cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2020-25461
2020-12-04T17:15:12.383
Invalid Memory Access in the fxProxyGetter function in moddable/xs/sources/xsProxy.c in Moddable SDK before OS200908 causes a denial of service (SEGV).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/441" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "7990378B-828E-48EB-BF23-0D5C5052BE5E", "versionEndExcluding": "os200908", "versionEndIncluding": null, "versionStartEx...
https://github.com/Moddable-OpenSource/moddable/issues/441
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
## Build environment: Ubuntu 16.04 gcc 5.4.0 xst version: 5639abb build command: cd /path/to/moddable/xs/makefiles/lin make test command: ./xst poc ## Target device: Desktop Linux ## POC [xs-000230.txt](https://github.com/Moddable-OpenSource/moddable/files/5173481/xs-000230.txt) ## Description Below ...
SEGV at moddable/xs/sources/xsProxy.c:171
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/441/comments
0
2020-09-04T08:08:38Z
2020-09-09T03:51:48Z
https://github.com/Moddable-OpenSource/moddable/issues/441
692,870,041
441
CVE-2020-25462
2020-12-04T17:15:12.493
Heap buffer overflow in the fxCheckArrowFunction function at moddable/xs/sources/xsSyntaxical.c:3562 in Moddable SDK before OS200903.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/432" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "7990378B-828E-48EB-BF23-0D5C5052BE5E", "versionEndExcluding": "os200908", "versionEndIncluding": null, "versionStartEx...
https://github.com/Moddable-OpenSource/moddable/issues/432
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
## Build environment: Ubuntu 16.04 gcc 5.4.0 xst version: de64c70 (git hash) build command: cd /path/to/moddable/xs/makefiles/lin make test command: ./xst poc ## Target device: Desktop Linux ## POC [000053.txt](https://github.com/Moddable-OpenSource/moddable/files/5148563/000053.txt) ## Descript...
Heap buffer overflow at moddable/xs/sources/xsSyntaxical.c:3562
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/432/comments
2
2020-08-31T06:06:23Z
2020-09-04T07:51:20Z
https://github.com/Moddable-OpenSource/moddable/issues/432
688,931,508
432
CVE-2020-25463
2020-12-04T17:15:12.557
Invalid Memory Access in fxUTF8Decode at moddable/xs/sources/xsCommon.c:916 in Moddable SDK before OS200908 causes a denial of service (SEGV).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/440" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "7990378B-828E-48EB-BF23-0D5C5052BE5E", "versionEndExcluding": "os200908", "versionEndIncluding": null, "versionStartEx...
https://github.com/Moddable-OpenSource/moddable/issues/440
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
## Build environment: Ubuntu 16.04 gcc 5.4.0 xst version: 5639abb build command: cd /path/to/moddable/xs/makefiles/lin make test command: ./xst poc ## Target device: Desktop Linux ## POC [xs-000271.txt](https://github.com/Moddable-OpenSource/moddable/files/5173470/xs-000271.txt) ## Description Below ...
SEGV at moddable/xs/sources/xsCommon.c:916
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/440/comments
0
2020-09-04T08:06:34Z
2020-09-09T03:51:44Z
https://github.com/Moddable-OpenSource/moddable/issues/440
692,867,723
440
CVE-2020-25464
2020-12-04T17:15:12.993
Heap buffer overflow at moddable/xs/sources/xsDebug.c in Moddable SDK before before 20200903. The top stack frame is only partially initialized because the stack overflowed while creating the frame. This leads to a crash in the code sending the stack frame to the debugger.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/431" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A01917B-7252-436D-A0F0-B7EB13ED7F13", "versionEndExcluding": "os200903", "versionEndIncluding": null, "versionStartEx...
https://github.com/Moddable-OpenSource/moddable/issues/431
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
**Build environment:** Ubuntu 16.04 gcc 5.4.0 xst version: de64c70 (git hash) build command: cd /path/to/moddable/xs/makefiles/lin make test command: ./xst poc **Target device:** Desktop Linux **POC** function f() { var a = [10]; [{}] = a.slice(function () { }, a.length); a = a...
Heap buffer overflow at moddable/xs/sources/xsDebug.c:783
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/431/comments
1
2020-08-31T05:55:02Z
2020-09-04T07:50:56Z
https://github.com/Moddable-OpenSource/moddable/issues/431
688,926,321
431
CVE-2020-25465
2020-12-04T17:15:13.040
Null Pointer Dereference. in xObjectBindingFromExpression at moddable/xs/sources/xsSyntaxical.c:3419 in Moddable SDK before OS200908 causes a denial of service (SEGV).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/442" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "7990378B-828E-48EB-BF23-0D5C5052BE5E", "versionEndExcluding": "os200908", "versionEndIncluding": null, "versionStartEx...
https://github.com/Moddable-OpenSource/moddable/issues/442
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
## Build environment: Ubuntu 16.04 gcc 5.4.0 xst version: 5639abb build command: cd /path/to/moddable/xs/makefiles/lin make test command: ./xst poc ## Target device: Desktop Linux ## POC [xs-000425.txt](https://github.com/Moddable-OpenSource/moddable/files/5173491/xs-000425.txt) ## Description Belo...
SEGV at moddable/xs/sources/xsSyntaxical.c:3419
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/442/comments
0
2020-09-04T08:10:54Z
2020-09-09T03:51:51Z
https://github.com/Moddable-OpenSource/moddable/issues/442
692,872,104
442
CVE-2020-8563
2020-12-07T22:15:21.197
In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/95621" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "515661A5-8AFF-45B7-932C-3B5CD32945F0", "versionEndExcluding": "1.19.3", "versionEndIncluding": null, "versionStart...
https://github.com/kubernetes/kubernetes/issues/95621
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N (Medium) In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. ### Am I vulnerable? If you are using VSphere as a cloud provide...
CVE-2020-8563: Secret leaks in kube-controller-manager when using vSphere provider
https://api.github.com/repos/kubernetes/kubernetes/issues/95621/comments
3
2020-10-15T22:00:44Z
2021-12-02T22:54:17Z
https://github.com/kubernetes/kubernetes/issues/95621
722,704,051
95,621
CVE-2020-8564
2020-12-07T22:15:21.307
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/95622" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "B765012B-C658-4EB8-956A-62A91142CE05", "versionEndExcluding": "1.17.13", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/95622
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (Medium) In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. ### Am I vu...
CVE-2020-8564: Docker config secrets leaked when file is malformed and log level >= 4
https://api.github.com/repos/kubernetes/kubernetes/issues/95622/comments
3
2020-10-15T22:03:19Z
2021-12-02T22:54:10Z
https://github.com/kubernetes/kubernetes/issues/95622
722,705,294
95,622
CVE-2020-8565
2020-12-07T22:15:21.400
In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAC4DF80-12A5-482D-88C8-1939A015FBE4", "versionEndExcluding": null, "versionEndIncluding": "1.17.13", "versionStar...
https://github.com/kubernetes/kubernetes/issues/95623
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (Medium) In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. ### Am I vulnerable? If kube-apiserver is using ...
CVE-2020-8565: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9
https://api.github.com/repos/kubernetes/kubernetes/issues/95623/comments
3
2020-10-15T22:05:32Z
2021-12-02T22:54:04Z
https://github.com/kubernetes/kubernetes/issues/95623
722,706,304
95,623
CVE-2020-8566
2020-12-07T22:15:21.480
In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/95624" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "B765012B-C658-4EB8-956A-62A91142CE05", "versionEndExcluding": "1.17.13", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/95624
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (Medium) In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. ...
CVE-2020-8566: Ceph RBD adminSecrets exposed in logs when loglevel >= 4
https://api.github.com/repos/kubernetes/kubernetes/issues/95624/comments
3
2020-10-15T22:07:53Z
2021-12-02T22:53:56Z
https://github.com/kubernetes/kubernetes/issues/95624
722,707,368
95,624
CVE-2020-25663
2020-12-08T21:15:12.420
A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and co...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C", "versionEndExcluding": "7.0.8-56", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments
4
2019-10-06T12:41:15Z
2020-10-29T00:07:54Z
https://github.com/ImageMagick/ImageMagick/issues/1723
503,095,531
1,723
CVE-2020-25663
2020-12-08T21:15:12.420
A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and co...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891601" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8FFBE52-1112-43E2-BC1B-D1388F18988C", "versionEndExcluding": "7.0.8-56", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1723#issuecomment-718275153
[ "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free at MagickCore/pixel-accessor.h in GetPixelRed
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1723/comments
4
2019-10-06T12:41:15Z
2020-10-29T00:07:54Z
https://github.com/ImageMagick/ImageMagick/issues/1723
503,095,531
1,723
CVE-2020-29657
2020-12-09T09:15:13.137
In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4244" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCC6C843-EE98-4852-8D03-7FC19D2E821C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4244
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
On line 180 of the main-utils.c, ` do { ch = source_p[pos++]; jerry_port_log (JERRY_LOG_LEVEL_ERROR, "%c", ch); } while (ch != '\n' && char_count++ < SYNTAX_ERROR_MAX_LINE_LENGTH);` will out-of-bound read at most 0x100 characters when an syntax error happened a...
Out-of-bound read in main_print_unhandled_exception
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4244/comments
4
2020-09-29T00:45:00Z
2021-01-03T11:43:42Z
https://github.com/jerryscript-project/jerryscript/issues/4244
710,666,807
4,244
CVE-2020-29607
2020-12-16T15:15:12.727
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162785/Pluck-CMS-4.7.13-Remote-Shell-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A2A003-1153-47A7-9F1E-67AF40FD9E06", "versionEndExcluding": "4.7.13", "versionEndIncluding": null, "versionStartExclud...
https://github.com/pluck-cms/pluck/issues/96
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
# Vulnerability Description I have observed that it is possible to upload php file on the system through `manage files` functionality which leads to compromise the system. As I'm able to upload malicious php file with `.phar` extension, and able to execute php code on the server. # Observation On line 44-45 of `fi...
Remote Code Execution via File Upload Restriction Bypass
https://api.github.com/repos/pluck-cms/pluck/issues/96/comments
6
2020-12-01T18:26:57Z
2021-02-08T08:44:08Z
https://github.com/pluck-cms/pluck/issues/96
754,624,608
96
CVE-2020-35490
2020-12-17T19:15:14.417
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F38029-9D32-499B-B5D4-C4FFDD9B1728", "versionEndExcluding": "2.9.10.8", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2986
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.commons:commons-dbcp2`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Reporter(s): Al1ex@knownsec Mitre ids: * CVE-2020-35490 * ...
Block 2 more gadget types (commons-dbcp2, CVE-2020-35490/CVE-2020-35491)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2986/comments
0
2020-12-14T21:48:07Z
2021-06-22T04:04:11Z
https://github.com/FasterXML/jackson-databind/issues/2986
766,957,739
2,986
CVE-2020-26284
2020-12-21T23:15:12.157
Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (`exe` or `bat`) is found in the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COM...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-8j34-9876-pvfq" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gohugo:hugo:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E9F3B098-63C6-44CD-A08B-876C6CBC8BDF", "versionEndExcluding": "0.79.1", "versionEndIncluding": null, "versionStartExcl...
https://github.com/golang/go/issues/38736
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
<!-- Please answer these questions before submitting your issue. Thanks! For questions please use one of our forums: https://github.com/golang/go/wiki/Questions --> ### What version of Go are you using (`go version`)? <pre> $ go version go version go1.14.1 windows/amd64 </pre> Originally noticed with Go 1....
proposal: os/exec: make LookPath not look in dot implicitly on Windows
https://api.github.com/repos/golang/go/issues/38736/comments
31
2020-04-29T00:09:12Z
2022-07-08T14:09:14Z
https://github.com/golang/go/issues/38736
608,691,699
38,736
CVE-2018-15632
2020-12-22T17:15:12.487
Improper input validation in database creation logic in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier, allows remote attackers to initialize an empty database on which they can connect with default credentials.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63700" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB", "versionEndExcluding": null, "versionEndIncluding": "11.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63700
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2018-15632 **Affects**: Odoo 11.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2018-15632](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15632) **Component**: Framework **Credits**: P. Valov (SoCyber) Improper input validation in database creation logic in Odoo ...
[SEC] CVE-2018-15632 - Affects: Odoo 11.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63700/comments
0
2020-12-22T15:30:55Z
2020-12-22T15:30:57Z
https://github.com/odoo/odoo/issues/63700
773,033,276
63,700
CVE-2018-15633
2020-12-22T17:15:12.690
Cross-site scripting (XSS) issue in "document" module in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted attachment filenames.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63701" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB", "versionEndExcluding": null, "versionEndIncluding": "11.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63701
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2018-15633 **Affects**: Odoo 11.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2018-15633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15633) **Component**: "document" module **Credits**: Nathanael ROTA (Capgemini), Lauri Vakkala (Silverskin), Tomas Ca...
[SEC] CVE-2018-15633 - Affects: Odoo 11.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63701/comments
0
2020-12-22T15:30:57Z
2020-12-22T15:30:59Z
https://github.com/odoo/odoo/issues/63701
773,033,314
63,701
CVE-2018-15634
2020-12-22T17:15:12.783
Cross-site scripting (XSS) issue in attachment management in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via a crafted link.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63702" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "2DBCA075-326A-4F0F-89B9-1437744D0FFC", "versionEndExcluding": null, "versionEndIncluding": "14.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63702
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2018-15634 **Affects**: Odoo 14.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2018-15634](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15634) **Component**: Framework **Credits**: Nathanael ROTA (Capgemini) and Alessandro Innocenti Cross-site scripting (XSS) i...
[SEC] CVE-2018-15634 - Affects: Odoo 14.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63702/comments
0
2020-12-22T15:30:59Z
2020-12-22T15:31:01Z
https://github.com/odoo/odoo/issues/63702
773,033,341
63,702
CVE-2018-15638
2020-12-22T17:15:12.847
Cross-site scripting (XSS) issue in mail module in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted channel names.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63703" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25", "versionEndExcluding": null, "versionEndIncluding": "13.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63703
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2018-15638 **Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2018-15638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15638) **Component**: Discuss **Credits**: Subash SN and Bharath Kumar (Appsecco), Dipanshu Agrawal Cross-site scripting (XSS...
[SEC] CVE-2018-15638 - Affects: Odoo 13.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63703/comments
0
2020-12-22T15:31:01Z
2020-12-22T15:31:03Z
https://github.com/odoo/odoo/issues/63703
773,033,360
63,703
CVE-2018-15641
2020-12-22T17:15:12.940
Cross-site scripting (XSS) issue in web module in Odoo Community 11.0 through 14.0 and Odoo Enterprise 11.0 through 14.0, allows remote authenticated internal users to inject arbitrary web script in the browser of a victim via crafted calendar event attributes.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63704" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "4ED3084D-DF4C-486F-A161-ADCC24FF61F4", "versionEndExcluding": null, "versionEndIncluding": "14.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63704
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2018-15641 **Affects**: Odoo 11.0 through 14.0 (Community and Enterprise Editions) **CVE ID**: [CVE-2018-15641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15641) **Component**: Framework **Credits**: msg systems ag, Lauri Vakkala (Silverskin), Bharath Kumar (Appsecco), A...
[SEC] CVE-2018-15641 - Affects: Odoo 11.0 through 14.0 (Community a...
https://api.github.com/repos/odoo/odoo/issues/63704/comments
0
2020-12-22T15:31:04Z
2020-12-22T15:31:05Z
https://github.com/odoo/odoo/issues/63704
773,033,386
63,704
CVE-2018-15645
2020-12-22T17:15:13.033
Improper access control in message routing in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier allows remote authenticated users to create arbitrary records via crafted payloads, which may allow privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63705" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63705
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2018-15645 **Affects**: Odoo 12.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2018-15645](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15645) **Component**: Discuss **Credits**: Nils Hamerlinck (Trobz) Improper access control in message routing in Odoo Communi...
[SEC] CVE-2018-15645 - Affects: Odoo 12.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63705/comments
0
2020-12-22T15:31:05Z
2020-12-22T15:31:07Z
https://github.com/odoo/odoo/issues/63705
773,033,411
63,705
CVE-2019-11781
2020-12-22T17:15:13.127
Improper input validation in portal component in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier, allows remote attackers to trick victims into modifying their account via crafted links, leading to privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63706" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63706
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2019-11781 **Affects**: Odoo 12.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2019-11781](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11781) **Component**: Portal **Credits**: "[iamsushi](https://github.com/sushiwushi)" Improper input validation in por...
[SEC] CVE-2019-11781 - Affects: Odoo 12.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63706/comments
0
2020-12-22T15:31:07Z
2021-02-05T12:25:28Z
https://github.com/odoo/odoo/issues/63706
773,033,435
63,706
CVE-2019-11782
2020-12-22T17:15:13.190
Improper access control in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote authenticated users with access to contact management to modify user accounts, leading to privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63707" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "2DBCA075-326A-4F0F-89B9-1437744D0FFC", "versionEndExcluding": null, "versionEndIncluding": "14.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63707
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2019-11782 **Affects**: Odoo 14.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2019-11782](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11782) **Component**: Portal **Credits**: Damien LESCOS Improper access control in Odoo Community 14.0 and earlier and Odoo E...
[SEC] CVE-2019-11782 - Affects: Odoo 14.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63707/comments
0
2020-12-22T15:31:09Z
2020-12-22T15:31:10Z
https://github.com/odoo/odoo/issues/63707
773,033,453
63,707
CVE-2019-11783
2020-12-22T17:15:13.267
Improper access control in mail module (channel partners) in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote authenticated users to subscribe to arbitrary mail channels uninvited.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63708" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "2DBCA075-326A-4F0F-89B9-1437744D0FFC", "versionEndExcluding": null, "versionEndIncluding": "14.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63708
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2019-11783 **Affects**: Odoo 14.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2019-11783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11783) **Component**: Discuss **Credits**: Nils Hamerlinck (Trobz), Christopher Riis Bubeck Eriksen, Alexandre Diaz, ...
[SEC] CVE-2019-11783 - Affects: Odoo 14.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63708/comments
0
2020-12-22T15:31:11Z
2020-12-22T15:31:12Z
https://github.com/odoo/odoo/issues/63708
773,033,474
63,708
CVE-2019-11784
2020-12-22T17:15:13.330
Improper access control in mail module (notifications) in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote authenticated users to obtain access to arbitrary messages in conversations they were not a party to.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63709" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "2DBCA075-326A-4F0F-89B9-1437744D0FFC", "versionEndExcluding": null, "versionEndIncluding": "14.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63709
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2019-11784 **Affects**: Odoo 14.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2019-11784](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11784) **Component**: Discuss Improper access control in mail module (notifications) in Odoo Community 14.0 and earlier and O...
[SEC] CVE-2019-11784 - Affects: Odoo 14.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63709/comments
0
2020-12-22T15:31:12Z
2020-12-22T15:31:13Z
https://github.com/odoo/odoo/issues/63709
773,033,497
63,709
CVE-2019-11785
2020-12-22T17:15:13.393
Improper access control in mail module (followers) in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to obtain access to messages posted on business records there were not given access to, and subscribe to receive future messages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63710" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25", "versionEndExcluding": null, "versionEndIncluding": "13.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63710
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2019-11785 **Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2019-11785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11785) **Component**: Discuss **Credits**: Nils Hamerlinck (Trobz) Improper access control in mail module (followers) in Odoo...
[SEC] CVE-2019-11785 - Affects: Odoo 13.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63710/comments
0
2020-12-22T15:31:14Z
2020-12-22T15:31:16Z
https://github.com/odoo/odoo/issues/63710
773,033,517
63,710
CVE-2019-11786
2020-12-22T17:15:13.457
Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to modify translated terms, which may lead to arbitrary content modification on translatable elements.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63711" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "97EB1578-CFCC-4301-AEE7-DBBC6A92BC25", "versionEndExcluding": null, "versionEndIncluding": "13.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63711
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2019-11786 **Affects**: Odoo 13.0 and earlier (Community and Enterprise Editions) **CVE ID**: [CVE-2019-11786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11786) **Component**: Core **Credits**: Martin Trigaux, Alexandre Diaz Improper access control in Odoo Community 13.0 and ear...
[SEC] CVE-2019-11786 - Affects: Odoo 13.0 and earlier (Community an...
https://api.github.com/repos/odoo/odoo/issues/63711/comments
0
2020-12-22T15:31:16Z
2020-12-22T15:31:18Z
https://github.com/odoo/odoo/issues/63711
773,033,547
63,711
CVE-2020-29396
2020-12-22T17:15:13.550
A sandboxing issue in Odoo Community 11.0 through 13.0 and Odoo Enterprise 11.0 through 13.0, when running with Python 3.6 or later, allows remote authenticated users to execute arbitrary code, leading to privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/63712" }, { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "C1269963-1DD6-4B28-A33F-B8C2F69AEF4C", "versionEndExcluding": null, "versionEndIncluding": "13.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/63712
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - CVE-2020-29396 **Affects**: Odoo 11.0 through 13.0 (Community and Enterprise Editions) **CVE ID**: [CVE-2020-29396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29396) **Component**: Core **Credits**: Toufik Ben Jaa, Stéphane Debauche, Benoît FONTAINE A sandboxing issue in Odoo Commun...
[SEC] CVE-2020-29396 - Affects: Odoo 11.0 through 14.0 (Community a...
https://api.github.com/repos/odoo/odoo/issues/63712/comments
0
2020-12-22T15:31:19Z
2020-12-22T15:31:20Z
https://github.com/odoo/odoo/issues/63712
773,033,581
63,712
CVE-2020-35728
2020-12-27T05:15:11.590
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2999" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB440540-715A-4764-9F9B-6181D32CE07C", "versionEndExcluding": "2.9.10.8", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2999
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.glassfish.web/javax.servlet.jsp.jstl` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Reporter(s): bu5yer (of Sangfor FarSight Security Lab) Mitre ...
Block one more gadget type (org.glassfish.web/javax.servlet.jsp.jstl, CVE-2020-35728)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2999/comments
2
2020-12-23T04:30:19Z
2021-06-22T04:06:00Z
https://github.com/FasterXML/jackson-databind/issues/2999
773,477,032
2,999
CVE-2020-28851
2021-01-02T06:15:12.380
In x/text in Go 1.15.4, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/42535" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:1.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "57427CF7-E136-4F17-BBBA-1AAAA7333825", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/golang/go/issues/42535
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
<!-- Please answer these questions before submitting your issue. Thanks! --> ### What version of Go are you using (`go version`)? <pre> $ go version go version go1.15.4 linux/amd64 </pre> ### Does this issue reproduce with the latest release? ### What operating system and processor architecture are you...
x/text: panic in language.ParseAcceptLanguage while parsing -u- extension
https://api.github.com/repos/golang/go/issues/42535/comments
16
2020-11-12T11:07:01Z
2022-03-26T11:38:47Z
https://github.com/golang/go/issues/42535
741,505,618
42,535
CVE-2020-28852
2021-01-02T06:15:13.100
In x/text in Go before v0.3.5, a "slice bounds out of range" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/42536" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*", "matchCriteriaId": "248279D3-C3A0-439B-8772-09373DA59099", "versionEndExcluding": "0.3.5", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/golang/go/issues/42536
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
<!-- Please answer these questions before submitting your issue. Thanks! --> ### What version of Go are you using (`go version`)? <pre> $ go version go version go1.15.4 linux/amd64 </pre> ### Does this issue reproduce with the latest release? ### What operating system and processor architecture are you...
x/text: panic in language.ParseAcceptLanguage while processing bcp47 tag
https://api.github.com/repos/golang/go/issues/42536/comments
8
2020-11-12T11:12:42Z
2022-01-08T15:21:49Z
https://github.com/golang/go/issues/42536
741,509,514
42,536
CVE-2020-26045
2021-01-05T15:15:13.657
FUEL CMS 1.4.11 allows SQL Injection via parameter 'name' in /fuel/permissions/create/. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://getfuelcms.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/575" }, { "source": "cve@mitre.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "5128D2F0-4C37-4010-946C-00364B1EB496", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/daylightstudio/FUEL-CMS/issues/575
[ "Exploit", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
FUEL CMS 1.4.11 allows SQL Injection via parameter 'name' in /fuel/permissions/create/ Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. ![image](https://user-images.githubusercontent.com/71753309/93983630-...
FUEL CMS 1.4.11 allows SQL Injection via parameter 'name' in /fuel/permissions/create/
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/575/comments
0
2020-09-23T07:57:39Z
2020-09-23T16:42:51Z
https://github.com/daylightstudio/FUEL-CMS/issues/575
707,138,024
575
CVE-2020-26046
2021-01-05T15:15:13.717
FUEL CMS 1.4.11 has stored XSS in Blocks/Navigation/Site variables. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account and also impact other visitors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://getfuelcms.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/574" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "5128D2F0-4C37-4010-946C-00364B1EB496", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/daylightstudio/FUEL-CMS/issues/574
[ "Exploit", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
1. Stored xss in Blocks name ![image](https://user-images.githubusercontent.com/71753309/93980064-b7ec2780-fdb0-11ea-8f85-c2b9a6822875.png) Refresh the page, it will trigger below "Recently Viewed" menu ![image](https://user-images.githubusercontent.com/71753309/93980223-f08c0100-fdb0-11ea-8f70-e08694cf08d8.png) Fr...
Stored XSS in Blocks/Navigation/Site Variables (release/1.4.11)
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/574/comments
0
2020-09-23T07:36:11Z
2020-09-23T16:43:02Z
https://github.com/daylightstudio/FUEL-CMS/issues/574
707,124,307
574
CVE-2020-36181
2021-01-06T23:15:12.957
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "7081652A-D28B-494E-94EF-CA88117F23EE", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
https://github.com/FasterXML/jackson-databind/issues/3004
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
One additional, not-yet-blocked type of Apache DBCP (1.x/2.x) library was reported as possible gadget type and should be blocked. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Reporter(s): Al1ex@knownsec Mitre id(s...
Block some more DBCP-related potential gadget classes (CVE-2020-36179 - CVE-2020-36182)
https://api.github.com/repos/FasterXML/jackson-databind/issues/3004/comments
1
2021-01-01T01:03:14Z
2021-06-22T04:05:38Z
https://github.com/FasterXML/jackson-databind/issues/3004
777,170,349
3,004
CVE-2020-36184
2021-01-06T23:15:13.017
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/FasterXML/jackson-databind/issues/2998
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.tomcat/tomcat-dbcp` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Reporter(s): Al1ex@knownsec Mitre id(s): * [CVE-2020-36184](CVE-2020...
Block 2 more gadget types (org.apache.tomcat/tomcat-dbcp, CVE-2020-36184/CVE-2020-36185)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2998/comments
1
2020-12-23T04:18:43Z
2021-01-07T21:18:05Z
https://github.com/FasterXML/jackson-databind/issues/2998
773,473,261
2,998
CVE-2020-36186
2021-01-06T23:15:13.123
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4892ABAA-57A0-43D3-965C-2D7F4A8A6024", "versionEndExcluding": "2.6.7.5", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2997
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `tomcat:naming-factory-dbcp` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Reporter(s): Al1ex@knownsec Mitre id(s): * [CVE-2020-36186](CVE-2020-...
Block 2 more gadget types (tomcat/naming-factory-dbcp, CVE-2020-36186/CVE-2020-36187)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2997/comments
1
2020-12-23T04:18:08Z
2021-06-22T04:04:42Z
https://github.com/FasterXML/jackson-databind/issues/2997
773,473,087
2,997
CVE-2020-36188
2021-01-06T23:15:13.233
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4892ABAA-57A0-43D3-965C-2D7F4A8A6024", "versionEndExcluding": "2.6.7.5", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2996
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `com.newrelic.agent.java:newrelic-agent` library (version 3.x). See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Reporter(s): Al1ex@knownsec Mitre id(s): * [C...
Block 2 more gadget types (newrelic-agent, CVE-2020-36188/CVE-2020-36189)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2996/comments
1
2020-12-23T04:09:48Z
2021-06-22T04:04:28Z
https://github.com/FasterXML/jackson-databind/issues/2996
773,470,448
2,996
CVE-2020-36183
2021-01-07T00:15:15.023
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062" }, { "source": "cve@mitre.org", "tags": [ "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "959574F9-E7A4-4738-A609-031488012274", "versionEndExcluding": "2.6.7.5", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/3003
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.docx4j.org.apache:xalan-interpretive` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Reporter(s): differ (of Zorelworld iLab team) Mitre id: [CVE-...
Block one more gadget type (org.docx4j.org.apache:xalan-interpretive, CVE-2020-36183)
https://api.github.com/repos/FasterXML/jackson-databind/issues/3003/comments
1
2021-01-01T00:43:41Z
2021-06-22T04:05:49Z
https://github.com/FasterXML/jackson-databind/issues/3003
777,167,854
3,003
CVE-2020-35701
2021-01-11T16:15:15.600
An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers to execute arbitrary SQL commands via the site_id parameter. This can lead to remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://asaf.me/2020/12/15/cacti-1-2-0-to-1-2-16-sql-injection/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2A8BC37-F5C4-4940-BE4E-2114CAA44B5F", "versionEndExcluding": null, "versionEndIncluding": "1.2.16", "versionStartExcluding"...
https://github.com/Cacti/cacti/issues/4022
[ "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
# Describe the bug Due to a lack of validation, data_debug.php can be the source of a SQL injection. ## Expected behavior Cacti should be safe from SQL injections
SQL Injection was possible due to incorrect validation order (CVE-2020-35701)
https://api.github.com/repos/Cacti/cacti/issues/4022/comments
2
2020-12-24T15:37:03Z
2021-04-30T22:50:28Z
https://github.com/Cacti/cacti/issues/4022
774,491,101
4,022
CVE-2021-20190
2021-01-19T17:15:13.427
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTI...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916633" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "92CF0272-B961-44D2-95F6-162A23169E1D", "versionEndExcluding": "2.6.7.5", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2854
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) has been reported regarding a class(es) of JDK Swing. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2021-20190 (see https://nvd.nist.gov/vuln/detail/CVE-2021-20190) Reporter(s...
Block one more gadget type (javax.swing, CVE-2020-20190)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2854/comments
0
2020-09-16T15:32:43Z
2023-01-12T04:03:45Z
https://github.com/FasterXML/jackson-databind/issues/2854
702,866,300
2,854
CVE-2020-8554
2021-01-21T17:15:13.843
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to user...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PART...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/97076" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "044D3402-749F-4BEA-9F7E-16F7839654FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/kubernetes/kubernetes/issues/97076
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: **Medium** ([CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)) This issue affects multitenant clusters. If a potential attacker can already create or edit services and pods, then they may be able to intercept traffic f...
CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs
https://api.github.com/repos/kubernetes/kubernetes/issues/97076/comments
36
2020-12-04T20:02:15Z
2021-12-14T21:23:22Z
https://github.com/kubernetes/kubernetes/issues/97076
757,368,290
97,076
CVE-2020-18750
2021-02-05T19:15:11.917
Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.69:*:*:*:*:*:*:*", "matchCriteriaId": "2F7376EA-8894-4F38-9B0E-E74BD2639130", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
In CharCodeToUnicode.cc::264 !pst->getToken(tok3, sizeof(tok3), &n3) || //sizeof(tok3) == 256 here n3 can be a value from 0 to 256 - 2 In CharCodeToUnicode.cc::298 addMapping(code1, tok3 + 1, n3 - 2, i); In CharCodeToUnicode.cc::313 if (n <= 4) { if (sscanf(uStr, "%x", &u) != 1) { error(-1, "...
HEAP OVERFLOW VULNERABILITY
https://api.github.com/repos/flexpaper/pdf2json/issues/22/comments
4
2019-03-20T02:55:13Z
2019-03-23T07:08:58Z
https://github.com/flexpaper/pdf2json/issues/22
423,042,193
22
CVE-2021-20245
2021-03-09T19:15:12.500
A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE"...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "465FCAC7-2745-4B78-AF5C-58D7B3A8D424", "versionEndExcluding": "6.9.11-62", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/3176
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
When `image->ticks_per_second` was set to zero, a division by zero error would happen in line 961. So a crafted file may trigger undefined behavior in the form of division by zero. Maybe there need a `PerceptibleReciprocal()` to do division in line 961? https://github.com/ImageMagick/ImageMagick/blob/74f8868c779a5bd...
Division by zero in WriteAnimatedWEBPImage() in coders/webp.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/3176/comments
2
2021-02-02T06:03:44Z
2021-02-17T07:16:38Z
https://github.com/ImageMagick/ImageMagick/issues/3176
798,961,516
3,176
CVE-2020-23721
2021-03-10T14:15:12.373
An issue was discovered in FUEL CMS V1.4.7. An attacker can use a XSS payload and bypass a filter via /fuelCM/fuel/pages/edit/1?lang=english.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/559" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/559
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
HI: The attacker bypasses the filter In this pages page! POC: `"><details/open/ontoggle=\u0061\u006c\u0065\u0072\u0074(/xss/)>` <img width="842" alt="222" src="https://user-images.githubusercontent.com/12816285/85382827-eb30d780-b571-11ea-8a59-928afc638ae9.png"> <img width="698" alt="333" src="https://user-images...
bypass filter XSS vunerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/559/comments
0
2020-06-23T08:53:30Z
2021-05-14T13:59:44Z
https://github.com/daylightstudio/FUEL-CMS/issues/559
643,655,458
559
CVE-2020-23722
2021-03-10T14:15:12.453
An issue was discovered in FUEL CMS 1.4.7. There is a escalation of privilege vulnerability to obtain super admin privilege via the "id" and "fuel_id" parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/560" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/560
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
General users can modify the administrator password and account infomation vulnerability . for example: The account test123 can chanage the admin password!!! step 1: log in test123: <img width="958" alt="1" src="https://user-images.githubusercontent.com/12816285/85488214-81abda00-b600-11ea-9b6e-b8c0551322df.png"> ...
General users can modify the administrator password vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/560/comments
1
2020-06-24T02:12:08Z
2020-07-02T15:18:03Z
https://github.com/daylightstudio/FUEL-CMS/issues/560
644,263,989
560
CVE-2020-24791
2021-03-10T14:15:12.547
FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/561" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "AB4A4A9E-CC08-4A74-A807-92843A9912E8", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/561
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1 Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. POC: POST /FUEL-CMS-1.4.8/fuel/pages/replace/1?inline=1 HTTP/1.1 ...
FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/561/comments
0
2020-08-19T08:22:40Z
2020-09-23T16:35:29Z
https://github.com/daylightstudio/FUEL-CMS/issues/561
681,646,072
561
CVE-2020-28705
2021-03-10T14:15:12.623
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a page via a post ID to /pages/delete/3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/commit/fbf2d59215800f05d4359e8f984d5680d62f0f3b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/daylightstudio/FUEL-CMS/issues/576
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
In /pages/delete/3 Cross-site request forgery (CSRF) vulnerability The Attacker can use this vulnerability to delete random pages! <img width="536" alt="222png" src="https://user-images.githubusercontent.com/68934938/98192825-c0f71980-1f56-11eb-8c11-efb7a60f17ad.png"> POC: ![111](https://user-images.githubusercon...
FUEL-CMS V1.4.13 Cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/576/comments
0
2020-11-05T02:54:39Z
2021-05-14T13:59:33Z
https://github.com/daylightstudio/FUEL-CMS/issues/576
736,567,837
576
CVE-2021-20285
2021-03-26T17:15:13.140
A flaw was found in upx canPack in p_lx_elf.cpp in UPX 3.96. This flaw allows attackers to cause a denial of service (SEGV or buffer overflow and application crash) or possibly have unspecified other impacts via a crafted ELF. The highest threat from this vulnerability is to system availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTI...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937787" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.96:*:*:*:*:*:*:*", "matchCriteriaId": "70995404-A343-41AF-9170-590CFEAA901B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/421
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggest...
canPack@p_lx_elf.cpp:2571 BufferOverflow (both latest release version and devel version)
https://api.github.com/repos/upx/upx/issues/421/comments
2
2020-11-12T12:39:35Z
2020-12-11T21:41:09Z
https://github.com/upx/upx/issues/421
741,567,149
421
CVE-2021-27973
2021-04-02T19:15:20.880
SQL injection exists in Piwigo before 11.4.0 via the language parameter to admin.php?page=languages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162404/Piwigo-11.3.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE6825BB-C574-480F-92B6-5A7D8E70BFD9", "versionEndExcluding": "11.4.0", "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Piwigo/Piwigo/issues/1352
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
1. Login with admin or users can set the language; 2. Send the following payload and follow redirect: db user :http://xxx/admin.php?page=languages&language=zh_CN%27%20or%20updatexml(1%2Cconcat(0x7e%2C(user()))%2C0)%20or%20%27&action=activate ![image](https://user-images.githubusercontent.com/59224242/109492597-2d79c...
SQL injection in settings-language in version 11.3.0
https://api.github.com/repos/Piwigo/Piwigo/issues/1352/comments
0
2021-03-01T11:44:16Z
2021-03-08T13:59:50Z
https://github.com/Piwigo/Piwigo/issues/1352
818,783,675
1,352
CVE-2020-21590
2021-04-02T20:15:12.567
Directory traversal in coreframe/app/template/admin/index.php in WUZHI CMS 4.1.0 allows attackers to list files in arbitrary directories via the dir parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pwnninja/wuzhicms/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/wuzhicms/wuzhicms/issues/190
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
A directory traversal vulnerability was discovered in WUZHI CMS 4.1.0. There is a directory traversal vulnerability which allows authenticated remote attackers to list files in arbitrary directory. Vulnerability in /coreframe/app/template/admin/index.php: ```php private $db; function __construct() { $this->db ...
wuzhicms v4.1.0 /coreframe/app/template/admin/index.php directory traversal vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/190/comments
0
2020-03-15T04:29:26Z
2020-03-15T04:40:18Z
https://github.com/wuzhicms/wuzhicms/issues/190
581,507,883
190
CVE-2021-20308
2021-04-05T22:15:12.947
Integer overflow in the htmldoc 1.9.11 and before may allow attackers to execute arbitrary code and cause a denial of service that is similar to CVE-2017-9181.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946289" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C2771A0-9E19-4348-A7EE-53F10C08EABC", "versionEndExcluding": null, "versionEndIncluding": "1.9.11", "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hi, I found some integer overflow vulnerability that is similar to [CVE-2017-9181](https://nvd.nist.gov/vuln/detail/CVE-2017-9181) in htmldoc. - os : Debian GNU/Linux bullseye/sid - version : 1.9.11 [htmldoc-poc.zip](https://github.com/michaelrsweet/htmldoc/files/6177464/htmldoc-poc.zip) In htmldoc-poc, there a...
Bug: buffer-overflow caused by integer-overflow in image_load_gif()
https://api.github.com/repos/michaelrsweet/htmldoc/issues/423/comments
6
2021-03-21T13:11:39Z
2021-04-06T12:29:34Z
https://github.com/michaelrsweet/htmldoc/issues/423
837,074,065
423
CVE-2020-36120
2021-04-14T14:15:13.287
Buffer Overflow in the "sixel_encoder_encode_bytes" function of Libsixel v1.8.6 allows attackers to cause a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/143" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/143
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Version Libsixel :1.8.6 Ubuntu 20.04 LTS I fuzzed the sixelapi ``` #include <stdio.h> #include <stdlib.h> #include <stdint.h> #include <string.h> #include "sixel.h" int main(){ sixel_encoder_t *encoder=NULL; int ncolors=16; char opt[256]={0}; SIXELSTATUS status; unsigned char d...
stack-buffer-overflow in sixel_encoder_encode_bytes at encoder.c:1788
https://api.github.com/repos/saitoha/libsixel/issues/143/comments
2
2020-12-30T04:12:13Z
2021-07-08T07:54:30Z
https://github.com/saitoha/libsixel/issues/143
776,206,246
143
CVE-2021-28300
2021-04-14T14:15:14.053
NULL Pointer Dereference in the "isomedia/track.c" module's "MergeTrack()" function of GPAC v0.5.2 allows attackers to execute arbitrary code or cause a Denial-of-Service (DoS) by uploading a malicious MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1702" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5CD3BB9D-838C-4431-AF39-F279C9869726", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1702
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
A NULL pointer dereference in the function MergeTrack in isomedia/track.c:1087:21
https://api.github.com/repos/gpac/gpac/issues/1702/comments
3
2021-03-11T02:05:00Z
2021-04-29T05:20:07Z
https://github.com/gpac/gpac/issues/1702
828,599,474
1,702
CVE-2021-29457
2021-04-19T19:15:17.920
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1529" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A049EBD-7A7E-458F-9ABD-F6626DDEABB9", "versionEndExcluding": "0.27.4", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/1529
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**VERSION** exiv 2 0.27.4.1 https://github.com/Exiv2/exiv2/tree/0.27-maintenance **REPRODUCE** Compile exiv2 with asan: ``` CC=clang CXX=clang++ cmake .. -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS="-fsanitize=address" \ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" \ ...
heap-buffer-overflow write in Exiv2::Jp2Image::doWriteMetadata
https://api.github.com/repos/Exiv2/exiv2/issues/1529/comments
4
2021-04-08T03:01:08Z
2021-08-06T08:31:08Z
https://github.com/Exiv2/exiv2/issues/1529
853,009,339
1,529
CVE-2021-29458
2021-04-19T19:15:18.017
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentia...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1530" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A049EBD-7A7E-458F-9ABD-F6626DDEABB9", "versionEndExcluding": "0.27.4", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/1530
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**VERSION** exiv 2 0.27.4.1 https://github.com/Exiv2/exiv2/tree/0.27-maintenance **REPRODUCE** Compile exiv2 with asan: ``` CC=clang CXX=clang++ cmake .. -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS="-fsanitize=address" \ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" \ ...
heap-buffer-overflow Read in Exiv2::Internal::CrwMap::encode
https://api.github.com/repos/Exiv2/exiv2/issues/1530/comments
15
2021-04-08T07:27:55Z
2021-08-06T08:37:06Z
https://github.com/Exiv2/exiv2/issues/1530
853,159,049
1,530
CVE-2021-31254
2021-04-19T19:15:18.077
Buffer overflow in the tenc_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file, related invalid IV sizes.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8986422c21fbd9a7bf6561cae65aae42077447e8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1703
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]heap buffer overflow issue with gpac MP4Box
https://api.github.com/repos/gpac/gpac/issues/1703/comments
0
2021-03-11T08:32:34Z
2023-09-22T06:12:25Z
https://github.com/gpac/gpac/issues/1703
828,921,799
1,703
CVE-2021-31255
2021-04-19T19:15:18.140
Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/758135e91e623d7dfe7f6aaad7aeb3f791b7a4e5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1733
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]heap-buffer-overflow in abst_box_read
https://api.github.com/repos/gpac/gpac/issues/1733/comments
0
2021-04-08T04:06:31Z
2023-09-22T06:12:52Z
https://github.com/gpac/gpac/issues/1733
853,037,318
1,733
CVE-2021-31256
2021-04-19T19:15:18.203
Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2da2f68bffd51d89b1d272d22aa8cc023c1c066e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1705
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]memory leak with MP4Box
https://api.github.com/repos/gpac/gpac/issues/1705/comments
1
2021-03-12T02:25:29Z
2023-09-22T06:16:27Z
https://github.com/gpac/gpac/issues/1705
829,695,046
1,705
CVE-2021-31257
2021-04-19T19:15:18.267
The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1734
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box HintFile
https://api.github.com/repos/gpac/gpac/issues/1734/comments
0
2021-04-08T04:07:59Z
2023-09-22T06:10:12Z
https://github.com/gpac/gpac/issues/1734
853,037,887
1,734
CVE-2021-31258
2021-04-19T19:15:18.327
The gf_isom_set_extraction_slc function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ebfa346eff05049718f7b80041093b4c5581c24e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1706
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference issue with MP4Box
https://api.github.com/repos/gpac/gpac/issues/1706/comments
0
2021-03-12T06:50:09Z
2023-09-22T06:13:06Z
https://github.com/gpac/gpac/issues/1706
829,813,689
1,706
CVE-2021-31259
2021-04-19T19:15:18.373
The gf_isom_cenc_get_default_info_internal function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/3b84ffcbacf144ce35650df958432f472b6483f8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1735
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box gf_isom_cenc_get_default_info_internal
https://api.github.com/repos/gpac/gpac/issues/1735/comments
0
2021-04-08T07:10:40Z
2023-09-22T06:08:25Z
https://github.com/gpac/gpac/issues/1735
853,144,448
1,735
CVE-2021-31260
2021-04-19T19:15:18.437
The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/df8fffd839fe5ae9acd82d26fd48280a397411d9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1736
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box MergeTrack
https://api.github.com/repos/gpac/gpac/issues/1736/comments
0
2021-04-08T07:11:57Z
2023-09-22T06:09:11Z
https://github.com/gpac/gpac/issues/1736
853,145,443
1,736
CVE-2021-31261
2021-04-19T19:15:18.517
The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/cd3738dea038dbd12e603ad48cd7373ae0440f65" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1737
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]memory leak with MP4Box
https://api.github.com/repos/gpac/gpac/issues/1737/comments
0
2021-04-09T00:56:24Z
2023-09-22T06:11:57Z
https://github.com/gpac/gpac/issues/1737
854,055,228
1,737
CVE-2021-31262
2021-04-19T19:15:18.577
The AV1_DuplicateConfig function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b2eab95e07cb5819375a50358d4806a8813b6e50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1738
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in AV1_DuplicateConfig
https://api.github.com/repos/gpac/gpac/issues/1738/comments
0
2021-04-09T00:57:41Z
2023-09-22T06:13:19Z
https://github.com/gpac/gpac/issues/1738
854,055,702
1,738
CVE-2021-29279
2021-04-19T20:15:14.287
There is a integer overflow in function filter_core/filter_props.c:gf_props_assign_value in GPAC 1.0.1. In which, the arg const GF_PropertyValue *value,maybe value->value.data.size is a negative number. In result, memcpy in gf_props_assign_value failed.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/da69ad1f970a7e17c865eaec9af98cc84df10d5b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1718
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a integer overflow in function `filter_core/filter_props.c:gf_props_assign_value`. In which, the arg `const GF_PropertyValue *value`,maybe value->value.data.size is a negative number. In result, memcpy in gf_props_assign_value failed. More, this bug may result a heap overflow with crafted file. In comman...
A integer overflow in function filter_core/filter_props.c:gf_props_assign_value
https://api.github.com/repos/gpac/gpac/issues/1718/comments
1
2021-03-28T14:19:47Z
2021-03-29T07:46:09Z
https://github.com/gpac/gpac/issues/1718
842,748,388
1,718
CVE-2021-30014
2021-04-19T20:15:14.363
There is a integer overflow in media_tools/av_parsers.c in the hevc_parse_slice_segment function in GPAC 1.0.1 which results in a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1721
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a integer overflow in media_tools/av_parsers.c:6568, function hevc_parse_slice_segment. Below code: ` pps_id = gf_bs_read_ue_log(bs, "pps_id"); if (pps_id >= 64) return -1; pps = &hevc->pps[pps_id]; sps = &hevc->sps[pps->sps_id]; si->sps = sps; si->pps = pps; ` However, function may return...
A Integer number overflow in function hevc_parse_slice_segment.
https://api.github.com/repos/gpac/gpac/issues/1721/comments
1
2021-03-29T06:03:15Z
2021-03-29T07:46:55Z
https://github.com/gpac/gpac/issues/1721
843,003,944
1,721
CVE-2021-30015
2021-04-19T20:15:14.427
There is a Null Pointer Dereference in function filter_core/filter_pck.c:gf_filter_pck_new_alloc_internal in GPAC 1.0.1. The pid comes from function av1dmx_parse_flush_sample, the ctx.opid maybe NULL. The result is a crash in gf_filter_pck_new_alloc_internal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/13dad7d5ef74ca2e6fe4010f5b03eb12e9bbe0ec" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1719
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a `Null Pointer Dereference` in function `filter_core/filter_pck.c:104:gf_filter_pck_new_alloc_internal`, The `pid` comes from function `av1dmx_parse_flush_sample`, the `ctx.opid` maybe NULL. Result a crash in `gf_filter_pck_new_alloc_internal`. In command line: gpac -info bug2 ![bug2_cmd](https://use...
A Null Pointer Dereference In gf_filter_pck_new_alloc_internal
https://api.github.com/repos/gpac/gpac/issues/1719/comments
0
2021-03-29T05:24:39Z
2021-03-29T07:45:00Z
https://github.com/gpac/gpac/issues/1719
842,980,682
1,719
CVE-2021-30019
2021-04-19T20:15:14.490
In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
In `filters/reframe_adts.c`, function `adts_dmx_process`. There is a sub codes like as below: ` size = ctx->hdr.frame_size - ctx->hdr.hdr_size; offset = ctx->hdr.hdr_size; ...... memcpy(output, sync + offset, size); ` However, with crafted file, ctx->hdr.frame_size may be smaller than ctx->hdr.hdr_size. S...
A integer (heap) overflow in function adts_dmx_process
https://api.github.com/repos/gpac/gpac/issues/1723/comments
1
2021-03-29T07:23:30Z
2021-03-29T07:47:23Z
https://github.com/gpac/gpac/issues/1723
843,060,662
1,723
CVE-2021-30020
2021-04-19T20:15:14.550
In the function gf_hevc_read_pps_bs_internal function in media_tools/av_parsers.c in GPAC 1.0.1 there is a loop, which with crafted file, pps->num_tile_columns may be larger than sizeof(pps->column_width), which results in a heap overflow in the loop.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1722
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
In `media_tools/av_parsers.c`, function `gf_hevc_read_pps_bs_internal`. There is a loop as below: ` pps->num_tile_columns = 1 + gf_bs_read_ue_log(bs, "num_tile_columns_minus1"); pps->num_tile_rows = 1 + gf_bs_read_ue_log(bs, "num_tile_rows_minus1"); pps->uniform_spacing_flag = gf_bs_read_int_log(bs, 1, "un...
A heap overflow in function gf_hevc_read_pps_bs_internal
https://api.github.com/repos/gpac/gpac/issues/1722/comments
1
2021-03-29T06:29:39Z
2021-03-29T07:47:09Z
https://github.com/gpac/gpac/issues/1722
843,020,967
1,722
CVE-2021-30022
2021-04-19T20:15:14.647
There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1720
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a integer overflow in `media_tools/av_parsers.c:5349`, function `gf_avc_read_pps_bs_internal`. Below code: `pps_id = gf_bs_read_ue_log(bs, "pps_id"); if (pps_id >= 255) { return -1; } pps = &avc->pps[pps_id]; pps->id = pps_id; ` pps_id may be a negative number, so will not return. However, avc->...
A Integer Overflow in function gf_avc_read_pps_bs_internal
https://api.github.com/repos/gpac/gpac/issues/1720/comments
1
2021-03-29T05:34:17Z
2021-03-29T07:46:46Z
https://github.com/gpac/gpac/issues/1720
842,986,600
1,720
CVE-2021-30199
2021-04-19T20:15:14.707
In filters/reframe_latm.c in GPAC 1.0.1 there is a Null Pointer Dereference, when gf_filter_pck_get_data is called. The first arg pck may be null with a crafted mp4 file,which results in a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b2db2f99b4c30f96e17b9a14537c776da6cb5dca" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1728
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
In filters/reframe_latm.c:480. There is a Null Pointer Dereference, when call `gf_filter_pck_get_data`. The first arg pck may be null with a crafted mp4 file. As below code shows: ` if (!pck) { if (gf_filter_pid_is_eos(ctx->ipid)) { // check1 if (!ctx->latm_buffer_size) { // check2 if (ctx->op...
A Null Pointer Dereference In function gf_filter_pck_get_data
https://api.github.com/repos/gpac/gpac/issues/1728/comments
0
2021-04-02T10:42:56Z
2021-04-08T08:21:38Z
https://github.com/gpac/gpac/issues/1728
849,144,670
1,728
CVE-2020-35979
2021-04-21T16:15:08.647
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b15020f54aff24aaeb64b80771472be8e64a7adc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1662
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and latest V1.0.1 d8538e8) I think it is probably due to an imcomplete fix of [#1483](https://github.com/gpac/gpac/issues/1483) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --s...
AddressSanitizer: heap-buffer-overflow in gp_rtp_builder_do_avc ietf/rtp_pck_mpeg4.c:436
https://api.github.com/repos/gpac/gpac/issues/1662/comments
0
2020-12-15T12:02:59Z
2021-01-04T11:04:52Z
https://github.com/gpac/gpac/issues/1662
767,522,021
1,662
CVE-2020-35980
2021-04-21T16:15:08.687
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is a use-after-free in the function gf_isom_box_del() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/5aba27604d957e960d8069d85ccaf868f8a7b07a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1661
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and the latest V1.0.1 d8538e8) I think it is probably due to an imcomplete fix of [#1340](https://github.com/gpac/gpac/issues/1340) 、[#1440](https://github.com/gpac/gpac/issues/1440) and [#1332](https://github.com/gpac/gpac/issues/13...
AddressSanitizer: heap-use-after-free in gf_isom_box_del isomedia/box_funcs.c:1696
https://api.github.com/repos/gpac/gpac/issues/1661/comments
0
2020-12-15T12:01:23Z
2021-01-04T11:04:52Z
https://github.com/gpac/gpac/issues/1661
767,520,741
1,661
CVE-2020-35981
2021-04-21T16:15:08.720
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is an invalid pointer dereference in the function SetupWriters() in isomedia/isom_store.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/dae9900580a8888969481cd72035408091edb11b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1659
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and the latest V1.0.1 d8538e8) I think it is probably due to an imcomplete fix of [#1485](https://github.com/gpac/gpac/issues/1485) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configu...
A NULL pointer dereference in the function SetupWriters isomedia/isom_store.c:171
https://api.github.com/repos/gpac/gpac/issues/1659/comments
0
2020-12-15T11:57:41Z
2021-01-04T11:04:51Z
https://github.com/gpac/gpac/issues/1659
767,517,846
1,659
CVE-2020-35982
2021-04-21T16:15:08.757
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is an invalid pointer dereference in the function gf_hinter_track_finalize() in media_tools/isom_hinter.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/a4eb327049132359cae54b59faec9e2f14c5a619" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1660
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and the latest V1.0.1 d8538e8) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box --extra-ldflags="-ldl -g" $ make ``` Run Command: ``` $ MP4Box -hint $gf_hinter_tra...
A NULL pointer dereference in the function gf_hinter_track_finalize in media_tools/isom_hinter.c:970
https://api.github.com/repos/gpac/gpac/issues/1660/comments
0
2020-12-15T11:59:14Z
2021-01-04T11:04:52Z
https://github.com/gpac/gpac/issues/1660
767,519,058
1,660
CVE-2020-23912
2021-04-21T18:15:08.207
An issue was discovered in Bento4 through v1.6.0-637. A NULL pointer dereference exists in the function AP4_StszAtom::GetSampleSize() located in Ap4StszAtom.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/540" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "9684D8EA-E280-40A0-BB75-E7AFB950B234", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-637", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/540
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), mp42aac (latest master [174b94](https://github.com/axiomatic-systems/Bento4/commit/174b948be29b69009b235ae0aa92884d05bcea49)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS...
A Segmentation fault in Ap4StszAtom.cpp:154
https://api.github.com/repos/axiomatic-systems/Bento4/issues/540/comments
0
2020-08-01T02:45:57Z
2020-08-01T02:45:57Z
https://github.com/axiomatic-systems/Bento4/issues/540
670,451,905
540
CVE-2020-23928
2021-04-21T18:15:08.383
An issue was discovered in gpac before 1.0.1. The abst_box_read function in box_code_adobe.c has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8e05648d6b4459facb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1568
[ "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A heap-buffer-overflow in box_code_adobe.c:124
https://api.github.com/repos/gpac/gpac/issues/1568/comments
0
2020-08-07T04:41:36Z
2020-09-01T15:10:21Z
https://github.com/gpac/gpac/issues/1568
674,752,234
1,568
CVE-2020-23928
2021-04-21T18:15:08.383
An issue was discovered in gpac before 1.0.1. The abst_box_read function in box_code_adobe.c has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8e05648d6b4459facb...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1569
[ "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A heap-buffer-overflow in box_code_adobe.c:141
https://api.github.com/repos/gpac/gpac/issues/1569/comments
1
2020-08-07T14:53:11Z
2020-09-01T15:16:27Z
https://github.com/gpac/gpac/issues/1569
675,069,002
1,569
CVE-2020-23930
2021-04-21T18:15:08.417
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function nhmldump_send_header located in write_nhml.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/9eeac00b38348c664dfeae2525bba0cf1bc32349" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1565"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1565
[ "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A Segmentation fault in write_nhml.c:401
https://api.github.com/repos/gpac/gpac/issues/1565/comments
1
2020-08-07T02:28:14Z
2020-09-01T14:46:28Z
https://github.com/gpac/gpac/issues/1565
674,711,009
1,565
CVE-2020-23931
2021-04-21T18:15:08.460
An issue was discovered in gpac before 1.0.1. The abst_box_read function in box_code_adobe.c has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1564
[ "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address -ldl" ./configure --static-mp4box ## Command line ./bin/gcc/MP4...
A heap-buffer-overflow in box_code_adobe.c:109
https://api.github.com/repos/gpac/gpac/issues/1564/comments
1
2020-08-07T01:48:18Z
2020-09-01T14:43:15Z
https://github.com/gpac/gpac/issues/1564
674,698,771
1,564
CVE-2020-23931
2021-04-21T18:15:08.460
An issue was discovered in gpac before 1.0.1. The abst_box_read function in box_code_adobe.c has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1567
[ "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A heap-buffer-overflow in box_code_adobe.c:155
https://api.github.com/repos/gpac/gpac/issues/1567/comments
1
2020-08-07T04:38:51Z
2020-09-01T15:06:33Z
https://github.com/gpac/gpac/issues/1567
674,751,358
1,567
CVE-2020-23932
2021-04-21T18:15:08.497
An issue was discovered in gpac before 1.0.1. A NULL pointer dereference exists in the function dump_isom_sdp located in filedump.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ce01bd15f711d4575b7424b54b3a395ec64c1784" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1566
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A Segmentation fault in filedump.c:1627
https://api.github.com/repos/gpac/gpac/issues/1566/comments
0
2020-08-07T03:10:20Z
2020-09-01T15:10:21Z
https://github.com/gpac/gpac/issues/1566
674,723,890
1,566
CVE-2020-18035
2021-04-29T23:15:07.910
Cross Site Scripting (XSS) in Jeesns v1.4.2 allows remote attackers to execute arbitrary code by injecting commands into the "CKEditorFuncNum" parameter in the component "CkeditorUploadController.java".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zchuanzhao/jeesns/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B915B828-8E24-4789-9FC4-BFB178A61BF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/zchuanzhao/jeesns/issues/8
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zchuanzhao", "jeesns" ]
您好: 我是360代码卫士的工作人员,在我们的开源项目的代码审计中发现jeesns存在xss漏洞,详细信息如下: 在CkeditorUploadController.java文件的32行处获取了请求中的CKEditorFuncNum参数,最后在41行处输出在页面上导致了xss漏洞。 ![default](https://user-images.githubusercontent.com/39950310/50393679-c8620f00-0792-11e9-9c1e-330857ede754.png) 虽然项目中存在xss拦截器 ![default](https://user-images.git...
反射型xss
https://api.github.com/repos/lxinet/jeesns/issues/8/comments
1
2018-12-24T07:48:19Z
2018-12-26T09:16:24Z
https://github.com/lxinet/jeesns/issues/8
393,829,639
8
CVE-2020-18084
2021-04-30T21:15:08.300
Cross Site Scripting (XSS) in yzmCMS v5.2 allows remote attackers to execute arbitrary code by injecting commands into the "referer" field of a POST request to the component "/member/index/login.html" when logging in.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2E1FE25-3E00-4952-8D4F-A4943757C803", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
xss payload: "><script>alert(1)</script><" POC: ``` POST /member/index/login.html HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:64.0) Gecko/20100101 Firefox/64.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0...
There is a XSS vulnerability discovered in yzmcms v5.2
https://api.github.com/repos/yzmcms/yzmcms/issues/9/comments
1
2019-01-25T15:40:33Z
2021-05-02T12:04:36Z
https://github.com/yzmcms/yzmcms/issues/9
403,209,544
9
CVE-2020-23369
2021-05-10T23:15:07.177
In YzmCMS 5.6, XSS was discovered in member/member_content/init.html via the SRC attribute of an IFRAME element because of using UEditor 1.4.3.3.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/46" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "2ADF1F0A-5DA0-4A8F-A2EB-F8585263E98A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/46
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
**Description** In YzmCMS 5.6, XSS in edit article page via the SRC attribute of an IFRAME element because of using UEditor 1.4.3.3. **PoC** ```html <iframe src="javascript:alert(document.cookie)"></iframe> ``` Script tags are filtered, but iframe tags are not: ![1](https://user-images.githubuserconten...
XSS exists in YzmCMS V5.6
https://api.github.com/repos/yzmcms/yzmcms/issues/46/comments
1
2020-05-22T17:05:17Z
2020-05-23T03:36:53Z
https://github.com/yzmcms/yzmcms/issues/46
623,363,000
46
CVE-2020-23370
2021-05-10T23:15:07.210
In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/45" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "2ADF1F0A-5DA0-4A8F-A2EB-F8585263E98A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/45
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
**Description** In YzmCMS 5.6, Stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected arbitrary web script or HTML. **PoC** In yzmcms\common\static\plugin\ueditor\1.4.3.3\php\config.jso...
A Stored XSS exists in YzmCMS V5.6
https://api.github.com/repos/yzmcms/yzmcms/issues/45/comments
1
2020-05-22T16:55:04Z
2020-05-23T03:37:03Z
https://github.com/yzmcms/yzmcms/issues/45
623,355,001
45
CVE-2021-32615
2021-05-13T23:15:07.337
Piwigo 11.4.0 allows admin/user_list_backend.php order[0][dir] SQL Injection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/commit/2ce1e5952238eba0fe5c5d6537ebdc76cb970b52" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:11.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B9E1456D-0916-4CBB-BE90-A5AE7E099A38", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1410
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
As reported by Harry Goodman from NCC Group: > The ‘order[0][dir]’ parameter in admin/user_list_backend.php is vulnerable to SQL injection > > I believe this is because of the following pieces of code: ``` 68 if ( $_REQUEST['columns'][$col]["searchable"] == "true" ) 69 { 70 $sOrder .= $aColumns[ $col...
[11.x, user manager] SQL injection
https://api.github.com/repos/Piwigo/Piwigo/issues/1410/comments
0
2021-05-13T10:37:45Z
2021-05-13T10:40:24Z
https://github.com/Piwigo/Piwigo/issues/1410
890,930,565
1,410
CVE-2021-32613
2021-05-14T13:15:07.377
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959939" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C56CF402-E77E-49D6-AD9A-F9AF3D397230", "versionEndExcluding": null, "versionEndIncluding": "5.3.0", "versionStartExcludin...
https://github.com/radareorg/radare2/issues/18666
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ```sh fuzz@fuzz:~/fuzz$ date Fri 07 May 2021 12:59:49 PM UTC fuzz@fuzz:~/fuzz$ r2 -v radare2 5.3.0-git 26142 @ linux-x86-64 git.5.2.1 commit: 518bf6664cedcb3035c9c47388b4fa03bba66748 build: 2021-05-07__12:55:47 fuzz@fuzz:~/fuzz$ uname -ms Linux x86_64 ``` ## Description <!-- Explain what...
Heap-use-after-free bug on .pyc parser
https://api.github.com/repos/radareorg/radare2/issues/18666/comments
0
2021-05-07T13:24:58Z
2021-05-07T19:10:25Z
https://github.com/radareorg/radare2/issues/18666
879,000,069
18,666
CVE-2021-32613
2021-05-14T13:15:07.377
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959939" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C56CF402-E77E-49D6-AD9A-F9AF3D397230", "versionEndExcluding": null, "versionEndIncluding": "5.3.0", "versionStartExcludin...
https://github.com/radareorg/radare2/issues/18667
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ```sh fuzz@fuzz:~/fuzz/issue$ date Fri 07 May 2021 01:44:26 PM UTC fuzz@fuzz:~/fuzz/issue$ r2 -v radare2 5.3.0-git 26142 @ linux-x86-64 git.5.2.1 commit: 518bf6664cedcb3035c9c47388b4fa03bba66748 build: 2021-05-07__12:55:47 fuzz@fuzz:~/fuzz/issue$ uname -ms Linux x86_64 ``` ## Description ...
Floating point exception on Mach-O parser
https://api.github.com/repos/radareorg/radare2/issues/18667/comments
1
2021-05-07T14:01:34Z
2021-05-07T16:45:40Z
https://github.com/radareorg/radare2/issues/18667
879,062,089
18,667
CVE-2021-32613
2021-05-14T13:15:07.377
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "patrick@puiterwijk.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959939" }, { "source": "patrick@puiterwijk.org", "tags": [ "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C56CF402-E77E-49D6-AD9A-F9AF3D397230", "versionEndExcluding": null, "versionEndIncluding": "5.3.0", "versionStartExcludin...
https://github.com/radareorg/radare2/issues/18679
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
## Environment ```sh # copypaste this script into your shell and replace it with the output fuzz@fuzz:~/fuzz/issue$ date Tue 11 May 2021 11:50:43 AM UTC fuzz@fuzz:~/fuzz/issue$ r2 -v radare2 5.3.0-git 26277 @ linux-x86-64 git.5.2.1 commit: 708e5c986ce686b01b84a6162f1cec1429ea8198 build: 2021-05-11__09:03:45 f...
Heap memory bugs on pyc parse
https://api.github.com/repos/radareorg/radare2/issues/18679/comments
2
2021-05-11T12:22:26Z
2021-05-25T08:32:59Z
https://github.com/radareorg/radare2/issues/18679
887,107,096
18,679
CVE-2020-24119
2021-05-14T21:15:07.247
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/upx/upx/issues/388
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
Author: giantbranch of NSFOCUS Security Team ## What's the problem (or question)? A heap buffer overflow read in the latest commit [4e1ae22a1a07be5135c68b25ff05058ae8ae48e1](https://github.com/upx/upx/commit/4e1ae22a1a07be5135c68b25ff05058ae8ae48e1) of the devel branch ASAN reports: ``` ==6518==ERROR: Address...
Heap buffer overflow in get_le32()
https://api.github.com/repos/upx/upx/issues/388/comments
1
2020-07-22T09:10:40Z
2020-08-06T07:29:29Z
https://github.com/upx/upx/issues/388
663,602,931
388
CVE-2020-21813
2021-05-17T18:15:07.450
A heap based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via output_TEXT ../../programs/dwg2SVG.c:114.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://libredwg.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890969
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
CVE-2020-21814
2021-05-17T19:15:07.457
A heap based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlwescape ../../programs/escape.c:97.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/182#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
CVE-2020-21815
2021-05-17T19:15:07.490
A null pointer deference issue exists in GNU LibreDWG 0.10.2641 via output_TEXT ../../programs/dwg2SVG.c:114, which causes a denial of service (application crash).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/182#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890932
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
CVE-2020-21816
2021-05-17T19:15:07.520
A heab based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:46.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/182#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
CVE-2020-21817
2021-05-17T19:15:07.550
A null pointer dereference issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:29. which causes a denial of service (application crash).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/182#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issue-547887727
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
CVE-2020-21818
2021-05-17T19:15:07.580
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:48.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/182#issuecomment-5728910...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
CVE-2020-21819
2021-05-17T19:15:07.610
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10.2641via htmlescape ../../programs/escape.c:51.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/182#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.2641:*:*:*:*:*:*:*", "matchCriteriaId": "767F5F8A-A209-4A53-B40E-4C30602BA5CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_7b9cb829/id:000013%2Csig:06%2Csrc:000000%2Cop:flip1%2Cpos:46417 A...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/182/comments
9
2020-01-10T06:17:10Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/182
547,887,727
182
CVE-2020-21827
2021-05-17T20:15:07.413
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2379.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
I found a bug in dwg2dxf. POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_69b5609/id:000000%2Csig:06%2Csrc:000001%2Cop:flip4%2Cpos:27167 ``` ==29243==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6140000005b2 at pc 0x7ffafa9dc77a bp 0x7ffcc19b07e0 sp 0x7ffcc19aff88 WRITE of size 126 ...
Heap over flow
https://api.github.com/repos/LibreDWG/libredwg/issues/183/comments
2
2020-01-13T02:49:42Z
2020-01-16T12:12:04Z
https://github.com/LibreDWG/libredwg/issues/183
548,674,750
183
CVE-2020-21830
2021-05-17T21:15:07.297
A heap based buffer overflow vulneraibility exists in GNU LibreDWG 0.10 via bit_calc_CRC ../../src/bits.c:2213.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493134
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188