cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2020-21832
2021-05-17T21:15:07.337
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2417.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492612
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21833
2021-05-17T21:15:07.367
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via: read_2004_section_classes ../../src/decode.c:2440.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://libredwg.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493364
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21834
2021-05-17T21:15:07.400
A null pointer deference issue exists in GNU LibreDWG 0.10 via get_bmp ../../programs/dwgbmp.c:164.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21835
2021-05-17T21:15:07.433
A null pointer deference issue exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2337.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493046
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21836
2021-05-17T21:15:07.463
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_preview ../../src/decode.c:3175.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493437
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21838
2021-05-17T21:15:07.493
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via: read_2004_section_appinfo ../../src/decode.c:2842.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://libredwg.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492816
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21839
2021-05-17T21:15:07.523
An issue was discovered in GNU LibreDWG 0.10. Crafted input will lead to an memory leak in dwg_decode_eed ../../src/decode.c:3638.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/401.html" }, { "source": "cve@mitre.org", "tags": [ "E...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492707
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21840
2021-05-17T21:15:07.557
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_search_sentinel ../../src/bits.c:1985.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://libredwg.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493513
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21841
2021-05-17T21:15:07.587
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_read_B ../../src/bits.c:135.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://libredwg.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493775
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21831
2021-05-17T22:15:07.377
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_handles ../../src/decode.c:2637.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493267
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21842
2021-05-17T22:15:07.407
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_section_revhistory ../../src/decode.c:3051.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issuecomment...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493684
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21843
2021-05-17T22:15:07.437
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_read_RC ../../src/bits.c:318.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493857
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-21844
2021-05-17T22:15:07.463
GNU LibreDWG 0.10 is affected by: memcpy-param-overlap. The impact is: execute arbitrary code (remote). The component is: read_2004_section_header ../../src/decode.c:2580.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://gnu.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/188#issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C3E7D34E-1D80-4CF0-8110-412C6D8514EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493607
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode.c:2417** POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_4c26d37/id:000012%2Csig:06%2Csrc:002489%2Cop:havoc...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/188/comments
15
2020-01-15T04:37:59Z
2020-01-16T23:22:04Z
https://github.com/LibreDWG/libredwg/issues/188
549,961,224
188
CVE-2020-23851
2021-05-18T15:15:07.693
A stack-based buffer overflow vulnerability exists in ffjpeg through 2020-07-02 in the jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c:513:28, which could cause a denial of service by submitting a malicious jpeg image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E679FF3C-4633-414C-8747-A64C143F210E", "versionEndExcluding": null, "versionEndIncluding": "2020-07-02", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/27
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
ffjpeg "jfif_decode" function stack-buffer-overflow vulerability Description: There is a stack-buffer-overflow bug in jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c:513:28 An attacker can exploit this bug to cause a Denial of Service (DoS) by submitting a malicious jpeg image. The bug is caused b...
ffjpeg "jfif_decode" function stack-buffer-overflow vulerability
https://api.github.com/repos/rockcarry/ffjpeg/issues/27/comments
1
2020-07-02T10:41:13Z
2020-07-27T08:22:45Z
https://github.com/rockcarry/ffjpeg/issues/27
649,828,421
27
CVE-2020-23852
2021-05-18T15:15:07.847
A heap based buffer overflow vulnerability exists in ffjpeg through 2020-07-02 in the jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c (line 544 & line 545), which could cause a denial of service by submitting a malicious jpeg image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E679FF3C-4633-414C-8747-A64C143F210E", "versionEndExcluding": null, "versionEndIncluding": "2020-07-02", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
ffjpeg "jfif_decode" function heap-overflow vulnerabilities Description: There are two heap-overflow bugs in jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c: line 544 & line 545 An attacker can exploit this bug to cause a Denial of Service (DoS) by submitting a malicious jpeg image. We finded the i...
ffjpeg "jfif_decode" function heap-overflow vulnerabilities
https://api.github.com/repos/rockcarry/ffjpeg/issues/28/comments
1
2020-07-02T11:43:44Z
2020-07-27T08:24:56Z
https://github.com/rockcarry/ffjpeg/issues/28
649,865,490
28
CVE-2020-20951
2021-05-18T16:15:07.463
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/434.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/84" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/pluck-cms/pluck/issues/84
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
This vulnerability applies to php5.2. X ![图片](https://user-images.githubusercontent.com/52944911/67195641-e092d100-f42b-11e9-9a79-20d600f7f42e.png) After the installation is successful, go to the management background ![图片](https://user-images.githubusercontent.com/52944911/67195698-01f3bd00-f42c-11e9-99c5-8d955...
Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability when uploading files
https://api.github.com/repos/pluck-cms/pluck/issues/84/comments
1
2019-10-21T11:36:30Z
2019-11-01T18:59:31Z
https://github.com/pluck-cms/pluck/issues/84
509,905,689
84
CVE-2020-23861
2021-05-18T16:15:07.497
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/248" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "66367632-FED7-46AB-8C8F-864603ABD73C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/LibreDWG/libredwg/issues/248
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
LibreDWG "read_system_page" function heap overflow vulnerability Description: There is a heap overflow bug in "read_system_page" function at libredwg-0.10.1/src/decode_r2007.c:666:5 An attacker can exploit this bug to cause a Denial of Service (DoS) by submitting a dwg file. This bug is caused by the following da...
LibreDWG "read_system_page" function heap overflow vulnerability
https://api.github.com/repos/LibreDWG/libredwg/issues/248/comments
6
2020-07-18T12:19:50Z
2020-07-21T13:02:44Z
https://github.com/LibreDWG/libredwg/issues/248
660,117,543
248
CVE-2020-24740
2021-05-18T16:15:07.527
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/81" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*", "matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/pluck-cms/pluck/issues/81
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
CSRF POC: ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://127.0.0.1/pluck/admin.php?action=editpage&page=111" method="POST"> <input type="hidden" name="title" value="evil" /> <input type="hidden...
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage
https://api.github.com/repos/pluck-cms/pluck/issues/81/comments
5
2019-10-21T08:14:08Z
2019-11-01T18:57:30Z
https://github.com/pluck-cms/pluck/issues/81
509,802,703
81
CVE-2020-21345
2021-05-20T17:15:07.517
Cross Site Scripting (XSS) vulnerability in Halo 1.1.3 via post publish components in the manage panel, which lets a remote malicious user execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:-:*:*:*:*:*:*", "matchCriteriaId": "1CB4664A-F423-4172-B79D-C082E4DDBC76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/336
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://halo.run/docs) - [x] [Halo 论坛](https://bbs.halo.run) - [x] [Github Wiki 常见问题](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%8...
后台添加文章XSS,上传头像处可以上传任意文件
https://api.github.com/repos/halo-dev/halo/issues/336/comments
1
2019-10-15T13:56:16Z
2019-10-17T12:28:28Z
https://github.com/halo-dev/halo/issues/336
507,262,618
336
CVE-2020-23765
2021-05-21T18:15:07.893
A file upload vulnerability was discovered in the file path /bl-plugins/backup/plugin.php on Bludit version 3.12.0. If an attacker is able to gain Administrator rights they will be able to use unsafe plugins to upload a backup file and control the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1218" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1218
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe your problem A file upload vulnerability was discovered in Bludit V3.12.0 Hackers need administrator rights. Hacker can use a backup file to control the server. ### Steps to reproduce the problem 1. Download the latest version of bludit from GitHub. 2. Using burpsuite when uploading logo in the...
Bludit V3.12.0 -- Admin File Upload vulnerability
https://api.github.com/repos/bludit/bludit/issues/1218/comments
2
2020-06-27T17:44:40Z
2020-08-25T05:41:08Z
https://github.com/bludit/bludit/issues/1218
646,723,476
1,218
CVE-2021-30500
2021-05-27T00:15:08.483
Null pointer dereference was found in upx PackLinuxElf::canUnpack() in p_lx_elf.cpp,in version UPX 4.0.0. That allow attackers to execute arbitrary code and cause a denial of service via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948692" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/upx/upx/issues/485
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? Null pointer dereference was discovered in upx in the latest commit of the devel branch. [2638bee] ...
PackLinuxElf::canUnpack did not check for ELF input
https://api.github.com/repos/upx/upx/issues/485/comments
0
2021-04-07T02:45:58Z
2021-04-23T06:55:47Z
https://github.com/upx/upx/issues/485
851,952,822
485
CVE-2021-30501
2021-05-27T00:15:08.527
An assertion abort was found in upx MemBuffer::alloc() in mem.cpp, in version UPX 4.0.0. The flow allows attackers to cause a denial of service (abort) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948696" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/upx/upx/issues/486
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggest...
MemBuffer assertions again in function MemBuffer::alloc()
https://api.github.com/repos/upx/upx/issues/486/comments
0
2021-04-07T07:13:11Z
2021-04-23T06:56:03Z
https://github.com/upx/upx/issues/486
852,090,320
486
CVE-2021-31525
2021-05-27T13:15:08.207
net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/45710" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCA080B5-DEFB-462A-8908-2EBD5D2075D8", "versionEndExcluding": "1.15.12", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/golang/go/issues/45710
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
`ReadRequest` and `ReadResponse` in net/http can hit an unrecoverable panic when reading a very large header (over 7MB on 64-bit architectures, or over 4MB on 32-bit ones). `Transport` and `Client` are vulnerable and the program can be made to crash by a malicious server. `Server` is not vulnerable by default, but can ...
net/http: ReadRequest can stack overflow due to recursion with very large headers
https://api.github.com/repos/golang/go/issues/45710/comments
10
2021-04-22T19:53:59Z
2022-06-23T10:41:20Z
https://github.com/golang/go/issues/45710
865,413,512
45,710
CVE-2020-18392
2021-05-28T21:15:08.260
Stack overflow vulnerability in parse_array Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/674.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mj...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "22E31949-CED4-4383-B68C-5913872BA53A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/106
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
POCs: https://github.com/ntu-sec/pocs/blob/master/mjs-8d847f2/crashes/so_mjs.c%3A14225_1.js https://github.com/ntu-sec/pocs/blob/master/mjs-8d847f2/crashes/so_mjs.c%3A14225_2.js ASAN output: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==31959==ERROR: Addr...
AddressSanitizer: stack-overflow at mjs.c:14225
https://api.github.com/repos/cesanta/mjs/issues/106/comments
2
2018-07-03T06:21:09Z
2021-06-01T18:04:03Z
https://github.com/cesanta/mjs/issues/106
337,760,000
106
CVE-2020-36367
2021-05-28T21:15:08.370
Stack overflow vulnerability in parse_block Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "22E31949-CED4-4383-B68C-5913872BA53A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/135
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
An issue was discovered in mjs.c 1.20.1. Stack Exhaustion occurs in mjs_mk_string function, and there is a stack consumption problem caused by recursive stack frames POC: [POC.zip](https://github.com/cesanta/mjs/files/3226071/POC.zip) ASAN output: ``` AddressSanitizer:DEADLYSIGNAL ============================...
AddressSanitizer: stack-overflow on recursive stack frames: parse_block, parse_statement, parse_statement_list
https://api.github.com/repos/cesanta/mjs/issues/135/comments
1
2019-05-28T07:23:36Z
2019-05-31T12:47:42Z
https://github.com/cesanta/mjs/issues/135
449,103,722
135
CVE-2020-36370
2021-05-28T21:15:08.470
Stack overflow vulnerability in parse_unary Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "22E31949-CED4-4383-B68C-5913872BA53A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
POC: [POC.zip](https://github.com/cesanta/mjs/files/3226091/POC.zip) ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==23779==ERROR: AddressSanitizer: stack-overflow on address 0x7ffcd8b22f68 (pc 0x0000005a63b8 bp 0x7ffcd8b23110 sp 0x7ffcd8b22f68 T0) #0...
AddressSanitizer: stack-overflow on recursive stack frames: parse_unary, parse_mul_div_rem, parse_plus_minus...
https://api.github.com/repos/cesanta/mjs/issues/136/comments
1
2019-05-28T07:28:05Z
2019-05-31T12:47:52Z
https://github.com/cesanta/mjs/issues/136
449,105,468
136
CVE-2020-35970
2021-06-03T21:15:07.837
An issue was discovered in YzmCMS 5.8. There is a SSRF vulnerability in the background collection management that allows arbitrary file read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "199ACC23-22BA-48BA-A842-66E6D1A5AA15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Log in the background management and create a new node in the collection management ![image](https://user-images.githubusercontent.com/64850343/102096574-d584d680-3e5f-11eb-9ce8-f3ae93cf0776.png) ![image](https://user-images.githubusercontent.com/64850343/102096606-de75a800-3e5f-11eb-967b-e42d715687a8.png) Add o...
There are SSRF vulnerabilities in background collection management
https://api.github.com/repos/yzmcms/yzmcms/issues/53/comments
1
2020-12-14T15:14:20Z
2021-01-24T06:14:40Z
https://github.com/yzmcms/yzmcms/issues/53
766,583,714
53
CVE-2020-35971
2021-06-03T21:15:07.887
A storage XSS vulnerability is found in YzmCMS v5.8, which can be used by attackers to inject JS code and attack malicious XSS on the /admin/system_manage/user_config_edit.html page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "199ACC23-22BA-48BA-A842-66E6D1A5AA15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Hi, I would like to report Cross Site Scripting vulnerability in YzmCMS V5.8 Description: In the content.class.php row 42, No filtering of the searinfo parameterA xss vulnerability was discovered in yzmcms. In YzmCMS v5.8, stored XSS exists via the /admin/system_manage/user_config_edit.html value parameter, which ...
YzmCMS V5.8 XSS bug
https://api.github.com/repos/yzmcms/yzmcms/issues/54/comments
1
2020-12-30T09:52:17Z
2021-01-24T06:26:45Z
https://github.com/yzmcms/yzmcms/issues/54
776,368,554
54
CVE-2020-35972
2021-06-03T21:15:07.920
An issue was discovered in YzmCMS V5.8. There is a CSRF vulnerability that can add member user accounts via member/member/add.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/55" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "199ACC23-22BA-48BA-A842-66E6D1A5AA15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/55
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
After the administrator logged in, open the following the page POC: Csrf.html ``` <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="referrer" content="never"> <title>csrf</title> </head><body> <form action="h...
There is a CSRF vulnerability to add users
https://api.github.com/repos/yzmcms/yzmcms/issues/55/comments
1
2020-12-30T12:40:28Z
2021-01-24T06:17:20Z
https://github.com/yzmcms/yzmcms/issues/55
776,437,194
55
CVE-2020-23302
2021-06-10T23:15:07.740
There is a heap-use-after-free at ecma-helpers-string.c:772 in ecma_ref_ecma_string in JerryScript 2.2.0
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3748" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3748
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error-me...
heap-use-after-free in the ecma_ref_ecma_string
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3748/comments
0
2020-05-17T03:19:15Z
2020-05-20T10:10:06Z
https://github.com/jerryscript-project/jerryscript/issues/3748
619,599,547
3,748
CVE-2020-23303
2021-06-10T23:15:07.780
There is a heap-buffer-overflow at jmem-poolman.c:165 in jmem_pools_collect_empty in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3749" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3749
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error-me...
heap-buffer-overflow in the jmem_pools_collect_empty
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3749/comments
0
2020-05-17T04:04:34Z
2020-05-20T10:10:06Z
https://github.com/jerryscript-project/jerryscript/issues/3749
619,604,019
3,749
CVE-2020-23306
2021-06-10T23:15:07.810
There is a stack-overflow at ecma-regexp-object.c:535 in ecma_regexp_match in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3753" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3753
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error...
stack-overflow in ecma_regexp_match
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3753/comments
6
2020-05-18T05:18:42Z
2020-05-26T13:29:29Z
https://github.com/jerryscript-project/jerryscript/issues/3753
619,915,696
3,753
CVE-2020-23308
2021-06-10T23:15:07.843
There is an Assertion 'context_p->stack_top_uint8 == LEXER_EXPRESSION_START' at js-parser-expr.c:3565 in parser_parse_expression in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3819" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3819
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=...
Assertion 'context_p->stack_top_uint8 == LEXER_EXPRESSION_START' in parser_parse_expression
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3819/comments
0
2020-05-31T13:53:00Z
2020-06-03T13:29:27Z
https://github.com/jerryscript-project/jerryscript/issues/3819
627,968,037
3,819
CVE-2020-23309
2021-06-10T23:15:07.877
There is an Assertion 'context_p->stack_depth == context_p->context_stack_depth' failed at js-parser-statm.c:2756 in parser_parse_statements in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3820" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3820
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=...
Assertion 'context_p->stack_depth == context_p->context_stack_depth' in parser_parse_statements
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3820/comments
0
2020-05-31T14:20:41Z
2020-06-03T13:29:27Z
https://github.com/jerryscript-project/jerryscript/issues/3820
627,972,924
3,820
CVE-2020-23310
2021-06-10T23:15:07.910
There is an Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at js-parser-statm.c:733 in parser_parse_function_statement in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3821" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3821
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=...
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' in parser_parse_function_statement
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3821/comments
0
2020-06-01T03:00:22Z
2020-06-04T09:25:26Z
https://github.com/jerryscript-project/jerryscript/issues/3821
628,117,790
3,821
CVE-2020-23311
2021-06-10T23:15:07.943
There is an Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' failed at js-parser-expr.c:3230 in parser_parse_object_initializer in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3822" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3822
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=...
Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' in parser_parse_object_initializer
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3822/comments
0
2020-06-01T03:10:23Z
2020-06-03T13:28:14Z
https://github.com/jerryscript-project/jerryscript/issues/3822
628,120,323
3,822
CVE-2020-23312
2021-06-10T23:15:07.980
There is an Assertion 'context.status_flags & PARSER_SCANNING_SUCCESSFUL' failed at js-parser.c:2185 in parser_parse_source in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3824" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3824
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=...
Assertion 'context.status_flags & PARSER_SCANNING_SUCCESSFUL' in parser_parse_source
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3824/comments
0
2020-06-01T04:16:48Z
2020-06-03T13:28:14Z
https://github.com/jerryscript-project/jerryscript/issues/3824
628,139,379
3,824
CVE-2020-23313
2021-06-10T23:15:08.020
There is an Assertion 'scope_stack_p > context_p->scope_stack_p' failed at js-scanner-util.c:2510 in scanner_literal_is_created in JerryScript 2.2.0
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3823" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3823
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=...
Assertion 'scope_stack_p > context_p->scope_stack_p' in scanner_literal_is_created
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3823/comments
0
2020-06-01T03:58:55Z
2020-06-03T13:28:14Z
https://github.com/jerryscript-project/jerryscript/issues/3823
628,134,730
3,823
CVE-2020-23314
2021-06-10T23:15:08.087
There is an Assertion 'block_found' failed at js-parser-statm.c:2003 parser_parse_try_statement_end in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3825" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3825
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=...
Assertion 'block_found' in parser_parse_try_statement_end
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3825/comments
0
2020-06-01T04:41:43Z
2020-06-03T13:28:15Z
https://github.com/jerryscript-project/jerryscript/issues/3825
628,146,890
3,825
CVE-2020-23319
2021-06-10T23:15:08.137
There is an Assertion in '(flags >> CBC_STACK_ADJUST_SHIFT) >= CBC_STACK_ADJUST_BASE || (CBC_STACK_ADJUST_BASE - (flags >> CBC_STACK_ADJUST_SHIFT)) <= context_p->stack_depth' in parser_emit_cbc_backward_branch in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3834" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3834
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision a56e31f ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
Assertion '(flags >> CBC_STACK_ADJUST_SHIFT) >= CBC_STACK_ADJUST_BASE || (CBC_STACK_ADJUST_BASE - (flags >> CBC_STACK_ADJUST_SHIFT)) <= context_p->stack_depth' in parser_emit_cbc_backward_branch
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3834/comments
0
2020-06-03T03:42:30Z
2020-06-03T13:29:27Z
https://github.com/jerryscript-project/jerryscript/issues/3834
629,668,362
3,834
CVE-2020-23320
2021-06-10T23:15:08.167
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' in parser_parse_function_arguments in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3835" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3835
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision a56e31f ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' in parser_parse_function_arguments
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3835/comments
0
2020-06-03T04:04:08Z
2020-06-03T13:28:15Z
https://github.com/jerryscript-project/jerryscript/issues/3835
629,674,784
3,835
CVE-2020-23321
2021-06-10T23:15:08.197
There is a heap-buffer-overflow at lit-strings.c:431 in lit_read_code_unit_from_utf8 in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3870" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3870
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
heap-buffer-overflow in lit_read_code_unit_from_utf8
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3870/comments
0
2020-06-06T14:03:56Z
2020-06-08T09:09:09Z
https://github.com/jerryscript-project/jerryscript/issues/3870
632,483,470
3,870
CVE-2020-23322
2021-06-10T23:15:08.257
There is an Assertion in 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' in parser_parse_object_initializer in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3869" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3869
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' in parser_parse_object_initializer
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3869/comments
0
2020-06-06T13:55:33Z
2020-06-08T08:27:43Z
https://github.com/jerryscript-project/jerryscript/issues/3869
632,478,665
3,869
CVE-2020-23323
2021-06-10T23:15:08.293
There is a heap-buffer-overflow at re-parser.c in re_parse_char_escape in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3871" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3871
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
heap-buffer-overflow in re_parse_char_escape
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3871/comments
0
2020-06-07T10:51:46Z
2020-06-08T09:09:09Z
https://github.com/jerryscript-project/jerryscript/issues/3871
633,297,568
3,871
CVE-2021-26194
2021-06-10T23:15:08.333
An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_is_lexical_environment in the ecma-helpers.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4445" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4445
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision fdaacde6 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.4.0-179-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-fla...
heap-use-after-free in ecma_is_lexical_environment
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4445/comments
0
2021-01-11T13:28:31Z
2021-01-15T19:54:09Z
https://github.com/jerryscript-project/jerryscript/issues/4445
783,371,449
4,445
CVE-2021-26195
2021-06-10T23:15:08.370
An issue was discovered in JerryScript 2.4.0. There is a heap-buffer-overflow in lexer_parse_number in js-lexer.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4442" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4442
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision fdaacde ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
heap-buffer-overflow in lexer_parse_number
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4442/comments
0
2021-01-11T13:04:23Z
2021-01-11T17:48:54Z
https://github.com/jerryscript-project/jerryscript/issues/4442
783,354,413
4,442
CVE-2021-26197
2021-06-10T23:15:08.403
An issue was discovered in JerryScript 2.4.0. There is a SEGV in main_print_unhandled_exception in main-utils.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4403" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4403
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 2faafa4 ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --...
SEGV in main_print_unhandled_exception
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4403/comments
0
2021-01-02T14:31:59Z
2021-01-08T15:03:34Z
https://github.com/jerryscript-project/jerryscript/issues/4403
777,469,465
4,403
CVE-2021-26198
2021-06-10T23:15:08.433
An issue was discovered in JerryScript 2.4.0. There is a SEVG in ecma_deref_bigint in ecma-helpers.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4402" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4402
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 2faafa4 ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g ...
SEVG in ecma_deref_bigint
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4402/comments
0
2021-01-02T14:29:48Z
2021-01-07T11:10:55Z
https://github.com/jerryscript-project/jerryscript/issues/4402
777,469,127
4,402
CVE-2021-26199
2021-06-10T23:15:08.467
An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_bytecode_ref in ecma-helpers.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4056" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4056
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision da5b058 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-...
heap-use-after-free in ecma_bytecode_ref
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4056/comments
0
2020-07-25T14:58:50Z
2020-07-28T08:47:38Z
https://github.com/jerryscript-project/jerryscript/issues/4056
665,599,573
4,056
CVE-2020-18654
2021-06-22T16:15:07.747
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/174" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/wuzhicms/wuzhicms/issues/174
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
> This is a stored XSS which allows attacker to insert javascript code into database. When admin see the message, attacker is able to steal admin's cookie. **Filename** /coreframe/app/guestbook/myissue.php **Code** ```php public function ask() { $formdata = array(); $formdata['title'] = iss...
WUZHI CMS V4.1.0 /coreframe/app/guestbook/myissue.php stored XSS vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/174/comments
0
2019-03-12T07:47:12Z
2019-03-12T07:47:12Z
https://github.com/wuzhicms/wuzhicms/issues/174
419,844,137
174
CVE-2020-18979
2021-07-12T15:15:07.973
Cross Siste Scripting (XSS) vulnerablity in Halo 0.4.3 via the X-forwarded-for Header parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/126
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues]...
These is A stored xss vulnerability
https://api.github.com/repos/halo-dev/halo/issues/126/comments
2
2019-04-04T02:46:43Z
2019-05-28T17:54:37Z
https://github.com/halo-dev/halo/issues/126
429,058,076
126
CVE-2020-18980
2021-07-12T15:15:08.010
Remote Code Executon vulnerability in Halo 0.4.3 via the remoteAddr and themeName parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/134" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues]...
Remote Code Execution in your system
https://api.github.com/repos/halo-dev/halo/issues/134/comments
3
2019-04-04T08:32:35Z
2023-08-17T14:34:44Z
https://github.com/halo-dev/halo/issues/134
429,148,333
134
CVE-2020-18982
2021-07-12T17:15:08.670
Cross Sie Scripting (XSS) vulnerability in Halo 0.4.3 via CommentAuthorUrl.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/127
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues]...
These is Another stored xss vulnerability
https://api.github.com/repos/halo-dev/halo/issues/127/comments
2
2019-04-04T03:19:25Z
2019-05-28T17:53:30Z
https://github.com/halo-dev/halo/issues/127
429,064,568
127
CVE-2020-19037
2021-07-12T17:15:08.713
Incorrect Access Control vulnearbility in Halo 0.4.3, which allows a malicious user to bypass encrption to view encrpted articles via cookies.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/135
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues]...
Bypass password access to encrypted articles
https://api.github.com/repos/halo-dev/halo/issues/135/comments
3
2019-04-04T15:13:08Z
2021-07-15T08:18:57Z
https://github.com/halo-dev/halo/issues/135
429,335,886
135
CVE-2020-19038
2021-07-12T17:15:08.743
File Deletion vulnerability in Halo 0.4.3 via delBackup.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/ha...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues]...
Any file deletion in the background
https://api.github.com/repos/halo-dev/halo/issues/136/comments
2
2019-04-04T17:29:24Z
2021-07-15T08:17:49Z
https://github.com/halo-dev/halo/issues/136
429,398,035
136
CVE-2020-23079
2021-07-12T17:15:08.777
SSRF vulnerability in Halo <=1.3.2 exists in the SMTP configuration, which can detect the server intranet.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/806" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C3E9718-5360-45C9-B592-A3190A6409FC", "versionEndExcluding": null, "versionEndIncluding": "1.3.2", "versionStartExcluding": n...
https://github.com/halo-dev/halo/issues/806
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
1、Because the password of the login account of the system background is transmitted in plain text, it can easily enter the background through brute force cracking: 2、The problem lies in the STMP server configuration,which can specify host address and port ![image](https://user-images.githubusercontent.com/22486282/80...
SSRF vulnerability exists at the SMTP configuration, which can detect the server intranet
https://api.github.com/repos/halo-dev/halo/issues/806/comments
0
2020-04-29T08:03:08Z
2020-07-17T08:18:30Z
https://github.com/halo-dev/halo/issues/806
608,857,881
806
CVE-2020-22874
2021-07-13T15:15:08.457
Integer overflow vulnerability in function Jsi_ObjArraySizer in jsish before 3.0.8, allows remote attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/commit/858da537bde4de9d8c92466d5a866505310bc328" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7B5CBE8-C60A-451B-88C5-630F33C398CE", "versionEndExcluding": "3.0.8", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/pcmacdon/jsish/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: ./configure && make test command: ./jsish poc1 ``` # poc: ``` var o = [ 1, 2 ]; o.length = -9007199254740991; o, 90040991; var ExBs = new RegExp('>l1Pq4Q~R$!'); ExBs = o.reverse(); var zaCp = o.unshift(o.length, o, ExBs.lastIndex, ...
integer overflow and buffer overflow
https://api.github.com/repos/pcmacdon/jsish/issues/5/comments
1
2020-04-13T14:03:30Z
2020-04-14T00:10:53Z
https://github.com/pcmacdon/jsish/issues/5
598,907,622
5
CVE-2020-22875
2021-07-13T15:15:08.490
Integer overflow vulnerability in function Jsi_ObjSetLength in jsish before 3.0.6, allows remote attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/commit/5408a6d93f45bf1f7acd9ae5d44e0ebd77379e98" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D5295FF-C964-46BF-97CD-53B7C71C9B5E", "versionEndExcluding": "3.0.6", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/pcmacdon/jsish/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: ./configure && make test command: ./jsish poc1 ``` # poc: ``` var o = [ 1, 2 ]; o = o.splice(o.length, o.length, o, o, o.length, 1.7976931348623157e+308); o = o.toString(o.length); var a = Object.keys(o); var YzNz = new RegExp('kf}(...
integer overflow
https://api.github.com/repos/pcmacdon/jsish/issues/10/comments
1
2020-04-13T14:23:26Z
2020-04-13T18:13:09Z
https://github.com/pcmacdon/jsish/issues/10
598,918,538
10
CVE-2020-22882
2021-07-13T15:15:08.557
Issue was discovered in the fxParserTree function in moddable, allows attackers to cause denial of service via a crafted payload. Fixed in commit 723816ab9b52f807180c99fc69c7d08cf6c6bd61.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/351" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FE71E3E-5588-43F2-B143-A5D49EC7FA9D", "versionEndExcluding": "os200831", "versionEndIncluding": null, "versionStartEx...
https://github.com/Moddable-OpenSource/moddable/issues/351
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 apt-get install libgtk-3-dev export MODDABLE=~/src/moddable cd $MODDABLE/build/makefiles/lin make test command: ./build/bin/lin/release/xsc poc ``` # poc ``` function main() { let arr = [ 1.1, 1.1, 1.1, 1.1, 1.1 ...
Type confusion vulnerability
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/351/comments
5
2020-04-17T16:01:51Z
2020-05-22T23:12:42Z
https://github.com/Moddable-OpenSource/moddable/issues/351
602,078,781
351
CVE-2020-22907
2021-07-13T15:15:08.677
Stack overflow vulnerability in function jsi_evalcode_sub in jsish before 3.0.18, allows remote attackers to cause a Denial of Service via a crafted value to the execute parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*", "matchCriteriaId": "F570B531-5AC9-4DD1-AFE7-8C24B969CDF0", "versionEndExcluding": "3.0.18", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/pcmacdon/jsish/issues/16
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: export JSI__SANITIZE=1 && make test command: ./jsish poc1 ``` # poc: ``` function fail(message) { } function assert(condition, message) { if (!condition) fail(message); } function assertEquals(expression, value, message) { i...
heap overflow
https://api.github.com/repos/pcmacdon/jsish/issues/16/comments
2
2020-05-20T14:49:25Z
2020-05-20T17:01:44Z
https://github.com/pcmacdon/jsish/issues/16
621,824,597
16
CVE-2020-19716
2021-07-13T22:15:08.913
A buffer overflow vulnerability in the Databuf function in types.cpp of Exiv2 v0.27.1 leads to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/980" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/11/m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.1:*:*:*:*:*:*:*", "matchCriteriaId": "9E196C7D-A075-43E0-A620-C2D7C0EB559F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Exiv2/exiv2/issues/980
[ "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a buffer overflow in exiv2 in file types.cpp. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 The compile command is: cmake ./ ;make To reproduce the issue, run: ./exiv2 input Here is the trace reported by asan: #0 0x7faff55ba631 (/usr/lib...
Buffer overflow caused by exhaustive memory usage
https://api.github.com/repos/Exiv2/exiv2/issues/980/comments
4
2019-08-09T08:46:00Z
2021-07-23T12:12:29Z
https://github.com/Exiv2/exiv2/issues/980
478,871,751
980
CVE-2020-19717
2021-07-13T22:15:08.943
An unhandled memory allocation failure in Core/Ap48bdlAtom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/416" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/416
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a null pointer dereference caused by unhandled exhaustive memory usage in Ap48bdlAtom.cpp. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined the...
Null pointer dereference caused by unhandled exhaustive memory usage
https://api.github.com/repos/axiomatic-systems/Bento4/issues/416/comments
0
2019-08-09T14:02:54Z
2019-08-25T16:22:18Z
https://github.com/axiomatic-systems/Bento4/issues/416
479,003,776
416
CVE-2020-19718
2021-07-13T22:15:08.967
An unhandled memory allocation failure in Core/Ap4Atom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/417" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/417
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a null pointer dereference bug running mp42aac. It is similar to #413. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined then run: ./mp42aac i...
Null pointer dereference bug
https://api.github.com/repos/axiomatic-systems/Bento4/issues/417/comments
0
2019-08-09T14:25:13Z
2019-08-25T16:22:03Z
https://github.com/axiomatic-systems/Bento4/issues/417
479,014,683
417
CVE-2020-19719
2021-07-13T22:15:09.000
A buffer overflow vulnerability in Ap4ElstAtom.cpp of Bento 1.5.1-628 leads to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/414" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/414
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow in Ap4ElstAtom.cpp related to AP4_ElstAtom. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag `DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined` then run: `./mp42aac input /d...
Buffer overflow in Ap4ElstAtom.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/414/comments
0
2019-08-09T12:45:59Z
2019-08-25T16:22:46Z
https://github.com/axiomatic-systems/Bento4/issues/414
478,968,882
414
CVE-2020-19720
2021-07-13T22:15:09.033
An unhandled memory allocation failure in Core/AP4IkmsAtom.cpp of Bento 1.5.1-628 causes a NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/413" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/413
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow inside AP4_IkmsAtom of AP4IkmsAtom.cpp. It is similar to #412 and #396. ./mp42aac input_file /dev/null In file Source/C++/Core/AP4IkmsAtom.cpp AP4_RtpAtom allocates a new buffer to parse the atom in the stream. The unhandled memory allocation failure causes the read content memcpy to ...
Exhaustive memory usage
https://api.github.com/repos/axiomatic-systems/Bento4/issues/413/comments
0
2019-08-09T12:23:30Z
2019-08-25T16:23:00Z
https://github.com/axiomatic-systems/Bento4/issues/413
478,959,630
413
CVE-2020-19721
2021-07-13T22:15:09.067
A heap buffer overflow vulnerability in Ap4TrunAtom.cpp of Bento 1.5.1-628 may lead to an out-of-bounds write while running mp42aac, leading to system crashes and a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/41...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/415
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a heap buffer overflow in Ap4TrunAtom.cpp when running mp42aac. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag '-DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined' then run: './mp42aac input /...
Heap buffer overflow in Ap4TrunAtom.cpp when running mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/415/comments
0
2019-08-09T13:50:32Z
2019-08-25T16:22:31Z
https://github.com/axiomatic-systems/Bento4/issues/415
478,997,749
415
CVE-2020-19722
2021-07-13T22:15:09.093
An unhandled memory allocation failure in Core/Ap4Atom.cpp of Bento 1.5.1-628 causes a direct copy to NULL pointer dereference, leading to a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/418" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/418
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
There is a buffer overflow in Ap4ElstAtom.cpp related to AP4_ElstAtom. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16.04 Codename: xenial gcc: 5.4.0 To reproduce the bug, compile the project with flag DCMAKE_C_FLAGS=-g -m32 -fsanitize=address,undefined then run: ./mp42aac input /dev/...
buffer overflow in AP4_NullTerminatedStringAtom
https://api.github.com/repos/axiomatic-systems/Bento4/issues/418/comments
0
2019-08-09T14:41:05Z
2019-08-25T16:21:42Z
https://github.com/axiomatic-systems/Bento4/issues/418
479,022,417
418
CVE-2020-23705
2021-07-15T22:15:09.197
A global buffer overflow vulnerability in jfif_encode at jfif.c:701 of ffjpeg through 2020-06-22 allows attackers to cause a Denial of Service (DOS) via a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "949770FC-6A53-4A2F-8F86-E8E01330515F", "versionEndExcluding": null, "versionEndIncluding": "2020-06-22", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
### Describe A global-buffer-overflow was discovered in ffjpeg. The issue is being triggered in function jfif_encode at jfif.c:701 ### Reproduce Tested in Ubuntu 18.04, 64bit. Compile ffjpeg with address sanitizer as I changed `CCFLAGS` src/Makefile as: ```bash # ASan CCFLAGS = -Wall -g -fsanitize=address -fno-...
global-buffer-overflow in function jfif_encode at jfif.c:701
https://api.github.com/repos/rockcarry/ffjpeg/issues/25/comments
1
2020-06-22T08:20:48Z
2020-08-07T00:30:39Z
https://github.com/rockcarry/ffjpeg/issues/25
642,861,272
25
CVE-2020-22148
2021-07-21T17:15:08.123
A stored cross site scripting (XSS) vulnerability in /admin.php?page=tags of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1157" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1157
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi team, I just found a stored XSS in `admin.php?page=tags`. Exploit Request : ``` POST /piwigo/piwigo/admin.php?page=tags HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,im...
Stored Cross Site Scripting in /admin.php?page=tags
https://api.github.com/repos/Piwigo/Piwigo/issues/1157/comments
4
2020-02-12T02:40:57Z
2021-12-07T11:25:00Z
https://github.com/Piwigo/Piwigo/issues/1157
563,700,554
1,157
CVE-2020-22150
2021-07-21T17:15:08.167
A cross site scripting (XSS) vulnerability in /admin.php?page=permalinks of Piwigo 2.10.1 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1158" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/Piwigo/Piwigo/issues/1158
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hi team! I found a XSS in XSS in /admin.php?page=permalinks Exploit Request: ``` POST /piwigo/piwigo/admin.php?page=permalinks HTTP/1.1 Host: 192.168.10.138 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9...
XSS in /admin.php?page=permalinks
https://api.github.com/repos/Piwigo/Piwigo/issues/1158/comments
3
2020-02-12T03:32:27Z
2021-12-07T11:25:28Z
https://github.com/Piwigo/Piwigo/issues/1158
563,727,063
1,158
CVE-2020-19463
2021-07-21T18:15:08.467
An issue has been found in function vfprintf in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a stack overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a stack overflow bug on the function vfprintf (the latest commit b671b64 on master - version 0.70). PoC_so_vfprintf: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_so_vfprintf Valgrind says: ~~~ valgrind pdf2json PoC_so_vfprintf /dev/null ==8530== ...
SEGV (stack overflow) on vfprintf
https://api.github.com/repos/flexpaper/pdf2json/issues/24/comments
0
2019-05-27T22:42:03Z
2019-05-29T17:40:53Z
https://github.com/flexpaper/pdf2json/issues/24
449,005,412
24
CVE-2020-19464
2021-07-21T18:15:08.507
An issue has been found in function XRef::fetch in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a stack overflow .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a stack overflow bug on the function XRef::fetch (the latest commit b671b64 on master - version 0.70). PoC_so_XRef::fetch: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_so_XRef::fetch Valgrind says: ~~~ valgrind pdf2json PoC_so_XRef\:\:fetch /dev/n...
SEGV (stack overflow) on XRef::fetch
https://api.github.com/repos/flexpaper/pdf2json/issues/25/comments
0
2019-05-27T22:46:07Z
2019-05-29T17:40:38Z
https://github.com/flexpaper/pdf2json/issues/25
449,005,870
25
CVE-2020-19465
2021-07-21T18:15:08.540
An issue has been found in function ObjectStream::getObject in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 4 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid read on the function ObjectStream::getObject (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_segv_ObjectStream::getObject Valgrind says ~~~ valgrind pdf2json $PoC /dev/null ==440=...
SEGV on ObjectStream::getObject
https://api.github.com/repos/flexpaper/pdf2json/issues/26/comments
0
2019-05-27T23:08:39Z
2019-05-29T17:40:24Z
https://github.com/flexpaper/pdf2json/issues/26
449,008,452
26
CVE-2020-19466
2021-07-21T18:15:08.573
An issue has been found in function DCTStream::transformDataUnit in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 1 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid read on the function DCTStream::transformDataUnit (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_segv_DCTStream::transformDataUnit Valgrind says: ~~~ valgrind pdf2json $PoC /dev/n...
SEGV on DCTStream::transformDataUnit
https://api.github.com/repos/flexpaper/pdf2json/issues/27/comments
0
2019-05-27T23:09:01Z
2019-05-29T17:40:12Z
https://github.com/flexpaper/pdf2json/issues/27
449,008,482
27
CVE-2020-19467
2021-07-21T18:15:08.607
An issue has been found in function DCTStream::transformDataUnit in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an Illegal Use After Free .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an Use After Free bug on the function DCTStream::transformDataUnit (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_uaf_DCTStream::transformDataUnit Valgrind says: ~~~ pdf2json $PoC /dev/null ...
SEGV (use after free) on DCTStream::transformDataUnit
https://api.github.com/repos/flexpaper/pdf2json/issues/28/comments
0
2019-05-28T05:41:37Z
2019-05-29T17:39:59Z
https://github.com/flexpaper/pdf2json/issues/28
449,073,008
28
CVE-2020-19468
2021-07-21T18:15:08.643
An issue has been found in function EmbedStream::getChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a null pointer derefenrece (invalid read of size 8) .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a NULL pointer dereference bug on the function EmbedStream::getChar (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_npd_EmbedStream::getChar Valgrind says: ~~~ valgrind pdf2json $PoC /dev/nul...
SEGV (NULL pointer dereference) on EmbedStream::getChar
https://api.github.com/repos/flexpaper/pdf2json/issues/29/comments
0
2019-05-28T05:57:15Z
2019-05-29T17:39:46Z
https://github.com/flexpaper/pdf2json/issues/29
449,076,890
29
CVE-2020-19469
2021-07-21T18:15:08.677
An issue has been found in function DCTStream::reset in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid write of size 8 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/30
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid write on the function DCTStream::reset (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_segv_DCTStream::reset Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==5144== Memcheck,...
SEGV on DCTStream::reset
https://api.github.com/repos/flexpaper/pdf2json/issues/30/comments
0
2019-05-28T06:47:45Z
2019-05-29T17:39:34Z
https://github.com/flexpaper/pdf2json/issues/30
449,091,164
30
CVE-2020-19470
2021-07-21T18:15:08.710
An issue has been found in function DCTStream::getChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to a NULL pointer dereference (invalid read of size 1) .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/31" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/31
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to a NULL pointer dereference bug on the function DCTStream::getChar (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_npd_DCTStream::getChar ~~~ valgrind pdf2json $PoC /dev/null ==20313== Memchec...
SEGV (NULL pointer dereference) on DCTStream::getChar
https://api.github.com/repos/flexpaper/pdf2json/issues/31/comments
0
2019-05-28T08:53:18Z
2019-05-29T17:39:20Z
https://github.com/flexpaper/pdf2json/issues/31
449,144,277
31
CVE-2020-19471
2021-07-21T18:15:08.747
An issue has been found in function DCTStream::decodeImage in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 4 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/32" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/32
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a bug due to an invalid read on the function DCTStream::decodeImage (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_aborted_DCTStream::decodeImage Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==1738...
Aborted on DCTStream::decodeImage
https://api.github.com/repos/flexpaper/pdf2json/issues/32/comments
0
2019-05-28T23:23:25Z
2019-05-28T23:23:25Z
https://github.com/flexpaper/pdf2json/issues/32
449,519,854
32
CVE-2020-19472
2021-07-21T18:15:08.777
An issue has been found in function DCTStream::readHuffSym in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid read of size 2 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/33
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a bug due to an invalid read on the function DCTStream::readHuffSym (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_ir_DCTStream::readHuffSym Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==8920== Me...
Invalid read on DCTStream::readHuffSym
https://api.github.com/repos/flexpaper/pdf2json/issues/33/comments
0
2019-05-28T23:35:23Z
2019-05-28T23:35:23Z
https://github.com/flexpaper/pdf2json/issues/33
449,522,594
33
CVE-2020-19473
2021-07-21T18:15:08.810
An issue has been found in function DCTStream::decodeImage in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an uncaught floating point exception.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/34
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a bug due to a floating point exception on the function DCTStream::decodeImage (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_fpe_DCTStream::decodeImage Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ...
Floating point exception on DCTStream::decodeImage
https://api.github.com/repos/flexpaper/pdf2json/issues/34/comments
0
2019-05-29T07:15:38Z
2019-05-29T07:15:38Z
https://github.com/flexpaper/pdf2json/issues/34
449,636,916
34
CVE-2020-19474
2021-07-21T18:15:08.847
An issue has been found in function Gfx::doShowText in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an Use After Free .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/35
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an Use After Free bug on the function Gfx::doShowText (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_uaf_Gfx::doShowText Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==22556== Memche...
SEGV (use after free) on Gfx::doShowText
https://api.github.com/repos/flexpaper/pdf2json/issues/35/comments
0
2019-05-29T15:08:20Z
2019-05-29T15:08:20Z
https://github.com/flexpaper/pdf2json/issues/35
449,865,114
35
CVE-2020-19475
2021-07-21T18:15:08.883
An issue has been found in function CCITTFaxStream::lookChar in PDF2JSON 0.70 that allows attackers to cause a Denial of Service due to an invalid write of size 2 .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "98C1609A-B5B7-4491-9A9F-ADE54A002903", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/flexpaper/pdf2json/issues/36
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
Hi, Our fuzzer found a crash due to an invalid write on the function CCITTFaxStream::lookChar (the latest commit b671b64 on master - version 0.70). PoC: https://github.com/strongcourage/PoCs/blob/master/pdf2json_b671b64/PoC_seg_CCITTFaxStream::lookChar Valgrind says: ~~~ valgrind pdf2json $PoC /dev/null ==1...
SEGV on CCITTFaxStream::lookChar
https://api.github.com/repos/flexpaper/pdf2json/issues/36/comments
0
2019-05-29T17:55:30Z
2019-05-29T17:55:30Z
https://github.com/flexpaper/pdf2json/issues/36
449,942,847
36
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1265
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master) due to an invalid read on function gf_m2ts_process_pmt (mpegts.c:2373). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2373 Command: MP4Box -info $PoC ASAN says: ~~~ /home/dungnguyen/gueb-testing/gpac...
Runtime error: left shift of negative value (mpegts.c:2373)
https://api.github.com/repos/gpac/gpac/issues/1265/comments
1
2019-07-05T23:46:25Z
2019-07-07T15:59:07Z
https://github.com/gpac/gpac/issues/1265
464,797,091
1,265
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1266
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2236 Command: MP4Box -info $PoC ASAN says: ~~~ /home/dungnguyen/gueb-testing/gpac-head/src/media_tools/mpegts.c:3089:23: runtime error: left shift of 12...
Runtime error: left shift of 128 by 24 places cannot be represented in type 'int' (mpegts.c:2236)
https://api.github.com/repos/gpac/gpac/issues/1266/comments
1
2019-07-05T23:46:50Z
2019-07-07T15:58:17Z
https://github.com/gpac/gpac/issues/1266
464,797,129
1,266
CVE-2020-19481
2021-07-21T18:15:08.920
An issue was discovered in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid memory read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1267
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit 987169b on master). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_re_mpegts.c:2541 Command: MP4Box -info $PoC ASAN says: ~~~ Multiple different PAT on single TS found, ignoring new PAT declaration (table id 127 - extended table id...
Runtime error: member access within null pointer of type 'GF_M2TS_ES *[8192]' (mpegts.c:2541)
https://api.github.com/repos/gpac/gpac/issues/1267/comments
1
2019-07-05T23:55:18Z
2019-07-07T15:58:42Z
https://github.com/gpac/gpac/issues/1267
464,797,889
1,267
CVE-2020-19488
2021-07-21T18:15:08.957
An issue was discovered in box_code_apple.c:119 in Gpac MP4Box 0.8.0, allows attackers to cause a Denial of Service due to an invalid read on function ilst_item_Read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/6170024568f4dda310e98ef7508477b425c58d09" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1263
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hi, Our fuzzer found a crash on MP4Box (the latest commit `987169b` on master) due to a null pointer dereference bug on function ilst_item_Read (box_code_apple.c:119). PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_npd_ilst_item_Read Command: MP4Box -info $PoC ~~~ [iso file] Read Box type ...
Runtime error: member access within null pointer of type 'struct GF_Box'
https://api.github.com/repos/gpac/gpac/issues/1263/comments
1
2019-07-05T22:47:55Z
2019-07-07T15:57:03Z
https://github.com/gpac/gpac/issues/1263
464,790,539
1,263
CVE-2021-25808
2021-07-23T20:15:08.080
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1298" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "2073F4B1-16F9-491D-A54E-5A1CBE9ED6F7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/bludit/bludit/issues/1298
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hi,I found a code execution vulnerability in Bludit v3.13.1 admin panel the path is bl-plugins/backup/plugin.php **1, Log in to the admin panel** ![图片](https://user-images.githubusercontent.com/21252367/103636497-064ebc00-4f85-11eb-960c-f4d098576648.png) **2, Click the backups button** ![图片](https...
Bludit v3.13.1 Code Execution Vulnerability in "Backups"
https://api.github.com/repos/bludit/bludit/issues/1298/comments
2
2021-01-05T10:41:41Z
2021-01-08T08:50:41Z
https://github.com/bludit/bludit/issues/1298
778,857,370
1,298
CVE-2020-19118
2021-07-30T14:15:13.497
Cross Site Scripting (XSS) vulnerabiity in YzmCMS 5.2 via the site_code parameter in admin/index/init.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2E1FE25-3E00-4952-8D4F-A4943757C803", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/14
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Because the data inputed by the user is not effectively filtered, so that attackers can inject javascript code into the HTML page for execution. Anyone who clicks on the page will trigger it The stored XXS vulnerability exists the admin/index/init.html POC: <script>alert('XSS!')</script> ![T96%(B16_4XO}A{9J}0...
Stored XSS vulnerability in yzmcms v5.2
https://api.github.com/repos/yzmcms/yzmcms/issues/14/comments
0
2019-04-24T13:37:50Z
2019-04-24T13:42:17Z
https://github.com/yzmcms/yzmcms/issues/14
436,702,447
14
CVE-2020-22352
2021-08-04T21:15:08.033
The gf_dash_segmenter_probe_input function in GPAC v0.8 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
AddressSanitizer: NULL pointer dereference in media_tools/dash_segmenter.c:5264 in gf_dash_segmenter_probe_input
https://api.github.com/repos/gpac/gpac/issues/1423/comments
1
2020-03-01T19:19:26Z
2020-06-11T17:19:33Z
https://github.com/gpac/gpac/issues/1423
573,599,771
1,423
CVE-2020-24829
2021-08-04T21:15:08.077
An issue was discovered in GPAC v0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer overflow in gf_m2ts_section_complete in media_tools/mpegts.c that can cause a denial of service (DOS) via a crafted MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1422
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
AddressSanitizer: heap-buffer-overflow media_tools/mpegts.c:1471 in gf_m2ts_section_complete
https://api.github.com/repos/gpac/gpac/issues/1422/comments
0
2020-03-01T18:58:01Z
2020-03-06T17:21:35Z
https://github.com/gpac/gpac/issues/1422
573,596,583
1,422
CVE-2021-35306
2021-08-05T20:15:09.387
An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the function AP4_StszAtom::WriteFields located in Ap4StszAtom.cpp. It allows an attacker to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/615" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A6BE318-62B8-44AE-9090-BF24EC5E846C", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-636", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/615
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, A SEGV has occurred when running program mp42aac, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0-636 [POC.zip](https://github.com/axiomatic-systems/Bento4/files/6631654/POC.zip) Verification steps: 1.Get the source code of Bento4 2.Compile ``` cd Bento4 mk...
SEGV in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/615/comments
2
2021-06-10T13:16:05Z
2021-12-27T07:29:17Z
https://github.com/axiomatic-systems/Bento4/issues/615
917,334,988
615
CVE-2021-35307
2021-08-05T20:15:09.423
An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the AP4_DescriptorFinder::Test component located in /Core/Ap4Descriptor.h. It allows an attacker to cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/616" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A6BE318-62B8-44AE-9090-BF24EC5E846C", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-636", "versionStartExcl...
https://github.com/axiomatic-systems/Bento4/issues/616
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hello, A SEGV has occurred when running program mp42aac, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Bento4 version 1.6.0-636 [poc (2).zip](https://github.com/axiomatic-systems/Bento4/files/6631972/poc.2.zip) Verification steps: 1.Get the source code of Bento4 2.Compile ``` cd Be...
SEGV in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/616/comments
1
2021-06-10T14:10:25Z
2021-08-06T01:09:22Z
https://github.com/axiomatic-systems/Bento4/issues/616
917,392,735
616
CVE-2021-36584
2021-08-05T20:15:09.457
An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1842" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1842
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello, A heap-buffer-overflow has occurred when running program MP4Box,this can reproduce on the lattest commit. System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 [poc1.zip](https://github.com/gpac/gpac/files/6766970/poc1.zip) Verification steps: 1.Get the source code of gpac 2.Compile ...
heap-buffer-overflow in gp_rtp_builder_do_tx3g
https://api.github.com/repos/gpac/gpac/issues/1842/comments
1
2021-07-06T02:59:40Z
2021-08-06T01:08:16Z
https://github.com/gpac/gpac/issues/1842
937,474,838
1,842
CVE-2021-29923
2021-08-07T17:15:07.067
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "D39D5C21-8281-429F-AC33-CE39821CA3EC", "versionEndExcluding": "1.17", "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/golang/go/issues/30999
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
### What version of Go are you using (`go version`)? <pre> $ go version go version go1.12.1 linux/amd64 </pre> ### Does this issue reproduce with the latest release? Yes. ### What operating system and processor architecture are you using (`go env`)? <details><summary><code>go env</code> Output</summar...
net: reject leading zeros in IP address parsers [freeze exception]
https://api.github.com/repos/golang/go/issues/30999/comments
33
2019-03-22T06:48:19Z
2023-06-23T06:42:24Z
https://github.com/golang/go/issues/30999
424,069,294
30,999
CVE-2021-29923
2021-08-07T17:15:07.067
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://defcon.org/html/defcon-29/dc-29-speakers.html#kaoudis" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "D39D5C21-8281-429F-AC33-CE39821CA3EC", "versionEndExcluding": "1.17", "versionEndIncluding": null, "versionStartExcluding": nu...
https://github.com/golang/go/issues/43389
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
Maybe net.ParseIP shouldn't successfully parse IP addresses out of unbounded inputs? e.g. `fmt.Println(net.ParseIP(strings.Repeat("0", 10<<20) + "000000192.0000168.00000.00001"))` passes, as does UnmarshalText (https://play.golang.org/p/bXGEzOS6KVQ) Of course, in both those cases the data is already fully in memo...
net: limit the size of ParseIP input?
https://api.github.com/repos/golang/go/issues/43389/comments
11
2020-12-26T16:59:03Z
2023-03-16T16:48:24Z
https://github.com/golang/go/issues/43389
774,903,681
43,389
CVE-2021-38290
2021-08-09T11:15:07.377
A host header attack vulnerability exists in FUEL CMS 1.5.0 through fuel/modules/fuel/config/fuel_constants.php and fuel/modules/fuel/libraries/Asset.php. An attacker can use a man in the middle attack such as phishing.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/commit/8a0d88ad6869623c90e24b3b2ea33352049d39a7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F49387D-17F4-4155-BDDD-65D7770D7E72", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versionS...
https://github.com/daylightstudio/FUEL-CMS/issues/580
[ "Exploit", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
The system does not verify the host value. If the host value is modified, the link returned by the website will splice the malicious host value。like this: ![微信截图_20210806095405](https://user-images.githubusercontent.com/73220685/128444240-f352c4c8-c884-4894-b0e8-10fa2d687051.png) ![微信截图_20210806095532](https://user-i...
Host header attack vulnerability exists in fuel CMS 1.5.0. An attacker can use man in the middle attack to attack users such as phishing.
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/580/comments
0
2021-08-06T01:58:06Z
2021-08-10T17:49:48Z
https://github.com/daylightstudio/FUEL-CMS/issues/580
962,327,274
580
CVE-2020-21677
2021-08-10T21:15:07.447
A heap-based buffer overflow in the sixel_encoder_output_without_macro function in encoder.c of Libsixel 1.8.4 allows attackers to cause a denial of service (DOS) via converting a crafted PNG file into Sixel format.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/123" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "EB0720EA-8C4F-44BB-91C1-3098DA288118", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/123
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.4 OS : Ubuntu 18.04 configured with: libcurl: yes libpng: yes libjpeg: yes gdk-pixbuf2: no GD: no There is a heap-buffer-overflow in sixel_encoder_output_without_macro at encoder.c:814 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://driv...
heap-buffer-overflow in sixel_encoder_output_without_macro at encoder.c:814
https://api.github.com/repos/saitoha/libsixel/issues/123/comments
3
2019-12-24T03:33:01Z
2021-08-12T08:20:15Z
https://github.com/saitoha/libsixel/issues/123
541,975,419
123
CVE-2021-32437
2021-08-11T20:15:08.933
The gf_hinter_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1653f31cf874eb6df964bea88d58d8e9b98b485e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1770
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A null pointer dereference issue was found in MP4Box, to reproduce, compile gpac as follows: ``` CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-debug ``` run poc file : ``` ./bin/gcc/MP4Box -hint poc -out /dev/null ``` Detailed ASAN res...
Null pointer dereference in function gf_hinter_finalize isom_hinter.c:1236
https://api.github.com/repos/gpac/gpac/issues/1770/comments
1
2021-04-30T08:10:59Z
2021-08-11T02:23:20Z
https://github.com/gpac/gpac/issues/1770
872,144,270
1,770
CVE-2021-32438
2021-08-11T20:15:08.977
The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1769
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
A null pointer dereference issue was found in MP4Box, to reproduce, compile gpac as follows: ``` CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-debug ``` run poc file : ``` ./bin/gcc/MP4Box -nhnt 1 poc -out /dev/null ``` Detailed AS...
Null pointer dereference in gpac MP4Box gf_media_export_filters
https://api.github.com/repos/gpac/gpac/issues/1769/comments
1
2021-04-30T08:03:06Z
2021-08-11T02:27:58Z
https://github.com/gpac/gpac/issues/1769
872,138,105
1,769