasm/yasm/issues/217/comments
1
2023-03-31T08:22:30Z
2024-03-22T11:56:45Z
https://github.com/yasm/yasm/issues/217
1,648,921,272
217
CVE-2023-29583
2023-04-24T13:15:07.523
yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr5 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/218" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/rea...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/yasm/yasm/issues/218
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
# stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5 ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fram...
stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5
https://api.github.com/repos/yasm/yasm/issues/218/comments
1
2023-03-31T08:27:44Z
2024-03-22T11:55:05Z
https://github.com/yasm/yasm/issues/218
1,648,929,873
218
CVE-2023-29570
2023-04-24T14:15:07.800
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/240" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/240
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2...
SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free
https://api.github.com/repos/cesanta/mjs/issues/240/comments
0
2023-03-06T01:27:09Z
2023-03-06T01:27:09Z
https://github.com/cesanta/mjs/issues/240
1,610,488,659
240
CVE-2023-30406
2023-04-24T22:15:09.627
Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component ecma_find_named_property at /base/ecma-helpers.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5058" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/jerryscript-project/jerryscript/issues/5058
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 1a2c04763aba49f52b1537acd3730098c873511c ###### Build platform Ubuntu 20.04.2 LTS (Linux 5.15.0-67-generic x86_64) ###### Build steps Describe how to build JerryScript. Give all the necessary details of the build (e.g., environment variables, command(s), profile, command line optio...
Segmentation fault in jerry
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5058/comments
5
2023-03-28T06:12:27Z
2023-04-26T19:22:43Z
https://github.com/jerryscript-project/jerryscript/issues/5058
1,643,268,712
5,058
CVE-2023-30408
2023-04-24T22:15:09.677
Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component build/bin/jerry.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5057" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/jerryscript-project/jerryscript/issues/5057
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
First of all, when reporting a bug, give the issue a descriptive title. In the body of the issue, optionally give a free-form text description of the bug. Give the context necessary for others to understand the problem. Then, provide information necessary to reproduce the bug. Omit sections that are irrelevant ...
Segmentation fault in jerry
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5057/comments
1
2023-03-27T09:25:43Z
2023-04-26T19:24:26Z
https://github.com/jerryscript-project/jerryscript/issues/5057
1,641,737,938
5,057
CVE-2023-30410
2023-04-24T22:15:09.743
Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5052" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/jerryscript-project/jerryscript/issues/5052
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 1a2c04763aba49f52b1537acd3730098c873511c ###### Build platform Name the build platform. E.g., copy the output of Ubuntu Lunar Lobster (development branch) (Linux 5.15.0-67-generic x86_64) ###### Build steps ```sh python3 tools/build.py --builddir=asan --compile-flag=-fno-omit-fram...
jerry crashed while running the following code.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5052/comments
1
2023-03-15T06:57:23Z
2023-04-26T19:26:13Z
https://github.com/jerryscript-project/jerryscript/issues/5052
1,624,874,619
5,052
CVE-2023-30414
2023-04-24T22:15:09.807
Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5051" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/jerryscript-project/jerryscript/issues/5051
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
the following js cause a segmentation fault in jerryscript. ``` function test(){ function f(){ var f = test(); h = f(); } return f; } let a = test(); c = a(); ```
segmentation fault in jerryscript
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5051/comments
2
2023-03-14T03:36:48Z
2023-04-26T19:28:39Z
https://github.com/jerryscript-project/jerryscript/issues/5051
1,622,665,090
5,051
CVE-2023-30402
2023-04-25T16:15:09.590
YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yasm/yasm/issues/206" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/yasm/yasm/issues/206
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
yasm heap buffer overflow I found a heap-buffer-overflow in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -s -o abc --force-strict $PoC Details ASAN report $./yasm -s ...
yasm heap buffer overflow
https://api.github.com/repos/yasm/yasm/issues/206/comments
1
2023-03-01T01:50:12Z
2024-03-22T11:53:56Z
https://github.com/yasm/yasm/issues/206
1,604,082,214
206
CVE-2021-23166
2023-04-25T19:15:09.140
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read and write local files on the server.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107687" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107687
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-23166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23166) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-23166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23166) **Component**: Core **Credits**: Nils Hamerlinck (Trob...
[SEC] CVE-2021-23166 - A sandboxing issue in Odoo Community 15.0 and...
https://api.github.com/repos/odoo/odoo/issues/107687/comments
0
2022-12-10T23:00:32Z
2022-12-10T23:00:33Z
https://github.com/odoo/odoo/issues/107687
1,489,087,046
107,687
CVE-2021-23176
2023-04-25T19:15:09.220
Improper access control in reporting engine of l10n_fr_fec module in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to extract accounting information via crafted RPC packets.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107682" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107682
[ "Issue Tracking", "Mitigation", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-23176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23176) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-23176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23176) **Component**: l10n_fr_fec **Credits**: Florent Mirieu...
[SEC] CVE-2021-23176 - Improper access control in reporting engine o...
https://api.github.com/repos/odoo/odoo/issues/107682/comments
0
2022-12-10T23:00:23Z
2022-12-10T23:00:24Z
https://github.com/odoo/odoo/issues/107682
1,489,086,881
107,682
CVE-2021-23178
2023-04-25T19:15:09.283
Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows attackers to validate online payments with a tokenized payment method that belongs to another user, causing the victim's payment method to be charged instead.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107690" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107690
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-23178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23178) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-23178](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23178) **Component**: Online Payment **Credits**: Parth Gajja...
[SEC] CVE-2021-23178 - Improper access control in Odoo Community 15....
https://api.github.com/repos/odoo/odoo/issues/107690/comments
0
2022-12-10T23:00:37Z
2022-12-10T23:00:38Z
https://github.com/odoo/odoo/issues/107690
1,489,087,135
107,690
CVE-2021-23186
2023-04-25T19:15:09.340
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to access and modify database contents of other tenants, in a multi-tenant system.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107688" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107688
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-23186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23186) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-23186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23186) **Component**: Core **Credits**: Nils Hamerlinck (Trob...
[SEC] CVE-2021-23186 - A sandboxing issue in Odoo Community 15.0 and...
https://api.github.com/repos/odoo/odoo/issues/107688/comments
0
2022-12-10T23:00:34Z
2022-12-10T23:00:34Z
https://github.com/odoo/odoo/issues/107688
1,489,087,076
107,688
CVE-2021-23203
2023-04-25T19:15:09.403
Improper access control in reporting engine of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to download PDF reports for arbitrary documents, via crafted requests.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107695" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:community:*:*:*", "matchCriteriaId": "4D952E47-04E1-4146-A3AA-3804A1AB52DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/odoo/odoo/issues/107695
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-23203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23203) **Affects**: Odoo 14.0 through 15.0 (Community and Enterprise Editions) **CVE ID**: [CVE-2021-23203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23203) **Component**: Report engine **Credits**: Tiffany Ch...
[SEC] CVE-2021-23203 - Improper access control in reporting engine o...
https://api.github.com/repos/odoo/odoo/issues/107695/comments
0
2022-12-10T23:00:46Z
2022-12-10T23:00:48Z
https://github.com/odoo/odoo/issues/107695
1,489,087,315
107,695
CVE-2021-26263
2023-04-25T19:15:09.470
Cross-site scripting (XSS) issue in Discuss app of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107693" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:14.0:*:*:*:community:*:*:*", "matchCriteriaId": "4D952E47-04E1-4146-A3AA-3804A1AB52DA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/odoo/odoo/issues/107693
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-26263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26263) **Affects**: Odoo 14.0 and 15.0 (Community and Enterprise Editions) **CVE ID**: [CVE-2021-26263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26263) **Component**: Discuss **Credits**: Theodoros Malachias, ...
[SEC] CVE-2021-26263 - Cross-site scripting (XSS) issue in Discuss a...
https://api.github.com/repos/odoo/odoo/issues/107693/comments
0
2022-12-10T23:00:43Z
2022-12-10T23:00:44Z
https://github.com/odoo/odoo/issues/107693
1,489,087,216
107,693
CVE-2021-26947
2023-04-25T19:15:09.530
Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via a crafted link.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107694" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107694
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26947) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-26947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26947) **Component**: Core **Credits**: Nils Hamerlinck (Trob...
[SEC] CVE-2021-26947 - Cross-site scripting (XSS) issue Odoo Communi...
https://api.github.com/repos/odoo/odoo/issues/107694/comments
0
2022-12-10T23:00:44Z
2022-12-10T23:00:45Z
https://github.com/odoo/odoo/issues/107694
1,489,087,256
107,694
CVE-2021-44460
2023-04-25T19:15:09.600
Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows users with deactivated accounts to access the system with the deactivated account and any permission it still holds, via crafted RPC requests.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107685" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25", "versionEndExcluding": null, "versionEndIncluding": "13.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107685
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-44460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44460) **Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-44460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44460) **Component**: Core **Credits**: Xavier Morel Imprope...
[SEC] CVE-2021-44460 - Improper access control in Odoo Community 13....
https://api.github.com/repos/odoo/odoo/issues/107685/comments
0
2022-12-10T23:00:28Z
2022-12-10T23:00:29Z
https://github.com/odoo/odoo/issues/107685
1,489,086,977
107,685
CVE-2021-44461
2023-04-25T19:15:09.670
Cross-site scripting (XSS) issue in Accounting app of Odoo Enterprise 13.0 through 15.0, allows remote attackers who are able to control the contents of accounting journal entries to inject arbitrary web script in the browser of a victim.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107686" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "D3FA7C86-7FC1-4310-9945-EE9265577C5D", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclu...
https://github.com/odoo/odoo/issues/107686
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-44461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44461) **Affects**: Odoo 13.0 to 15.0 (Enterprise Edition) **CVE ID**: [CVE-2021-44461](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44461) **Component**: Accounting (account_accountant) Cross-site scripting (XSS...
[SEC] CVE-2021-44461 - Cross-site scripting (XSS) issue in Accountin...
https://api.github.com/repos/odoo/odoo/issues/107686/comments
0
2022-12-10T23:00:30Z
2022-12-10T23:00:31Z
https://github.com/odoo/odoo/issues/107686
1,489,087,009
107,686
CVE-2021-44465
2023-04-25T19:15:09.727
Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107692" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25", "versionEndExcluding": null, "versionEndIncluding": "13.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107692
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-44465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44465) **Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-44465](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44465) **Component**: Website Mail **Credits**: Swapnesh Shah...
[SEC] CVE-2021-44465 - Improper access control in Odoo Community 13....
https://api.github.com/repos/odoo/odoo/issues/107692/comments
0
2022-12-10T23:00:41Z
2022-12-10T23:00:42Z
https://github.com/odoo/odoo/issues/107692
1,489,087,191
107,692
CVE-2021-44476
2023-04-25T19:15:09.783
A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files.
{ "cvssMetricV2": null, "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", ...
[ { "source": "security@odoo.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/odoo/odoo/issues/107684" }, { "source": "security@odoo.com", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5399" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C5B912BD-1FB4-418A-9CE3-FBE0903D70BA", "versionEndExcluding": null, "versionEndIncluding": "15.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/107684
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - [CVE-2021-44476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44476) **Affects**: Odoo 15.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2021-44476](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44476) **Component**: Core **Credits**: Toufik Ben Jaa A san...
[SEC] CVE-2021-44476 - A sandboxing issue in Odoo Community 15.0 and...
https://api.github.com/repos/odoo/odoo/issues/107684/comments
0
2022-12-10T23:00:26Z
2022-12-10T23:00:27Z
https://github.com/odoo/odoo/issues/107684
1,489,086,933
107,684