cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2019-20014
2019-12-27T01:15:13.587
An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
CVE-2019-20015
2019-12-27T01:15:13.647
An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
CVE-2019-20021
2019-12-27T02:15:10.797
A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/315
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
A crafted input will lead to crash in p_mach.cpp at UPX 3.95(latest version,git clone from branch devel) Triggered by ./upx.out -d -f POC OS: Ubuntu 18.04.3 LTS CPU architecture: x86_64 Poc [002](https://github.com/gutiniao/afltest/blob/master/002) The ASAN information is as follows: ``` ./upx.out ...
There is a heap-buffer-overflow in the canUnpack function of p_mach.cpp:1539
https://api.github.com/repos/upx/upx/issues/315/comments
4
2019-11-14T03:04:37Z
2021-09-12T01:45:32Z
https://github.com/upx/upx/issues/315
522,594,596
315
CVE-2019-20022
2019-12-27T02:15:10.873
An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/108" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5CB650-56E4-4DF9-9310-080C174E1528", "versionEndExcluding": "1.8.3", "versionEndIncluding": null, "versionSt...
https://github.com/saitoha/libsixel/issues/108
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
A crafted input will lead to crash in frompnm.c at libsixel 1.8.2. Triggered by: ./img2sixel 004-SEGV-load-pnm288 Poc: [004-SEGV-load-pnm288](https://github.com/gutiniao/afltest/blob/master/004-SEGV-load-pnm288) The gdb debug info: ``` # gdb ./img2sixel \GNU gdb (Ubuntu 8.1-0ubuntu3.2) 8.1.0.20180409-g...
Segmentation fault (ASAN: SEGV on unknown address) in the load_pnm function of frompnm.c:288
https://api.github.com/repos/saitoha/libsixel/issues/108/comments
2
2019-12-11T08:22:08Z
2019-12-27T08:22:37Z
https://github.com/saitoha/libsixel/issues/108
536,213,002
108
CVE-2019-20023
2019-12-27T02:15:10.920
A memory leak was discovered in image_buffer_resize in fromsixel.c in libsixel 1.8.4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/120" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1F3897-870A-4F82-896A-EBE9581C656A", "versionEndExcluding": "1.8.4", "versionEndIncluding": null, "versionSt...
https://github.com/saitoha/libsixel/issues/120
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
A crafted input will lead to crash in frompnm.c at libsixel 1.8.3.(git from the [branch](https://github.com/saitoha/libsixel/tree/release-1.8) ) Triggered by: ./img2sixel 000-memleak-rpl_malloc Poc: [000-memleak-rpl_malloc](https://github.com/gutiniao/afltest/blob/master/000-memleak-rpl_malloc) The ASAN in...
A memory leaks issue in image_buffer_resize at fromsixel.c:293
https://api.github.com/repos/saitoha/libsixel/issues/120/comments
5
2019-12-18T05:03:40Z
2020-01-03T01:33:53Z
https://github.com/saitoha/libsixel/issues/120
539,453,569
120
CVE-2019-20024
2019-12-27T02:15:11.000
A heap-based buffer overflow was discovered in image_buffer_resize in fromsixel.c in libsixel before 1.8.4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/121" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF1F3897-870A-4F82-896A-EBE9581C656A", "versionEndExcluding": "1.8.4", "versionEndIncluding": null, "versionSt...
https://github.com/saitoha/libsixel/issues/121
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
A crafted input will lead to crash in frompnm.c at libsixel 1.8.3.(git from the [branch](https://github.com/saitoha/libsixel/tree/release-1.8)) Triggered by: ./img2sixel 001-heap-- Poc: [001-heap--](https://github.com/gutiniao/afltest/blob/master/001-heap--) The ASAN info: ``` # ./img2sixel 001-heap-- ...
A heap-buffer-overflow in image_buffer_resize at fromsixel.c:308
https://api.github.com/repos/saitoha/libsixel/issues/121/comments
3
2019-12-18T05:10:27Z
2019-12-27T08:19:23Z
https://github.com/saitoha/libsixel/issues/121
539,455,360
121
CVE-2019-20051
2019-12-27T22:15:11.347
A floating-point exception was discovered in PackLinuxElf::elf_hash in p_lx_elf.cpp in UPX 3.95. The vulnerability causes an application crash, which leads to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/313" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/313
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
A crafted input will lead to crash in p_lx_elf.cpp.cpp at UPX 3.95(latest version,git clone from master) Triggered by ./upx.out -d -f POC OS: Ubuntu 18.04.3 LTS CPU architecture: x86_64 Poc [004](https://github.com/gutiniao/afltest/blob/master/004) The ASAN information is as follows: ``` ./upx.out ...
Floating-point exception abort (DoS) in PackLinuxElf::elf_hash() of p_lx_elf.cpp:4569
https://api.github.com/repos/upx/upx/issues/313/comments
3
2019-11-13T10:02:39Z
2020-01-16T11:40:04Z
https://github.com/upx/upx/issues/313
522,091,065
313
CVE-2019-20053
2019-12-27T22:15:11.923
An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/314
[ "Exploit", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
A crafted input will lead to crash in p_mach.cpp at UPX 3.95(latest version,git clone from branch devel) Triggered by ./upx.out -d -f POC OS: Ubuntu 18.04.3 LTS CPU architecture: x86_64 Poc [001](https://github.com/gutiniao/afltest/blob/master/001) The ASAN information is as follows: ``` ./upx.out ...
Segmentation fault (ASAN: SEGV on unknown address) in the PackMachBase<N_Mach::MachClass_64<N_BELE_CTP::LEPolicy> >::canUnpack() function of p_mach.cpp:1539
https://api.github.com/repos/upx/upx/issues/314/comments
2
2019-11-14T01:57:00Z
2020-01-16T11:39:42Z
https://github.com/upx/upx/issues/314
522,576,017
314
CVE-2019-20056
2019-12-29T19:15:11.167
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has an assertion failure in stbi__shiftsigned.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "62B321FB-09DA-46F1-B7BE-4B8AAE636D18", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/saitoha/libsixel/issues/126
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
stbi__shiftsigned has assertion which can be triggered by user supplied image file. ![Screen Shot 2019-12-29 at 9 38 06 PM](https://user-images.githubusercontent.com/20929895/71557651-ed631f00-2a83-11ea-94a3-8f46f8b1ae7b.png) poc: [poc.zip](https://github.com/saitoha/libsixel/files/4008085/poc.zip) result: ...
assertion failure in stbi__shiftsigned in stb_image.h
https://api.github.com/repos/saitoha/libsixel/issues/126/comments
2
2019-12-29T13:43:51Z
2020-01-03T01:32:36Z
https://github.com/saitoha/libsixel/issues/126
543,403,783
126
CVE-2019-20090
2019-12-30T04:15:11.030
An issue was discovered in Bento4 1.5.1.0. There is a use-after-free in AP4_Sample::GetOffset in Core/Ap4Sample.h when called from Ap4LinearReader.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/461" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/461
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
./mp42ts $poc out poc [test-002.zip](https://github.com/axiomatic-systems/Bento4/files/3938643/test-002.zip) asan output ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts overflows/test-002.mp4-double_free-idx\:0xffffffff-0x0 out =====================================================...
use after free in Ap4Sample.h
https://api.github.com/repos/axiomatic-systems/Bento4/issues/461/comments
0
2019-12-09T08:53:39Z
2019-12-09T08:53:39Z
https://github.com/axiomatic-systems/Bento4/issues/461
534,780,352
461
CVE-2019-20091
2019-12-30T04:15:11.123
An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/462" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/462
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
./mp42ts $poc out poc [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/3938679/poc1.zip) [poc2.zip](https://github.com/axiomatic-systems/Bento4/files/3938680/poc2.zip) asan output 1 ``` root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts crashes/test-001.mp4-signalb-0x0 out ...
2 segv in mp42ts
https://api.github.com/repos/axiomatic-systems/Bento4/issues/462/comments
0
2019-12-09T09:00:42Z
2019-12-09T09:00:42Z
https://github.com/axiomatic-systems/Bento4/issues/462
534,783,741
462
CVE-2019-20094
2019-12-30T04:15:11.327
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_init_frame at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
img2sixel -I $POC [smile.zip](https://github.com/saitoha/libsixel/files/3999231/smile.zip) asan output ``` root@ubuntu:/home/tim/libsixel/converters# ../../libsixel-asan/converters/img2sixel -I overflows/smile.gif-out_of_bound-idx\:0xa34-0x0 ================================================================= ...
heap overflow in fromgif.c:250
https://api.github.com/repos/saitoha/libsixel/issues/125/comments
4
2019-12-25T00:03:38Z
2020-01-03T01:32:47Z
https://github.com/saitoha/libsixel/issues/125
542,223,529
125
CVE-2019-20140
2019-12-30T17:15:20.560
An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/122
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.4 OS : Ubuntu 18.04 configured with: libcurl: yes libpng: yes libjpeg: yes gdk-pixbuf2: no GD: no There is a heap-buffer-overflow in gif_out_code at fromgif.c:278 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com...
heap-buffer-overflow in gif_out_code at fromgif.c:278
https://api.github.com/repos/saitoha/libsixel/issues/122/comments
5
2019-12-22T13:23:47Z
2020-01-03T01:33:42Z
https://github.com/saitoha/libsixel/issues/122
541,450,421
122
CVE-2019-20159
2019-12-31T00:15:12.243
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory leak in dinf_New() in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1321" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-memory-leak ``` POC file: https://github.com/Clingto/P...
AddressSanitizer: a memory leak of dinf_New()
https://api.github.com/repos/gpac/gpac/issues/1321/comments
2
2019-10-28T16:03:11Z
2020-01-08T12:43:28Z
https://github.com/gpac/gpac/issues/1321
513,400,465
1,321
CVE-2019-20160
2019-12-31T00:15:12.337
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a stack-based buffer overflow in the function av1_parse_tile_group() in media_tools/av_parsers.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1334" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1334
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-av1_parse_tile_group ``` POC file: https://...
AddressSanitizer: stack-buffer-overflow in av1_parse_tile_group media_tools/av_parsers.c:3845
https://api.github.com/repos/gpac/gpac/issues/1334/comments
2
2019-11-09T11:22:06Z
2020-01-08T12:45:14Z
https://github.com/gpac/gpac/issues/1334
520,394,957
1,334
CVE-2019-20161
2019-12-31T00:15:12.417
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1320" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1320
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-ReadGF_IPMPX_WatermarkingInit ``` POC file: https://gi...
AddressSanitizer: heap-buffer-overflow in ReadGF_IPMPX_WatermarkingInit at ipmpx_code.c:1517
https://api.github.com/repos/gpac/gpac/issues/1320/comments
2
2019-10-28T15:50:52Z
2020-01-08T12:43:16Z
https://github.com/gpac/gpac/issues/1320
513,392,746
1,320
CVE-2019-20162
2019-12-31T00:15:12.507
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function gf_isom_box_parse_ex() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1327" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1327
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_parse_ex ``` POC file: https://...
ERROR: AddressSanitizer: heap-buffer-overflow in gf_isom_box_parse_ex isomedia/box_funcs.c:189
https://api.github.com/repos/gpac/gpac/issues/1327/comments
2
2019-11-09T11:12:14Z
2020-01-08T12:43:37Z
https://github.com/gpac/gpac/issues/1327
520,392,881
1,327
CVE-2019-20163
2019-12-31T00:15:12.587
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_odf_avc_cfg_write_bs() in odf/descriptors.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1335" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1335
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_odf_avc_cfg_write_bs ``` POC file: https...
AddressSanitizer: NULL pointer dereference in gf_odf_avc_cfg_write_bs odf/descriptors.c:567
https://api.github.com/repos/gpac/gpac/issues/1335/comments
2
2019-11-09T11:23:01Z
2020-01-08T12:45:23Z
https://github.com/gpac/gpac/issues/1335
520,395,160
1,335
CVE-2019-20164
2019-12-31T00:15:12.667
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_box_del() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1332" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1332
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_del ``` POC file: https://githu...
AddressSanitizer: NULL pointer dereference (use-after-free ) in gf_isom_box_del isomedia/box_funcs.c:1500
https://api.github.com/repos/gpac/gpac/issues/1332/comments
2
2019-11-09T11:19:52Z
2022-01-26T08:36:22Z
https://github.com/gpac/gpac/issues/1332
520,394,510
1,332
CVE-2019-20165
2019-12-31T00:15:12.743
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function ilst_item_Read() in isomedia/box_code_apple.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1338" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1338
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello, I found a similar issue but I am not sure they are the same. https://github.com/gpac/gpac/issues/1263 System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make...
ERROR: AddressSanitizer: NULL pointer dereference in ilst_item_Read isomedia/box_code_apple.c:119
https://api.github.com/repos/gpac/gpac/issues/1338/comments
4
2019-11-09T12:06:24Z
2020-01-08T12:45:38Z
https://github.com/gpac/gpac/issues/1338
520,405,629
1,338
CVE-2019-20166
2019-12-31T00:15:12.837
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_dump() in isomedia/box_dump.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1331" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1331
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_dump ``` POC file: https://github.c...
AddressSanitizer: NULL pointer dereference in gf_isom_dump isomedia/box_dump.c:133
https://api.github.com/repos/gpac/gpac/issues/1331/comments
2
2019-11-09T11:18:44Z
2020-01-08T12:44:45Z
https://github.com/gpac/gpac/issues/1331
520,394,250
1,331
CVE-2019-20167
2019-12-31T00:15:12.930
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function senc_Parse() in isomedia/box_code_drm.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1330" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1330
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-senc_Parse ``` POC file: https://github.com...
AddressSanitizer: NULL pointer dereference in senc_Parse isomedia/box_code_drm.c:1378
https://api.github.com/repos/gpac/gpac/issues/1330/comments
2
2019-11-09T11:17:12Z
2020-01-08T12:44:20Z
https://github.com/gpac/gpac/issues/1330
520,393,923
1,330
CVE-2019-20168
2019-12-31T00:15:13.007
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function gf_isom_box_dump_ex() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1333" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1333
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_dump_ex ``` POC file: https://g...
AddressSanitizer: heap-use-after-free in gf_isom_box_dump_ex isomedia/box_funcs.c:1734
https://api.github.com/repos/gpac/gpac/issues/1333/comments
4
2019-11-09T11:21:05Z
2020-01-16T22:33:39Z
https://github.com/gpac/gpac/issues/1333
520,394,786
1,333
CVE-2019-20169
2019-12-31T00:15:13.087
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function trak_Read() in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1329" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1329
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-trak_Read ``` POC file: https://github.com/...
AddressSanitizer: heap-use-after-free in trak_Read isomedia/box_code_base.c:7153
https://api.github.com/repos/gpac/gpac/issues/1329/comments
2
2019-11-09T11:15:44Z
2020-01-08T12:44:04Z
https://github.com/gpac/gpac/issues/1329
520,393,655
1,329
CVE-2019-20170
2019-12-31T00:15:13.213
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1328" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1328
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-GF_IPMPX_AUTH_Delete ``` POC file: https://...
AddressSanitizer: heap-use-after-free in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115
https://api.github.com/repos/gpac/gpac/issues/1328/comments
2
2019-11-09T11:14:15Z
2020-01-08T12:43:51Z
https://github.com/gpac/gpac/issues/1328
520,393,299
1,328
CVE-2019-20171
2019-12-31T00:15:13.307
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1337" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` Run Command: ``` $ MP4Box -diso -out /dev/null $POC-new-memory-leak ``` POC file: https://github.co...
AddressSanitizer: 2 memory leaks of metx_New(), abst_Read()
https://api.github.com/repos/gpac/gpac/issues/1337/comments
3
2019-11-09T12:00:28Z
2020-01-08T13:26:12Z
https://github.com/gpac/gpac/issues/1337
520,403,921
1,337
CVE-2019-20205
2020-01-02T14:16:36.253
libsixel 1.8.4 has an integer overflow in sixel_frame_resize in frame.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/127
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
In function `sixel_frame_resize`, `width` and `height` can be specified by user. Line 503 has an integer overflow. If `width` and `height` are very large numbers, allocation will fail. ![Screen Shot 2019-12-31 at 3 52 58 PM](https://user-images.githubusercontent.com/20929895/71614439-96c22600-2be6-11ea-94d1-ca094257...
integer overflow in sixel_frame_resize in frame.c
https://api.github.com/repos/saitoha/libsixel/issues/127/comments
2
2019-12-31T08:03:38Z
2020-01-03T01:32:26Z
https://github.com/saitoha/libsixel/issues/127
544,120,874
127
CVE-2019-20208
2020-01-02T14:16:36.363
dimC_Read in isomedia/box_code_3gpp.c in GPAC 0.8.0 has a stack-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1348" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1348
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough informa...
There is a stack-buffer-overflow in the dimC_Read function of box_code_3gpp.c:1000
https://api.github.com/repos/gpac/gpac/issues/1348/comments
2
2019-11-13T07:25:13Z
2020-01-08T12:45:44Z
https://github.com/gpac/gpac/issues/1348
522,010,451
1,348
CVE-2019-20330
2020-01-03T04:15:12.137
FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2526
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another 2 gadget (*) types reported related to JNDI access. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2019-20330 Original discoverer: UltramanGaia Fixed in: * 2.9.10.2 (`jackson-bom` version...
Block two more gadget types (ehcache/JNDI - CVE-2019-20330)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2526/comments
3
2019-10-25T20:55:07Z
2020-03-10T17:49:23Z
https://github.com/FasterXML/jackson-databind/issues/2526
512,716,891
2,526
CVE-2020-6609
2020-01-08T21:15:11.193
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/179#issue-544834443
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
CVE-2020-6610
2020-01-08T21:15:11.287
GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
CVE-2020-6611
2020-01-08T21:15:11.367
GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
CVE-2020-6612
2020-01-08T21:15:11.457
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
CVE-2020-6613
2020-01-08T21:15:11.537
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
CVE-2020-6614
2020-01-08T21:15:11.630
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
CVE-2020-6615
2020-01-08T21:15:11.693
GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*", "matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4 ...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments
7
2020-01-03T03:19:25Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/179
544,834,443
179
CVE-2020-6617
2020-01-08T23:15:10.410
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_int.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/864" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
https://github.com/nothings/stb/issues/864
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in `stbtt__cff_int` can be triggered by user supplied font file. <img width="679" alt="source" src="https://user-images.githubusercontent.com/20929895/71815033-1eada180-30b9-11ea-9420-97f3dc3bda43.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025824/poc.zip) result: ``` #0 ...
assertion failure in stbtt__cff_int in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/864/comments
2
2020-01-06T11:18:26Z
2021-07-04T10:08:08Z
https://github.com/nothings/stb/issues/864
545,675,704
864
CVE-2020-6618
2020-01-08T23:15:10.487
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__find_table.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/866" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
https://github.com/nothings/stb/issues/866
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
heap overflow in line 1281. `stbtt__find_table` doesn't check any out of bound access, so heap overflow can be triggered here. <img width="740" alt="poc" src="https://user-images.githubusercontent.com/20929895/71815229-c6c36a80-30b9-11ea-8d7a-89df9d788188.png"> poc: [poc.zip](https://github.com/nothings/stb/files/...
heap overflow in stbtt__find_table in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/866/comments
4
2020-01-06T11:24:48Z
2021-07-04T10:07:59Z
https://github.com/nothings/stb/issues/866
545,678,527
866
CVE-2020-6619
2020-01-08T23:15:10.567
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__buf_seek.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/863" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
https://github.com/nothings/stb/issues/863
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in `stbtt__buf_seek` can be triggered by user supplied font file. <img width="483" alt="source" src="https://user-images.githubusercontent.com/20929895/71814539-b01c1400-30b7-11ea-9ca5-f57cca5d3870.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025802/poc.zip) result: ``` gdb-...
assertion failure in stbtt__buf_seek in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/863/comments
2
2020-01-06T11:15:45Z
2021-07-04T10:08:13Z
https://github.com/nothings/stb/issues/863
545,674,533
863
CVE-2020-6620
2020-01-08T23:15:10.627
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_get8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/868" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
https://github.com/nothings/stb/issues/868
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
`stbtt__buf_get8` has heap overflow vulnerability. <img width="447" alt="source" src="https://user-images.githubusercontent.com/20929895/71815524-b52e9280-30ba-11ea-9864-da5063e978ef.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025840/poc.zip) result: ``` =================================...
heap overflow in stbtt__buf_get8 in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/868/comments
2
2020-01-06T11:29:19Z
2021-07-04T10:07:29Z
https://github.com/nothings/stb/issues/868
545,680,359
868
CVE-2020-6621
2020-01-08T23:15:10.677
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in ttUSHORT.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/867" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
https://github.com/nothings/stb/issues/867
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
`ttUSHORT` don't have any bound check, so heap overflow can be triggered. <img width="772" alt="souce0" src="https://user-images.githubusercontent.com/20929895/71815428-654fcb80-30ba-11ea-82f1-9749f205bc7b.png"> <img width="613" alt="source1" src="https://user-images.githubusercontent.com/20929895/71815431-67198f00...
heap overflow in ttUSHORT in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/867/comments
2
2020-01-06T11:27:04Z
2021-07-04T10:07:36Z
https://github.com/nothings/stb/issues/867
545,679,506
867
CVE-2020-6622
2020-01-08T23:15:10.737
stb stb_truetype.h through 1.22 has a heap-based buffer over-read in stbtt__buf_peek8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/869" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
https://github.com/nothings/stb/issues/869
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
heap overflow in `stbtt__buf_peek8`. <img width="427" alt="source" src="https://user-images.githubusercontent.com/20929895/71815599-f9219780-30ba-11ea-8b1c-249e637f5aed.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025847/poc.zip) result: ``` ===================================================...
heap overflow in stbtt__buf_peek8 in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/869/comments
2
2020-01-06T11:31:13Z
2021-07-04T10:07:23Z
https://github.com/nothings/stb/issues/869
545,681,061
869
CVE-2020-6623
2020-01-08T23:15:10.800
stb stb_truetype.h through 1.22 has an assertion failure in stbtt__cff_get_index.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/865" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_truetype.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CD78C93-4049-4174-B364-1D3843DE443F", "versionEndExcluding": null, "versionEndIncluding": "1.22", "versionStart...
https://github.com/nothings/stb/issues/865
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
assertion failure in stbtt__cff_get_index can be triggered by user supplied file. <img width="513" alt="source" src="https://user-images.githubusercontent.com/20929895/71815151-8106a200-30b9-11ea-9946-07171227db42.png"> poc: [poc.zip](https://github.com/nothings/stb/files/4025825/poc.zip) result: ``` #0 ...
assertion failure in stbtt__cff_get_index in stb_truetype.h
https://api.github.com/repos/nothings/stb/issues/865/comments
2
2020-01-06T11:20:15Z
2021-07-04T10:08:04Z
https://github.com/nothings/stb/issues/865
545,676,449
865
CVE-2020-6628
2020-01-09T02:15:13.433
Ming (aka libming) 0.4.8 has a heap-based buffer over-read in the function decompile_SWITCH() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/191
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
export ASAN_OPTIONS=allocator_may_return_null=1 ./swftopython $poc [segmentaion_fault_decompile_569-use_after_free-idx:0x1365-0x2.zip](https://github.com/libming/libming/files/4028582/segmentaion_fault_decompile_569-use_after_free-idx.0x1365-0x2.zip) asan output ``` root@ubuntu:/home/tim/libming/util# export ASA...
heap overflow in decompile_SWITCH
https://api.github.com/repos/libming/libming/issues/191/comments
0
2020-01-07T01:51:41Z
2020-01-07T01:51:41Z
https://github.com/libming/libming/issues/191
546,033,507
191
CVE-2020-6629
2020-01-09T02:15:13.527
Ming (aka libming) 0.4.8 has z NULL pointer dereference in the function decompileGETURL2() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
swftophp $poc [libming_decompile762poc-out_of_mem-idx:0xfcd-0x0.zip](https://github.com/libming/libming/files/4028435/libming_decompile762poc-out_of_mem-idx.0xfcd-0x0.zip) asan output ``` root@ubuntu:/home/tim/libming/util# ../../asan/libming/util/swftophp overflows/libming_decompile762poc-out_of_mem-idx\:0xf...
null pointer reference in decompileGETURL2
https://api.github.com/repos/libming/libming/issues/190/comments
0
2020-01-07T00:53:16Z
2020-01-07T00:53:16Z
https://github.com/libming/libming/issues/190
546,016,991
190
CVE-2020-6630
2020-01-09T02:15:13.590
An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_isom_get_media_data_size() in isomedia/isom_read.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1377" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1377
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ yes] I looked for a similar issue and couldn't find any. - [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ yes] I give en...
null pointer reference in gf_isom_get_media_data_size
https://api.github.com/repos/gpac/gpac/issues/1377/comments
1
2020-01-02T00:45:04Z
2020-01-08T15:42:17Z
https://github.com/gpac/gpac/issues/1377
544,416,874
1,377
CVE-2020-6631
2020-01-09T02:15:13.653
An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_m2ts_stream_process_pmt() in media_tools/m2ts_mux.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1378" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1378
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ yes] I looked for a similar issue and couldn't find any. - [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ yes] I give en...
null pointer reference in gf_m2ts_stream_process_pmt
https://api.github.com/repos/gpac/gpac/issues/1378/comments
2
2020-01-02T00:49:55Z
2020-01-17T15:09:51Z
https://github.com/gpac/gpac/issues/1378
544,417,280
1,378
CVE-2020-7058
2020-01-15T07:15:12.927
data_input.php in Cacti 1.2.8 allows remote code execution via a crafted Input String to Data Collection -> Data Input Methods -> Unix -> Ping Host. NOTE: the vendor has stated "This is a false alarm.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3186" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Cacti/cacti/issues/3186
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Input validation error in data_input.php leads to Remote Code Execution via Input String (Script/Command) edit actions. By default, Cacti was installed with several Data Input Methods. Some of them was created using Script/Command input type. An attacker will be able to edit the Input String to in...
Critical vulnerability: Remote Code Execution via string/command type Input String
https://api.github.com/repos/Cacti/cacti/issues/3186/comments
19
2020-01-14T22:53:20Z
2020-08-23T00:04:30Z
https://github.com/Cacti/cacti/issues/3186
549,865,124
3,186
CVE-2020-7106
2020-01-16T04:15:11.697
Cacti 1.2.8 has stored XSS in data_sources.php, color_templates_item.php, graphs.php, graph_items.php, lib/api_automation.php, user_admin.php, and user_group_admin.php, as demonstrated by the description parameter in data_sources.php (a raw string from the database that is displayed by $header to trigger the XSS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB72E0C8-BC84-4F75-A844-9D9D41031118", "versionEndExcluding": "1.2.9", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/Cacti/cacti/issues/3191
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Data source input validation error leads to Stored XSS within Description after creating a device with Malicious code embedded in Description field. **To Reproduce** Steps to reproduce the behavior: 1. Navigate to Console -> Create -> New Device 2. In Description field, input script payload:...
Lack of escaping on some pages can lead to XSS exposure (CVE-2020-7106)
https://api.github.com/repos/Cacti/cacti/issues/3191/comments
21
2020-01-15T19:15:24Z
2020-06-30T12:34:01Z
https://github.com/Cacti/cacti/issues/3191
550,377,486
3,191
CVE-2020-7237
2020-01-20T05:15:11.687
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Cacti/cacti/issues/3201
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** An input validation error found in Boost Debug Log field leads to Remote Code Execution. **To Reproduce** Steps to reproduce the behavior: 1. Navigate to Console -> Configuration -> Settings -> Performance 2. In Boost Debug Log field, type in the payload: `--verbose; cat /etc/passwd > rce.t...
Remote Code Execution due to input validation failure in Performance Boost Debug Log (CVE-2020-7237)
https://api.github.com/repos/Cacti/cacti/issues/3201/comments
2
2020-01-19T06:04:29Z
2020-06-30T12:34:01Z
https://github.com/Cacti/cacti/issues/3201
551,872,554
3,201
CVE-2019-17357
2020-01-21T19:15:13.067
Cacti through 1.2.7 is affected by a graphs.php?template_id= SQL injection vulnerability affecting how template identifiers are handled when a string and id composite value are used to identify the template type and id. An authenticated attacker can exploit this to extract data from the database, or an unauthenticated ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4F5AE29-35EB-4B0E-8304-F5520AAE998B", "versionEndExcluding": null, "versionEndIncluding": "1.2.7", "versionStartExcluding":...
https://github.com/Cacti/cacti/issues/3025
[ "Patch", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** As reported by Eldar Marcussen of xen1thLabs there is a SQL injection vulnerability in Cacti's graphs.php. **Expected behavior** Cacti should be not contain SQL vunderabilities
When viewing graphs, some input variables are not properly checked (SQL injection possible)
https://api.github.com/repos/Cacti/cacti/issues/3025/comments
4
2019-10-12T19:46:24Z
2020-06-30T12:49:01Z
https://github.com/Cacti/cacti/issues/3025
506,229,820
3,025
CVE-2019-20421
2020-01-27T05:15:10.453
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/commit/a82098f4f90cd86297131b5663c3dec6a34470e8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E9A8822-0F6F-4561-81B3-38235F52116E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Exiv2/exiv2/issues/1011
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** An input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. **To Reproduce** Steps to reproduce the behaviour: excute 'build/bin/exiv2 Jp2Image_readMetadata_loop.poc' *...
An infinite loop and hang in Exiv2::Jp2Image::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/1011/comments
3
2019-09-30T12:02:01Z
2020-03-29T11:43:49Z
https://github.com/Exiv2/exiv2/issues/1011
500,231,156
1,011
CVE-2019-20440
2020-01-28T00:15:10.823
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the update API documentation feature of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20440-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/24
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Multiple reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manage...
Multiple Reflected Cross Site Scripting (XSS) in ''docName', 'version' and 'apiName' of created API document using XSS payload' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/24/comments
0
2020-01-20T09:44:04Z
2020-01-20T11:52:18Z
https://github.com/cybersecurityworks/Disclosed/issues/24
552,183,556
24
CVE-2019-20441
2020-01-28T00:15:10.883
An issue was discovered in WSO2 API Manager 2.6.0. A potential Stored Cross-Site Scripting (XSS) vulnerability has been identified in the 'implement phase' of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20441-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/23
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documentat...
Stored Cross Site Scripting (XSS) in ' HTTP POST request with a harmful request parameter for context' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/23/comments
0
2020-01-20T07:37:31Z
2020-01-20T09:42:10Z
https://github.com/cybersecurityworks/Disclosed/issues/23
552,119,549
23
CVE-2019-20442
2020-01-28T00:15:10.930
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in roleToAuthorize has been identified in the registry UI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20442-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/25
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in 'roleToAuthorize' variable | WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/25/comments
0
2020-01-20T11:16:47Z
2020-01-20T11:16:47Z
https://github.com/cybersecurityworks/Disclosed/issues/25
552,235,262
25
CVE-2019-20443
2020-01-28T00:15:10.993
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 Enterprise Integrator 6.5.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. A potential stored Cross-Site Scripting (XSS) vulnerability in mediaType has been identified in the registry UI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20443-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/26
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in 'mediaType' variable | WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/26/comments
0
2020-01-20T11:30:13Z
2020-01-20T11:30:13Z
https://github.com/cybersecurityworks/Disclosed/issues/26
552,242,400
26
CVE-2019-20434
2020-01-28T01:15:11.783
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in the Datasource creation page of the Management Console.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20434-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Multiple <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/DAS320/WSO2+Data+Analytics+Serv...
Multiple Reflected Cross Site Scripting (XSS) in WSO2 Product (Data Analytics Server Version 3.2.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/17/comments
0
2019-11-27T10:43:00Z
2019-11-27T10:43:00Z
https://github.com/cybersecurityworks/Disclosed/issues/17
529,263,538
17
CVE-2019-20435
2020-01-28T01:15:11.877
An issue was discovered in WSO2 API Manager 2.6.0. A reflected XSS attack could be performed in the inline API documentation editor page of the API Publisher by sending an HTTP GET request with a harmful docName request parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20435-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/Installing+via+the+Installer#Insta...
Reflected Cross Site Scripting (XSS) in WSO2 Product (WSO2 API Manager version 2.6.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/18/comments
0
2019-11-27T12:00:44Z
2019-11-29T10:45:12Z
https://github.com/cybersecurityworks/Disclosed/issues/18
529,302,954
18
CVE-2019-20436
2020-01-28T01:15:11.957
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. If there is a claim dialect configured with an XSS payload in the dialect URI, and a user picks up this dialect's URI and adds it as the service provider claim dialect while configuring the service provider,...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20436-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/19
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in WSO2 Product (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/19/comments
0
2019-11-29T10:51:10Z
2020-01-20T11:01:12Z
https://github.com/cybersecurityworks/Disclosed/issues/19
530,281,451
19
CVE-2019-20437
2020-01-28T01:15:12.037
An issue was discovered in WSO2 API Manager 2.6.0, WSO2 IS as Key Manager 5.7.0, and WSO2 Identity Server 5.8.0. When a custom claim dialect with an XSS payload is configured in the identity provider basic claim configuration, that payload gets executed, if a user picks up that dialect's URI as the provisioning claim i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20437-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/20
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://wso2.com/identity-and-access-management/#">WSO2 Identit...
Stored Cross Site Scripting (XSS) in "malicious dialect URI" on WSO2 Product - (WSO2 Identity Server version 5.7.0)
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/20/comments
0
2019-11-29T11:09:28Z
2019-11-29T12:08:12Z
https://github.com/cybersecurityworks/Disclosed/issues/20
530,289,708
20
CVE-2019-20438
2020-01-28T01:15:12.113
An issue was discovered in WSO2 API Manager 2.6.0. A potential stored Cross-Site Scripting (XSS) vulnerability has been identified in the inline API documentation editor page of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20438-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/22
[ "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Stored <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Document...
Stored Cross Site Scripting (XSS) in 'inline API documentation editor page' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/22/comments
0
2020-01-17T12:35:46Z
2020-01-17T12:35:46Z
https://github.com/cybersecurityworks/Disclosed/issues/22
551,391,114
22
CVE-2019-20439
2020-01-28T01:15:12.190
An issue was discovered in WSO2 API Manager 2.6.0. A potential Reflected Cross-Site Scripting (XSS) vulnerability has been identified in defining a scope in the "manage the API" page of the API Publisher.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-20439-wso2.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC168B6A-B15A-4C3B-A38D-C0B65F24F333", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/cybersecurityworks/Disclosed/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details: WSO2 Product Bug Report Bug Name: Reflected <a href="https://www.owasp.org/index.php/Testing_for_Reflected_Cross_site_scripting_(OTG-INPVAL-001)">Cross Site Scripting (XSS)</a> Product Name: <a href="https://wso2.com/">WSO2</a> Server: <a href="https://docs.wso2.com/display/AM260/WSO2+API+Manager+Documen...
Reflected Cross Site Scripting (XSS) in 'roles' | WSO2 API Manager version 2.6.0 | WSO2 Product
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/21/comments
0
2019-12-24T10:37:12Z
2020-01-17T12:17:16Z
https://github.com/cybersecurityworks/Disclosed/issues/21
542,083,754
21
CVE-2019-11251
2020-02-03T16:15:11.140
The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attac...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/87773" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E20ECB8-B503-4DB2-BCDB-D28E53523C9E", "versionEndExcluding": "1.13.11", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/87773
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in kubectl versions v1.13.10, v1.14.6, and v1.15.3. The issue is of a medium severity and upgrading of kubectl is encouraged to fix the vulnerability. **Am I vulnerable?** Run kubectl version --client and if it returns versions v1.13.10, v1.14.6, and v1.15.3, you are running a vuln...
CVE-2019-11251: kubectl cp symlink vulnerability
https://api.github.com/repos/kubernetes/kubernetes/issues/87773/comments
3
2020-02-03T15:12:22Z
2022-10-14T02:00:16Z
https://github.com/kubernetes/kubernetes/issues/87773
559,146,411
87,773
CVE-2016-7523
2020-02-06T14:15:10.737
coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "security@debian.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/22/2" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bug...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/ImageMagick/ImageMagick/issues/94
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537420
heap-buffer-overflow in coders/meta.c:496
https://api.github.com/repos/ImageMagick/ImageMagick/issues/94/comments
2
2016-01-24T01:29:08Z
2016-01-25T00:23:16Z
https://github.com/ImageMagick/ImageMagick/issues/94
128,365,381
94
CVE-2016-7524
2020-02-06T14:15:10.830
coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "security@debian.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/22/2" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bug...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/ImageMagick/ImageMagick/issues/96
[ "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537422
heap-buffer-overflow in coders/meta.c:465
https://api.github.com/repos/ImageMagick/ImageMagick/issues/96/comments
3
2016-01-24T01:29:30Z
2020-02-10T03:00:49Z
https://github.com/ImageMagick/ImageMagick/issues/96
128,365,398
96
CVE-2020-8811
2020-02-07T23:15:10.823
ajax/profile-picture-upload.php in Bludit 3.10.0 allows authenticated users to change other users' profile pictures.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1131" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "94D51A63-EB8D-4BE4-82B0-E877D79F0C18", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1131
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe This vulnerability allows authenticated users to change other user's profile pictures. ### Steps to reproduce the vulnerability 1. Tried to login via Administrator privilege. We found 3 accounts.  ![image](https://user-images.githubusercontent.com/60623594/73809507-076fea00-4806-11ea-979d-980be16df...
Security - Arbitrary Change Profile Picture
https://api.github.com/repos/bludit/bludit/issues/1131/comments
2
2020-02-05T04:06:25Z
2020-02-05T19:57:22Z
https://github.com/bludit/bludit/issues/1131
560,127,263
1,131
CVE-2020-8812
2020-02-07T23:15:10.933
Bludit 3.10.0 allows Editor or Author roles to insert malicious JavaScript on the WYSIWYG editor. NOTE: the vendor's perspective is that this is "not a bug.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1132" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.10.0:-:*:*:*:*:*:*", "matchCriteriaId": "9AE74D8D-8091-45BD-9DC4-C4212FF824F1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1132
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe This vulnerability allows Editor or Author roles could insert malicious JavaScript on the WYSIWYG editor. ### Steps to reproduce the vulnerability Affected in Bludit v3.10.0 1. Tried to login with username “admon2”, who is an Editor. Then, pressed the button. ![image](https://user-images.githubuse...
Security - Stored Cross Site Script
https://api.github.com/repos/bludit/bludit/issues/1132/comments
2
2020-02-05T04:14:38Z
2020-02-06T03:31:09Z
https://github.com/bludit/bludit/issues/1132
560,129,293
1,132
CVE-2020-8089
2020-02-10T16:15:14.267
Piwigo 2.10.1 is affected by stored XSS via the Group Name Field to the group_list page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1150" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://piwigo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1150
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Description: Piwigo version 2.10.1 is affected by stored cross site scripting vulnerability. This vulnerability exists in "Group Name" Field in "group_list" page. How to reproduce: 1. Login into the application. 2. Go to the "Users" -> "Groups" page from life navigation menu. 3. Click on "Add Group" button a...
Stored Cross-Site Scripting vulnerability in Piwigo CMS
https://api.github.com/repos/Piwigo/Piwigo/issues/1150/comments
1
2020-01-20T13:47:13Z
2020-03-25T14:32:53Z
https://github.com/Piwigo/Piwigo/issues/1150
552,310,420
1,150
CVE-2020-8840
2020-02-10T21:56:10.653
FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jac...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2620
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type reported related to JNDI access. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-8840 Original discoverer: @threedr3am Fixed in: * 2.9.10.3 (`jackson-bom` version `2.9...
Block one more gadget type (xbean-reflect/JNDI - CVE-2020-8840)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2620/comments
6
2020-02-09T22:50:59Z
2020-07-16T17:23:57Z
https://github.com/FasterXML/jackson-databind/issues/2620
562,253,349
2,620
CVE-2020-8813
2020-02-22T02:15:10.553
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPL...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00042.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D05824B-4E66-44CA-A862-0DDDB23C8C88", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Cacti/cacti/issues/3285
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Mohammad Askar of iSecurity has reported that graph_realtime.php prior to 1.2.10 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie if a guest user has the graph real-time privilege. **To Reproduce** Steps to reproduce the behavior: 1. Enable the gue...
When guest users have access to realtime graphs, remote code could be executed (CVE-2020-8813)
https://api.github.com/repos/Cacti/cacti/issues/3285/comments
3
2020-02-23T06:03:06Z
2020-06-30T12:30:28Z
https://github.com/Cacti/cacti/issues/3285
569,444,022
3,285
CVE-2020-9546
2020-03-02T04:15:10.843
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2631" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "29BC94E0-FEBC-4E86-825C-0101DC339852", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2631
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
(note: placeholder until verified/validated, fix provided) Another gadget type reported regarding a class of [TO BE ADDED]. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-9546 Reporters: three...
Block one more gadget type (shaded-hikari-config, CVE-2020-9546)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2631/comments
8
2020-02-27T21:17:02Z
2020-03-23T21:00:52Z
https://github.com/FasterXML/jackson-databind/issues/2631
572,364,748
2,631
CVE-2020-9547
2020-03-02T04:15:11.017
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2634" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F87CF67-6994-43F1-BEC3-DD7D122D0146", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2634
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another 2 gadget type reported regarding a classes of `ibatis-sqlmap` and `Anteros-Core` packages. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-9547, CVE-2020-9548 Reporters: threedr3am & V1ZkR...
Block two more gadget types (ibatis-sqlmap, anteros-core; CVE-2020-9547 / CVE-2020-9548)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2634/comments
8
2020-03-01T01:02:31Z
2020-04-08T02:18:13Z
https://github.com/FasterXML/jackson-databind/issues/2634
573,448,185
2,634
CVE-2019-14892
2020-03-02T17:15:17.813
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0729" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2462
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding a class of `commons-configuration` (and later `commons-configuration2`) package(s) Mitre id: not yet allocated Reporter: @ybhou1993 Fixed in: * 2.9.10 and later * 2.8.11.5 * 2.6.7.3 * does not affect 2.10.0 and later ----- (*) See https://medium.com/@cowtownco...
Block two more gadget types (commons-configuration/-2)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2462/comments
9
2019-09-19T06:22:53Z
2020-02-10T22:12:43Z
https://github.com/FasterXML/jackson-databind/issues/2462
495,597,365
2,462
CVE-2019-14893
2020-03-02T21:15:17.520
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0729" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.re...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF323F3D-B2A4-41E7-94F9-5539C9B7025E", "versionEndExcluding": "2.8.11.5", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2469
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding a class of `xalan`. Mitre id: not yet allocated Reporter: @ybhou1993 (via #2462 originally) * 2.9.10 * 2.8.11.5 * does not affect 2.10.0 and later ----- (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 ...
Block one more gadget type (xalan2)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2469/comments
1
2019-09-20T06:20:34Z
2020-02-10T22:13:16Z
https://github.com/FasterXML/jackson-databind/issues/2469
496,168,396
2,469
CVE-2020-10251
2020-03-10T04:15:11.533
In ImageMagick 7.0.9, an out-of-bounds read vulnerability exists within the ReadHEICImageByID function in coders\heic.c. It can be triggered via an image with a width or height value that exceeds the actual size of the image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1859" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5A044015-839F-4D63-A002-1F7806C41365", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/ImageMagick/ImageMagick/issues/1859
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
ImageMagick "ReadHEICImageByID()" Out-of-bounds read vulnerability
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1859/comments
6
2020-03-03T19:01:32Z
2020-06-17T12:24:04Z
https://github.com/ImageMagick/ImageMagick/issues/1859
574,875,269
1,859
CVE-2020-10672
2020-03-18T22:15:12.313
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2659" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2659
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.aries.transaction.jms`. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. CVE id: CVE-2020-10672 Reporter: Srikanth Ramu, threedr3am'follower, (concurr...
Block one more gadget type (aries.transaction.jms, CVE-2020-10672)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2659/comments
0
2020-03-16T00:52:40Z
2020-03-26T16:33:53Z
https://github.com/FasterXML/jackson-databind/issues/2659
581,901,777
2,659
CVE-2020-10673
2020-03-18T22:15:12.407
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2660" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FB021E3-0529-4F99-B880-66FDAC2F889D", "versionEndExcluding": "2.6.7.4", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2660
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding a class of `caucho-quercus` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-10673 Reporter: threedr3am'follower Fix is included in: * 2.9.10...
Block one more gadget type (caucho-quercus, CVE-2020-10673)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2660/comments
1
2020-03-18T01:32:04Z
2021-02-23T19:52:40Z
https://github.com/FasterXML/jackson-databind/issues/2660
583,400,227
2,660
CVE-2020-10678
2020-03-19T15:15:13.263
In Octopus Deploy before 2020.1.5, for customers running on-premises Active Directory linked to their Octopus server, an authenticated user can leverage a bug to escalate privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6258" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "307000A9-1CD2-46AF-A5E1-E1BAC206F200", "versionEndExcluding": "2020.1.5", "versionEndIncluding": null, "versionSt...
https://github.com/OctopusDeploy/Issues/issues/6258
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
For customers running on premise Active Directory linked to their Octopus server an authenticated user can leverage a bug to escalate privileges. This issue has also been fixed in: - Octopus Server: 2019.9.15 https://github.com/OctopusDeploy/Issues/issues/6254 - Octopus Server: 2019.12.8 https://github.com/Octop...
On premise Active Directory based privilege escalation
https://api.github.com/repos/OctopusDeploy/Issues/issues/6258/comments
3
2020-03-17T01:40:34Z
2020-04-01T00:40:48Z
https://github.com/OctopusDeploy/Issues/issues/6258
582,694,749
6,258
CVE-2019-20628
2020-03-24T19:15:20.947
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1269
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found an UAF on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_uaf_mpegts.c:2183 Command: MP4Box -info $PoC ASAN says: ~~~ ==12341==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300000efb0 at pc 0x00000098190d bp 0...
Use After Free (mpegts.c:2183)
https://api.github.com/repos/gpac/gpac/issues/1269/comments
1
2019-07-06T00:10:37Z
2019-07-07T15:59:17Z
https://github.com/gpac/gpac/issues/1269
464,799,448
1,269
CVE-2019-20629
2020-03-24T19:15:21.007
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1264
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master) due to a heap buffer overflow on function gf_m2ts_process_pmt. PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_gf_m2ts_process_pmt Command: MP4Box -info $PoC ASAN says: ~~~ ==19178==ERROR: AddressSanitizer: he...
SEGV (heap-buffer-overflow) on gf_m2ts_process_pmt
https://api.github.com/repos/gpac/gpac/issues/1264/comments
1
2019-07-05T22:57:04Z
2019-07-07T15:57:21Z
https://github.com/gpac/gpac/issues/1264
464,791,707
1,264
CVE-2019-20630
2020-03-24T19:15:21.070
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1268
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a buffer overflow on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_BS_ReadByte Command: MP4Box -info $PoC ASAN says: ~~~ ==27934==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b00000a236 at pc 0x0000004...
heap-buffer-overflow on BS_ReadByte
https://api.github.com/repos/gpac/gpac/issues/1268/comments
1
2019-07-06T00:10:13Z
2019-07-07T15:59:28Z
https://github.com/gpac/gpac/issues/1268
464,799,415
1,268
CVE-2019-20631
2020-03-24T19:15:21.133
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_list_count in utils/list.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1270" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1270
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found an UAF on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_list_count Command: MP4Box -info $PoC ASAN says: ~~~ ==19963==ERROR: AddressSanitizer: SEGV on unknown address 0x00047fff8001 (pc 0x00000047a43d bp 0x6080000...
SEGV on unknown address on gf_list_count
https://api.github.com/repos/gpac/gpac/issues/1270/comments
1
2019-07-06T00:11:01Z
2019-07-07T16:00:40Z
https://github.com/gpac/gpac/issues/1270
464,799,484
1,270
CVE-2019-20632
2020-03-24T19:15:21.180
An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_odf_delete_descriptor in odf/desc_private.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1271" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1271
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_odf_delete_descriptor Command: MP4Box -diso $PoC ASAN says: ~~~ ==26490==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000ff00 (pc 0x000000c3ef6d ...
SEGV on unknown addres on gf_odf_delete_descriptor
https://api.github.com/repos/gpac/gpac/issues/1271/comments
1
2019-07-06T00:25:31Z
2019-07-07T16:01:07Z
https://github.com/gpac/gpac/issues/1271
464,800,676
1,271
CVE-2020-10968
2020-03-26T13:15:12.970
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.aoju.bus.proxy.provider.remoting.RmiProvider (aka bus-proxy).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2662" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2662
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding a class of `aoju/bus-proxy` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-10968 Reporter: XuYuanzhen (of Alibaba Cloud Security Team) Fix wil...
Block one more gadget type (bus-proxy, CVE-2020-10968)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2662/comments
0
2020-03-23T01:31:30Z
2020-03-26T16:29:54Z
https://github.com/FasterXML/jackson-databind/issues/2662
585,867,685
2,662
CVE-2020-10969
2020-03-26T13:15:13.077
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2642" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "29BC94E0-FEBC-4E86-825C-0101DC339852", "versionEndExcluding": "2.7.9.7", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2642
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type reported regarding a class in `javax.swing` package.. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-10969 Reporters: threedr3am Fix will be included in: * 2.9.10.4 * 2...
Block one more gadget type (javax.swing, CVE-2020-10969)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2642/comments
5
2020-03-04T00:05:00Z
2020-04-02T00:24:11Z
https://github.com/FasterXML/jackson-databind/issues/2642
575,038,970
2,642
CVE-2020-9467
2020-03-26T20:15:11.427
Piwigo 2.10.1 has stored XSS via the file parameter in a /ws.php request because of the pwg.images.setInfo function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1168
[ "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
on `file` param. No worry with an admin, but this method can be used by a community user as well. Originally reported by Zak S. see CVE-2020-9467
stored XSS with pwg.images.setInfo
https://api.github.com/repos/Piwigo/Piwigo/issues/1168/comments
1
2020-03-24T13:03:01Z
2020-03-28T05:54:16Z
https://github.com/Piwigo/Piwigo/issues/1168
586,943,552
1,168
CVE-2020-8551
2020-03-27T15:15:12.647
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "N...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89377" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kuber...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "44ECF71D-7483-45B0-8BF5-92284C11696C", "versionEndExcluding": null, "versionEndIncluding": "1.15.9", "versionStart...
https://github.com/kubernetes/kubernetes/issues/89377
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Medium) The Kubelet has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served...
CVE-2020-8551: Kubelet DoS via API
https://api.github.com/repos/kubernetes/kubernetes/issues/89377/comments
7
2020-03-23T18:34:40Z
2021-12-02T22:55:29Z
https://github.com/kubernetes/kubernetes/issues/89377
586,428,637
89,377
CVE-2020-8552
2020-03-27T15:15:12.757
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89378" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kuber...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "07761E41-21F4-466F-A602-4DC9BD1257CE", "versionEndExcluding": null, "versionEndIncluding": "1.15.9", "versionStart...
https://github.com/kubernetes/kubernetes/issues/89378
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Medium) The Kubernetes API server has been found to be vulnerable to a denial of service attack via authorized API requests. ### Am I vulnerable? If an attacker t...
CVE-2020-8552: apiserver DoS (oom)
https://api.github.com/repos/kubernetes/kubernetes/issues/89378/comments
4
2020-03-23T18:35:34Z
2021-12-02T22:55:22Z
https://github.com/kubernetes/kubernetes/issues/89378
586,429,123
89,378
CVE-2020-11111
2020-03-31T05:15:13.007
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2664" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2664
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding classes of `org.apache.activemq:activemq-pool`, `org.apache.activemq:activemq-pool-jms` libraries. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11111 Re...
Block one more gadget type (activemq-pool[-jms], CVE-2020-11111)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2664/comments
2
2020-03-24T17:04:06Z
2020-12-02T03:59:26Z
https://github.com/FasterXML/jackson-databind/issues/2664
587,124,374
2,664
CVE-2020-11112
2020-03-31T05:15:13.070
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2666" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2666
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding a class of `org.apache.commons:commons-proxy` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11112 Reporter: Yiting Fan Fix will be included i...
Block one more gadget type (apache/commons-proxy, CVE-2020-11112)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2666/comments
0
2020-03-25T17:06:51Z
2020-12-02T03:59:15Z
https://github.com/FasterXML/jackson-databind/issues/2666
587,851,588
2,666
CVE-2020-11113
2020-03-31T05:15:13.117
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2670" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2670
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.openjpa:openjpa`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11113 Reporter: XuYuanzhen (of Alibaba Cloud Security T...
Block one more gadget type (openjpa, CVE-2020-11113)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2670/comments
0
2020-03-28T18:08:54Z
2020-04-07T01:41:29Z
https://github.com/FasterXML/jackson-databind/issues/2670
589,629,001
2,670
CVE-2019-11254
2020-04-01T21:15:13.397
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89535" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/kubernetes-announce/AL...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "87849953-B423-4E3B-A977-A62A88B40037", "versionEndExcluding": "1.15.10", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/89535
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVE-2019-11254 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML payloads to cause kube-apiserver to consume excessive CPU cycles while parsing YAML. The issue was discovered via the fuzz test kubernetes/kubernetes#83750. **Affected components:** Kuber...
CVE-2019-11254: kube-apiserver Denial of Service vulnerability from malicious YAML payloads
https://api.github.com/repos/kubernetes/kubernetes/issues/89535/comments
2
2020-03-26T18:55:26Z
2022-08-23T02:18:32Z
https://github.com/kubernetes/kubernetes/issues/89535
588,652,998
89,535
CVE-2020-11558
2020-04-05T20:15:12.650
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1440
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
3 UAF bugs in box_funcs.c
https://api.github.com/repos/gpac/gpac/issues/1440/comments
4
2020-03-24T17:16:05Z
2020-03-26T19:28:46Z
https://github.com/gpac/gpac/issues/1440
587,134,103
1,440
CVE-2020-10266
2020-04-06T12:15:12.957
UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these components in the robots (e.g. in the UR10), no integrity checks are performed. Moreover, the SDK for making such components can be easily obtained from Universal Robots. An attack...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1487" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:universal-robots:ur\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "91FE81D2-B3F6-4323-A765-CE44D324DBD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/aliasrobotics/RVD/issues/1487
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml { "id": 1487, "title": "RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot", "type": "vulnerability", "description": "UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these ...
RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot
https://api.github.com/repos/aliasrobotics/RVD/issues/1487/comments
1
2020-04-03T14:22:23Z
2020-09-30T11:00:13Z
https://github.com/aliasrobotics/RVD/issues/1487
593,418,549
1,487
CVE-2020-10267
2020-04-06T12:15:13.033
Universal Robots control box CB 3.1 across firmware versions (tested on 1.12.1, 1.12, 1.11 and 1.10) does not encrypt or protect in any way the intellectual property artifacts installed from the UR+ platform of hardware and software components (URCaps). These files (*.urcaps) are stored under '/root/.urcaps' as plain z...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1489" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:universal-robots:ur_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "914DFBBC-7743-4B1B-9875-8D6B6F907B99", "versionEndExcluding": null, "versionEndIncluding": "3.1.18213", "ve...
https://github.com/aliasrobotics/RVD/issues/1489
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml { "id": 1489, "title": "RVD#1489: Unprotected intelectual property in Universal Robots controller CB 3.1 across firmware versions", "type": "vulnerability", "description": "Universal Robots control box CB 3.1 across firmware versions (tested on 3.13.0, 3.12.1, 3.12, 3.11 and 3.10.0) does no...
RVD#1489: Unprotected intelectual property in Universal Robots controller CB 3.1 across firmware versions
https://api.github.com/repos/aliasrobotics/RVD/issues/1489/comments
2
2020-04-03T14:28:43Z
2020-04-29T17:37:33Z
https://github.com/aliasrobotics/RVD/issues/1489
593,422,790
1,489
CVE-2020-11619
2020-04-07T23:15:12.077
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2680" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2680
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.springframework:spring-aop`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Type: SSRF Mitre id: CVE-2020-11619 Reporter: Bui Duong from Viettel...
Block one more gadget type (SSRF, spring-jpa, CVE-2020-11619)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2680/comments
0
2020-04-07T01:41:49Z
2020-12-02T03:59:03Z
https://github.com/FasterXML/jackson-databind/issues/2680
595,531,291
2,680
CVE-2020-11620
2020-04-07T23:15:12.140
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2682" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2682
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `commons-jelly:commons-jelly`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11620 Reporter(s): * r00t4dm from A-TEAM of Legend...
Block one more gadget type (commons-jelly, CVE-2020-11620)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2682/comments
0
2020-04-07T15:54:48Z
2020-04-11T19:23:25Z
https://github.com/FasterXML/jackson-databind/issues/2682
595,974,605
2,682
CVE-2020-11721
2020-04-12T19:15:10.367
load_png in loader.c in libsixel.a in libsixel 1.8.6 has an uninitialized pointer leading to an invalid call to free, which can cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/134" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
`load_png` has a pointer `rows`, which should be set to NULL, otherwise `cleanup` code would use(calling `free`) it. binary: img2sixel file: loader.c function: load_png poc: [poc.zip](https://github.com/saitoha/libsixel/files/4464131/poc.zip) result: ``` #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/...
Invalid free wild pointer lead to DOS in load_png in loader.c
https://api.github.com/repos/saitoha/libsixel/issues/134/comments
12
2020-04-11T06:09:36Z
2021-06-10T06:23:25Z
https://github.com/saitoha/libsixel/issues/134
598,200,091
134
CVE-2020-11894
2020-04-19T19:15:12.477
Ming (aka libming) 0.4.8 has a heap-based buffer over-read (8 bytes) in the function decompileIF() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/196
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
./swftocxx $poc [segmentaion_fault_decompile_569-out_of_bound-idx:0x1199-0xb.zip](https://github.com/libming/libming/files/4490660/segmentaion_fault_decompile_569-out_of_bound-idx.0x1199-0xb.zip) ``` root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56...
heap overflow in decompileIF decompile.c:2473
https://api.github.com/repos/libming/libming/issues/196/comments
0
2020-04-17T02:47:07Z
2020-04-17T02:47:07Z
https://github.com/libming/libming/issues/196
601,663,070
196
CVE-2020-11895
2020-04-19T19:15:12.977
Ming (aka libming) 0.4.8 has a heap-based buffer over-read (2 bytes) in the function decompileIF() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/197" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/197
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
./swftocxx $poc [segmentaion_fault_decompile_569-out_of_bound-idx:0x1186-0x10.zip](https://github.com/libming/libming/files/4490668/segmentaion_fault_decompile_569-out_of_bound-idx.0x1186-0x10.zip) ``` root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56...
heap overflow in decompileIF decompile.c:2436
https://api.github.com/repos/libming/libming/issues/197/comments
0
2020-04-17T02:50:13Z
2020-04-17T02:50:13Z
https://github.com/libming/libming/issues/197
601,663,990
197