cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-33444
2022-07-26T13:15:08.887
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in getprop_builtin_foreign() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/cesanta/mjs/issues/166
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) I think it is probably a similar issue as [#114](https://github.com/cesanta/mjs/issues/114) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC...
A NULL pointer dereference in the function getprop_builtin_foreign() mjs.c:9298
https://api.github.com/repos/cesanta/mjs/issues/166/comments
0
2021-05-19T08:43:21Z
2021-05-19T08:43:21Z
https://github.com/cesanta/mjs/issues/166
895,164,624
166
3,883
CVE-2021-33445
2022-07-26T13:15:08.927
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_string_char_code_at() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/cesanta/mjs/issues/169
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-13891-mjs_string_cha...
A NULL pointer dereference in the function mjs_string_char_code_at() mjs.c:14234
https://api.github.com/repos/cesanta/mjs/issues/169/comments
0
2021-05-19T08:45:40Z
2021-05-19T08:45:40Z
https://github.com/cesanta/mjs/issues/169
895,166,975
169
3,884
CVE-2021-33446
2022-07-26T13:15:08.967
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_next() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/cesanta/mjs/issues/168
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) I think it is probably a similar issue as [#105](https://github.com/cesanta/mjs/issues/105) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC...
A NULL pointer dereference in the function mjs_next() mjs.c:12512
https://api.github.com/repos/cesanta/mjs/issues/168/comments
0
2021-05-19T08:44:54Z
2021-05-19T08:44:54Z
https://github.com/cesanta/mjs/issues/168
895,166,227
168
3,885
CVE-2021-33447
2022-07-26T13:15:09.003
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/cesanta/mjs/issues/164
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-7992-mjs_print-null-...
A NULL pointer dereference in the function mjs_print() mjs.c:8085
https://api.github.com/repos/cesanta/mjs/issues/164/comments
0
2021-05-19T08:41:39Z
2021-05-19T08:41:39Z
https://github.com/cesanta/mjs/issues/164
895,162,768
164
3,886
CVE-2021-33448
2022-07-26T13:15:09.043
An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/170
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-module-stack-overflo...
AddressSanitizer: stack-buffer-overflow in <unknown module>
https://api.github.com/repos/cesanta/mjs/issues/170/comments
0
2021-05-19T08:46:26Z
2021-05-19T08:46:26Z
https://github.com/cesanta/mjs/issues/170
895,167,796
170
3,887
CVE-2021-33449
2022-07-26T13:15:09.083
An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*", "matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7", "versionEndExcluding": "2.20.0", "versionEndIncluding": null, "versionStartExcluding"...
[ "476" ]
476
https://github.com/cesanta/mjs/issues/162
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5) Compile Command: ``` $ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs ``` Run Command: ``` $ mjs -f $POC ``` POC file: https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-7945-mjs_bcode_part_...
A NULL pointer dereference in the function mjs_bcode_part_get_by_offset() mjs.c:8042
https://api.github.com/repos/cesanta/mjs/issues/162/comments
0
2021-05-19T08:40:02Z
2021-05-19T08:40:02Z
https://github.com/cesanta/mjs/issues/162
895,161,153
162
3,888
CVE-2021-33451
2022-07-26T13:15:09.167
An issue was discovered in lrzip version 0.641. There are memory leaks in fill_buffer() in stream.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:long_range_zip_project:long_range_zip:0.641:*:*:*:*:*:*:*", "matchCriteriaId": "7BB0A2CF-6A4B-4F54-B6D5-5D6AE7613B7D", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "401" ]
401
https://github.com/ckolivas/lrzip/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ckolivas", "lrzip" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, lrzip (latest master 465afe8) Compile Command: ``` $ chmod a+x mkinstalldirs make distclean ./autogen.sh mkdir -p build/bin CC="gcc -fsanitize=address -fno-omit-frame-pointer -g" CXX="g++ -fsanitize=address -fno-omit-frame-pointer -g" ./configure --enable-s...
AddressSanitizer: 1 memory leaks of fill_buffer()
https://api.github.com/repos/ckolivas/lrzip/issues/198/comments
3
2021-05-19T08:34:12Z
2022-10-15T22:19:50Z
https://github.com/ckolivas/lrzip/issues/198
895,154,491
198
3,889
CVE-2021-33453
2022-07-26T13:15:09.253
An issue was discovered in lrzip version 0.641. There is a use-after-free in ucompthread() in stream.c:1538.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:long_range_zip_project:long_range_zip:0.641:*:*:*:*:*:*:*", "matchCriteriaId": "7BB0A2CF-6A4B-4F54-B6D5-5D6AE7613B7D", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "416" ]
416
https://github.com/ckolivas/lrzip/issues/199
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ckolivas", "lrzip" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, lrzip (latest master 465afe8) I think it is probably due to an imcomplete fix of [#164](https://github.com/ckolivas/lrzip/issues/164) (imcomplete patch) Compile Command: ``` $ chmod a+x mkinstalldirs make distclean ./autogen.sh mkdir -p build/bin CC="gcc...
AddressSanitizer: heap-use-after-free in ucompthread() stream.c:1538
https://api.github.com/repos/ckolivas/lrzip/issues/199/comments
3
2021-05-19T08:35:15Z
2022-07-23T12:32:26Z
https://github.com/ckolivas/lrzip/issues/199
895,155,463
199
3,890
CVE-2021-33454
2022-07-26T13:15:09.297
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr_get_intnum() in libyasm/expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/166
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) I think it is probably a similar issue as [#83](https://github.com/yasm/yasm/issues/83) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsan...
A NULL pointer dereference in the function yasm_expr_get_intnum() libyasm/expr.c:1263
https://api.github.com/repos/yasm/yasm/issues/166/comments
4
2021-05-19T08:22:19Z
2024-03-22T14:15:04Z
https://github.com/yasm/yasm/issues/166
895,143,168
166
3,891
CVE-2021-33455
2022-07-26T13:15:09.337
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in do_directive() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/169
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) I think it is probably a similar issue as [#142](https://github.com/yasm/yasm/issues/142) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsaniti...
A NULL pointer dereference in the function do_directive() modules/preprocs/nasm/nasm-pp.c:2355
https://api.github.com/repos/yasm/yasm/issues/169/comments
1
2021-05-19T08:25:00Z
2024-03-21T11:40:51Z
https://github.com/yasm/yasm/issues/169
895,145,758
169
3,892
CVE-2021-33456
2022-07-26T13:15:09.377
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in hash() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/175
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
A NULL pointer dereference in the function hash() modules/preprocs/nasm/nasm-pp.c:1114
https://api.github.com/repos/yasm/yasm/issues/175/comments
1
2021-05-19T08:30:54Z
2024-03-21T11:46:29Z
https://github.com/yasm/yasm/issues/175
895,151,364
175
3,893
CVE-2021-33457
2022-07-26T13:15:09.417
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmac_params() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/171
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) I think it is probably a similar issue as [#151](https://github.com/yasm/yasm/issues/151) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanit...
A NULL pointer dereference in the function expand_mmac_params() modules/preprocs/nasm/nasm-pp.c:3861
https://api.github.com/repos/yasm/yasm/issues/171/comments
2
2021-05-19T08:27:21Z
2024-03-21T11:48:05Z
https://github.com/yasm/yasm/issues/171
895,147,985
171
3,894
CVE-2021-33458
2022-07-26T13:15:09.457
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in find_cc() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/170
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
A NULL pointer dereference in the function find_cc() modules/preprocs/nasm/nasm-pp.c:3815
https://api.github.com/repos/yasm/yasm/issues/170/comments
1
2021-05-19T08:26:28Z
2024-03-21T12:44:18Z
https://github.com/yasm/yasm/issues/170
895,147,145
170
3,895
CVE-2021-33459
2022-07-26T13:15:09.500
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/167
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
A NULL pointer dereference in the function nasm_parser_directive() modules/parsers/nasm/nasm-parse.c:1596
https://api.github.com/repos/yasm/yasm/issues/167/comments
1
2021-05-19T08:23:17Z
2024-03-21T11:50:13Z
https://github.com/yasm/yasm/issues/167
895,144,100
167
3,896
CVE-2021-33460
2022-07-26T13:15:09.547
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in if_condition() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/168
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
A NULL pointer dereference in the function if_condition() modules/preprocs/nasm/nasm-pp.c:2134
https://api.github.com/repos/yasm/yasm/issues/168/comments
1
2021-05-19T08:24:08Z
2024-03-21T11:51:21Z
https://github.com/yasm/yasm/issues/168
895,144,888
168
3,897
CVE-2021-33461
2022-07-26T13:15:09.590
An issue was discovered in yasm version 1.3.0. There is a use-after-free in yasm_intnum_destroy() in libyasm/intnum.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/yasm/yasm/issues/161
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) I think it is probably a similar issue as [#149](https://github.com/yasm/yasm/issues/149) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanit...
AddressSanitizer: heap-use-after-free in yasm_intnum_destroy() libyasm/intnum.c:415
https://api.github.com/repos/yasm/yasm/issues/161/comments
3
2021-05-19T08:15:14Z
2024-03-21T11:56:29Z
https://github.com/yasm/yasm/issues/161
895,135,903
161
3,898
CVE-2021-33462
2022-07-26T13:15:09.647
An issue was discovered in yasm version 1.3.0. There is a use-after-free in expr_traverse_nodes_post() in libyasm/expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/yasm/yasm/issues/165
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) I think it is probably a similar issue as [#126](https://github.com/yasm/yasm/issues/126 ) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsa...
AddressSanitizer: heap-use-after-free in expr_traverse_nodes_post() libyasm/expr.c:1112
https://api.github.com/repos/yasm/yasm/issues/165/comments
1
2021-05-19T08:21:12Z
2024-03-21T12:28:49Z
https://github.com/yasm/yasm/issues/165
895,142,015
165
3,899
CVE-2021-33463
2022-07-26T13:15:09.687
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr__copy_except() in libyasm/expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/174
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
A NULL pointer dereference in the function yasm_expr__copy_except() libyasm/expr.c:999
https://api.github.com/repos/yasm/yasm/issues/174/comments
2
2021-05-19T08:30:07Z
2024-03-22T14:00:39Z
https://github.com/yasm/yasm/issues/174
895,150,639
174
3,900
CVE-2021-33464
2022-07-26T13:15:09.730
An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow in inc_fopen() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/yasm/yasm/issues/164
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
AddressSanitizer: heap-buffer-overflow in inc_fopen() modules/preprocs/nasm/nasm-pp.c:1835
https://api.github.com/repos/yasm/yasm/issues/164/comments
5
2021-05-19T08:20:09Z
2025-04-30T05:16:14Z
https://github.com/yasm/yasm/issues/164
895,140,978
164
3,901
CVE-2021-33465
2022-07-26T13:15:09.773
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmacro() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/173
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
A NULL pointer dereference in the function expand_mmacro() modules/preprocs/nasm/nasm-pp.c:4764
https://api.github.com/repos/yasm/yasm/issues/173/comments
1
2021-05-19T08:29:17Z
2024-03-21T12:35:36Z
https://github.com/yasm/yasm/issues/173
895,149,848
173
3,902
CVE-2021-33466
2022-07-26T13:15:09.817
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_smacro() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/yasm/yasm/issues/172
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) I think it is probably a similar issue as [#142](https://github.com/yasm/yasm/issues/142) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanit...
A NULL pointer dereference in the function expand_smacro() modules/preprocs/nasm/nasm-pp.c:4229
https://api.github.com/repos/yasm/yasm/issues/172/comments
1
2021-05-19T08:28:18Z
2024-03-21T12:36:44Z
https://github.com/yasm/yasm/issues/172
895,148,925
172
3,903
CVE-2021-33467
2022-07-26T13:15:09.860
An issue was discovered in yasm version 1.3.0. There is a use-after-free in pp_getline() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/yasm/yasm/issues/163
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
AddressSanitizer: heap-use-after-free in pp_getline() modules/preprocs/nasm/nasm-pp.c:5024
https://api.github.com/repos/yasm/yasm/issues/163/comments
1
2021-05-19T08:19:19Z
2024-03-21T12:37:57Z
https://github.com/yasm/yasm/issues/163
895,140,170
163
3,904
CVE-2021-33468
2022-07-26T13:15:09.903
An issue was discovered in yasm version 1.3.0. There is a use-after-free in error() in modules/preprocs/nasm/nasm-pp.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/yasm/yasm/issues/162
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c) Compile Command: ``` $ ./autogen.sh make distclean CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared ma...
AddressSanitizer: heap-use-after-free in error() modules/preprocs/nasm/nasm-pp.c:4830
https://api.github.com/repos/yasm/yasm/issues/162/comments
1
2021-05-19T08:17:11Z
2024-03-21T12:39:00Z
https://github.com/yasm/yasm/issues/162
895,137,925
162
3,905
CVE-2022-34612
2022-07-27T02:15:09.497
Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2738" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA", "versionEndExcluding": null, "versionEndIncluding": "0.4.0", "versionStartExcluding":...
[ "190" ]
190
https://github.com/rizinorg/rizin/issues/2738
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
# Crash In Rizin of the current version, an integer overflow is found in get_long_object(). It further leads to a heap buffer overflow. The attacker can launch the DoS attack with a malformed binary. ### Work environment | Questions | Answers |----------------------...
An integer overflow is found in get_long_object()
https://api.github.com/repos/rizinorg/rizin/issues/2738/comments
0
2022-06-25T10:15:14Z
2022-06-25T10:58:46Z
https://github.com/rizinorg/rizin/issues/2738
1,284,537,634
2,738
3,906
CVE-2022-34971
2022-07-27T02:15:09.543
An arbitrary file upload vulnerability in the Advertising Management module of Feehi CMS v2.1.1 allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:feehi:feehi_cms:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C27559F1-734D-4924-AD35-EDC2DD9EDF7C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "434" ]
434
https://github.com/liufee/cms/issues/62
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liufee", "cms" ]
This is the base information of the website. It is obviously the latest version of the feehi cms. And in the advertising management of feehi cms v2.1.1, you can upload PHP file by changing the image suffix to PHP, resulting in command execution. ![image](https://user-images.githubusercontent.com/55179364/176199547-6...
File upload command execution at advertising management
https://api.github.com/repos/liufee/cms/issues/62/comments
0
2022-06-28T15:37:48Z
2022-06-28T15:37:48Z
https://github.com/liufee/cms/issues/62
1,287,538,769
62
3,907
CVE-2022-34529
2022-07-27T14:15:08.543
WASM3 v0.5.0 was discovered to contain a segmentation fault via the component Compile_Memory_CopyFill.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wasm3/wasm3/issues/337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wasm3_project:wasm3:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3189DB65-6E31-4059-A460-75F502C0B948", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "125" ]
125
https://github.com/wasm3/wasm3/issues/337
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wasm3", "wasm3" ]
<img width="1733" alt="image" src="https://user-images.githubusercontent.com/8328321/174573981-ddd5a3c3-d2a8-48f7-bf96-17077132b599.png"> POC is as poc.wasm and the source is here ,use `./wat2wasm --enable-all --no-check poc.wat` to get poc.wasm ``` (module (type (;0;) (func)) (func (;0;) (type 0) f32.c...
[Segmentation fault] slot index overflow because of slot missing in some bytecode
https://api.github.com/repos/wasm3/wasm3/issues/337/comments
3
2022-06-20T09:46:16Z
2022-09-11T00:36:16Z
https://github.com/wasm3/wasm3/issues/337
1,276,658,597
337
3,908
CVE-2022-34549
2022-07-27T14:15:08.587
Sims v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /uploadServlet. This vulnerability allows attackers to escalate privileges and execute arbitrary commands via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://cwe.mitre.org/data/definitions/434.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/sim...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sims_project:sims:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDA6A643-917D-4C43-970E-13C7BBF2270B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "434" ]
434
https://github.com/rawchen/sims/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rawchen", "sims" ]
#### **[Suggested description]** Unrestricted Upload of File with Dangerous Type vulnerability exists in SIMS. This open source system is a student information management system. There is an insecure vulnerability when uploading attachments. An attacker could exploit this vulnerability to gain server privileges. PO...
Unrestricted Upload of File with Dangerous Type
https://api.github.com/repos/rawchen/sims/issues/6/comments
0
2022-06-21T07:21:58Z
2022-06-21T07:21:58Z
https://github.com/rawchen/sims/issues/6
1,278,002,866
6
3,909
CVE-2022-34550
2022-07-27T14:15:08.630
Sims v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /addNotifyServlet. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the notifyInfo parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://cwe.mitre.org/data/definitions/79.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/sims...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:student_information_management_system_project:student_information_management_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BD1CDE0-7A1C-42BF-A057-4F2C5EFC989C", "versionEndExcluding": null, ...
[ "79" ]
79
https://github.com/rawchen/sims/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rawchen", "sims" ]
#### **[Suggested description]** This open source system is a student information management system. There was an insecurity vulnerability in the announcement. Attackers can use this vulnerability to implement cross-site scripting attacks on website visitors, such as "cookie theft" and "browser escape". POST: http:...
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
https://api.github.com/repos/rawchen/sims/issues/8/comments
0
2022-06-21T07:23:49Z
2022-06-21T07:56:39Z
https://github.com/rawchen/sims/issues/8
1,278,004,718
8
3,910
CVE-2022-34551
2022-07-27T14:15:08.673
Sims v1.0 was discovered to allow path traversal when downloading attachments.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://cwe.mitre.org/data/definitions/23.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rawchen/sims...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sims_project:sims:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDA6A643-917D-4C43-970E-13C7BBF2270B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "22" ]
22
https://github.com/rawchen/sims/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rawchen", "sims" ]
#### **[Suggested description]** Relative Path Traversal exists in sims. The front end of this open source system is an online examination system. This open source system is a student information management system. An insecurity vulnerability exists when downloading attachments. Attackers can exploit this vulnerabil...
Relative Path Traversal
https://api.github.com/repos/rawchen/sims/issues/7/comments
0
2022-06-21T07:22:38Z
2022-06-21T07:22:38Z
https://github.com/rawchen/sims/issues/7
1,278,003,537
7
3,911
CVE-2022-34121
2022-07-27T18:15:09.313
Cuppa CMS v1.0 was discovered to contain a local file inclusion (LFI) vulnerability via the component /templates/default/html/windows/right.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/18" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hansmach1ne/MyExpl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "829" ]
829
https://github.com/CuppaCMS/CuppaCMS/issues/18
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
Cuppa CMS suffers from local file inclusion vulnerability in '/templates/default/html/windows/right.php' script using $_POST['url'] parameter. Using the following exploit it is possible to include arbitrary server file: curl -X POST "http://IP/cuppa/templates/default/html/windows/right.php" -d "url=../../../../../....
Non-authenticated Local File Inclusion vulnerability in CuppaCMS templates
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/18/comments
2
2022-01-06T22:53:08Z
2023-11-14T23:17:05Z
https://github.com/CuppaCMS/CuppaCMS/issues/18
1,095,777,063
18
3,912
CVE-2022-34140
2022-07-28T00:15:08.683
A stored cross-site scripting (XSS) vulnerability in /index.php?r=site%2Fsignup of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:feehi:feehi_cms:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C27559F1-734D-4924-AD35-EDC2DD9EDF7C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/liufee/cms/issues/61
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liufee", "cms" ]
Stored XSS, also known as persistent XSS, is more damaging than non-persistent XSS. It occurs when a malicious script is injected directly into a vulnerable web application. Step To Reproduce: **Vulnerable cms URL:** https://demo.cms.feehi.com/ **Vulnerable Parameter:** Comment_nickname: 1-Sing-up https://de...
Stored XSS Vulnerability feehicms
https://api.github.com/repos/liufee/cms/issues/61/comments
6
2022-06-11T16:14:50Z
2022-06-20T07:44:37Z
https://github.com/liufee/cms/issues/61
1,268,315,415
61
3,913
CVE-2016-2138
2022-07-28T15:15:07.007
In kippo-graph before version 1.5.1, there is a cross-site scripting vulnerability in xss_clean() in class/KippoInput.class.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ikoniaris/kippo-graph/commit/e6587ec598902763110b70c8bd0a72f7951b4997" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kippo-graph_project:kippo-graph:*:*:*:*:*:*:*:*", "matchCriteriaId": "B085FABC-D5D5-423A-AF92-860DCD72171D", "versionEndExcluding": "1.5.1", "versionEndIncluding": null, "ver...
[ "79" ]
79
https://github.com/ikoniaris/kippo-graph/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ikoniaris", "kippo-graph" ]
Injection possible by an attacker logged into the honeypot kippo. Location: 1. `/kippo-graph/kippo-input.php` (The wget table at the bottom of the page.) 2. `/kippo-graph/kippo-playlog.php` (If cliking on the button "Play" to play the log) An attacker can issue this command: `wget <script>alert()</script>` inside the...
XSS Injection
https://api.github.com/repos/ikoniaris/kippo-graph/issues/35/comments
3
2015-03-16T09:40:16Z
2015-06-18T01:16:28Z
https://github.com/ikoniaris/kippo-graph/issues/35
62,026,861
35
3,914
CVE-2022-34568
2022-07-28T22:15:08.420
SDL v1.2 was discovered to contain a use-after-free via the XFree function at /src/video/x11/SDL_x11yuv.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libsdl-org/SDL-1.2/issues/863" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-17" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsdl:simple_directmedia_layer:*:*:*:*:*:*:*:*", "matchCriteriaId": "9019A536-7F63-4690-BFE6-56BF07A3640E", "versionEndExcluding": null, "versionEndIncluding": "1.2.15", "ve...
[ "416" ]
416
https://github.com/libsdl-org/SDL-1.2/issues/863
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libsdl-org", "SDL-1.2" ]
Hi, I found a potential memory leak bug in the project source code of libsdl, I have shown the execution sequence of the program that may generate the bug on a diagram which is shown below. The text in red illustrates the steps that generate the bug The red arrows represent call relationships The green text illustra...
A USE AFTER FREE BUG
https://api.github.com/repos/libsdl-org/SDL-1.2/issues/863/comments
3
2022-06-18T03:21:57Z
2022-08-01T09:26:34Z
https://github.com/libsdl-org/SDL-1.2/issues/863
1,275,649,845
863
3,915
CVE-2022-34556
2022-07-28T23:15:07.817
PicoC v3.2.2 was discovered to contain a NULL pointer dereference at variable.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jpoirier/picoc/issues/34" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:picoc_project:picoc:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE8B76ED-7C7C-41CE-9129-DA7B04DC5B55", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "476" ]
476
https://github.com/jpoirier/picoc/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jpoirier", "picoc" ]
PICOC Suffers from a Denial of Service (CWE476) vulnerability as a result of a Null Pointer Dereference. Any project or library that uses Picoc also suffers from this issue. An example of this would be picoc-js (https://www.npmjs.com/package/picoc-js). As a result PICOC will immediately segfault. ## Reproduct...
PICOC Null Pointer Dereference Denial of Service
https://api.github.com/repos/jpoirier/picoc/issues/34/comments
1
2022-06-21T19:13:24Z
2022-07-06T13:04:51Z
https://github.com/jpoirier/picoc/issues/34
1,278,929,888
34
3,916
CVE-2022-36234
2022-07-28T23:15:07.943
SimpleNetwork TCP Server commit 29bc615f0d9910eb2f59aa8dff1f54f0e3af4496 was discovered to contain a double free vulnerability which is exploited via crafted TCP packets.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kashimAstro/SimpleNetwork/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplenetwork_project:simplenetwork:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B8CB35D-98AC-4626-9283-F4924AAFE1DF", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "415" ]
415
https://github.com/kashimAstro/SimpleNetwork/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kashimAstro", "SimpleNetwork" ]
Hi there! I was running my fuzzer in the background when I discovered a double free in the SimpleNetwork TCPServer. ## Impact Triggering the double free will allow client to crash any SimpleNetwork TCP server remotely. In other situations, double free vulnerabilities can cause undefined behavior and potentially...
Double Free in TCPServer
https://api.github.com/repos/kashimAstro/SimpleNetwork/issues/22/comments
2
2022-07-14T22:35:36Z
2023-02-01T22:43:46Z
https://github.com/kashimAstro/SimpleNetwork/issues/22
1,305,353,996
22
3,917
CVE-2022-36752
2022-07-28T23:15:07.987
png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/landfillbaby/png2webp/commit/8f21ad79b0cd98fc22d5b49734543101946abbff" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:png2webp_project:png2webp:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1089A890-5F12-4382-BB11-A23704D03131", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/landfillbaby/png2webp/issues/3
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "landfillbaby", "png2webp" ]
Hi! While I was using the tool I had some fuzz tests running in the background and I think there might be an out of bounds write bug in the webp to png converter. I compiled the tool from source using the default instructions/Makefile. I can't exactly figure out from the backtrace where the out of bounds write is ...
Out of Bounds Write in v1.0.4
https://api.github.com/repos/landfillbaby/png2webp/issues/3/comments
10
2022-07-22T17:28:52Z
2022-07-24T03:27:35Z
https://github.com/landfillbaby/png2webp/issues/3
1,315,255,119
3
3,918
CVE-2022-24912
2022-07-29T10:15:12.557
The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge we...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d787fa820" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:runatlantis:atlantis:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A014E6F-1372-471F-AF98-47142E0BA350", "versionEndExcluding": "0.19.7", "versionEndIncluding": null, "versionStartE...
[ "203" ]
203
https://github.com/runatlantis/atlantis/issues/2391
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "runatlantis", "atlantis" ]
<!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request. Searching for pre...
GitLab webhook event validator vulnerable to timing attacks
https://api.github.com/repos/runatlantis/atlantis/issues/2391/comments
1
2022-07-14T16:36:07Z
2024-06-20T17:51:14Z
https://github.com/runatlantis/atlantis/issues/2391
1,305,031,017
2,391
3,919
CVE-2022-34496
2022-07-29T23:15:08.033
Hiby R3 PRO firmware v1.5 to v1.7 was discovered to contain a file upload vulnerability via the file upload feature.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hiby:hiby_r3_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7F29335-E533-461D-8DD4-38187D9829DC", "versionEndExcluding": null, "versionEndIncluding": "1.7", "versionStar...
[ "434" ]
434
https://github.com/vext01/hiby-issues/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "vext01", "hiby-issues" ]
Through the File upload feature, it is possible to replace .sh files in the device with malicious content, leading to execute os commands on the device as root user. The vulnerability is described in the below URL: https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading This finding was fo...
HTTP Server File upload leads to Code Execution
https://api.github.com/repos/vext01/hiby-issues/issues/52/comments
2
2022-06-19T21:55:16Z
2022-06-28T15:06:28Z
https://github.com/vext01/hiby-issues/issues/52
1,276,175,638
52
3,920
CVE-2022-31183
2022-08-01T20:15:08.410
fs2 is a compositional, streaming I/O library for Scala. When establishing a server-mode `TLSSocket` using `fs2-io` on Node.js, the parameter `requestCert = true` is ignored, peer certificate verification is skipped, and the connection proceeds. The vulnerability is limited to: 1. `fs2-io` running on Node.js. The JVM T...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nodejs/node/issues/43994" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typelevel:fs2:*:*:*:*:*:*:*:*", "matchCriteriaId": "750D10F3-1FF8-4173-A44A-ACDE06641472", "versionEndExcluding": "3.2.11", "versionEndIncluding": null, "versionStartExcludin...
[ "295" ]
295
https://github.com/nodejs/node/issues/43994
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nodejs", "node" ]
### Affected URL(s) https://nodejs.org/docs/latest-v18.x/api/tls.html ### Description of the problem What is the correct, non-deprecated way to use the `new tls.TLSSocket(...)` constructor to establish a secure connection? Context: https://github.com/typelevel/fs2/security/advisories/GHSA-2cpx-6pqp-wf35 According...
How to use `new tls.TLSSocket(...)` to establish a secure connection?
https://api.github.com/repos/nodejs/node/issues/43994/comments
1
2022-07-26T04:15:58Z
2022-07-26T19:51:57Z
https://github.com/nodejs/node/issues/43994
1,317,672,883
43,994
3,921
CVE-2022-35920
2022-08-01T22:15:10.347
Sanic is an opensource python web server/framework. Affected versions of sanic allow access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted. Users are advised to upgrade. There is no known workaround for this issue.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrit...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanic-org/sanic/issues/2478" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sanic_project:sanic:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC6FE6CB-23D5-45E1-A733-9F5B5C5FB93A", "versionEndExcluding": "20.12.7", "versionEndIncluding": null, "versionStartE...
[ "22" ]
22
https://github.com/sanic-org/sanic/issues/2478
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sanic-org", "sanic" ]
**Describe the bug** The sanic static directory code checks for `../` as a substring of paths, but it also unquotes the path, which allows a malicious user to escape outside the static folder by using `..%2F`, where `%2F` is the URL-escaped version of `/`. **Code snippet** First, a basic server called `main.py...
Sanic static handler allows parent ".." directory traversal
https://api.github.com/repos/sanic-org/sanic/issues/2478/comments
4
2022-06-10T19:01:48Z
2022-07-28T06:45:46Z
https://github.com/sanic-org/sanic/issues/2478
1,267,904,881
2,478
3,922
CVE-2022-37315
2022-08-01T22:15:10.563
graphql-go (aka GraphQL for Go) through 0.8.0 has infinite recursion in the type definition parser.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/graphql-go/graphql/issues/637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:graphql-go_project:graphql-go:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A43A019-10F3-43A1-88D9-208262CDBEEB", "versionEndExcluding": null, "versionEndIncluding": "0.8.0", "versi...
[ "674" ]
674
https://github.com/graphql-go/graphql/issues/637
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "graphql-go", "graphql" ]
Simple input `String r` crashes the parser with infinite recursion. ```go func TestInfiniteRecursion(t *testing.T) { body := `String r` source := source.NewSource(&source.Source{ Body: []byte(body), }) _, err := Parse( ParseParams{ Source: source, Options: ParseOptions{ NoSource: true, ...
Infinite recursion on malformed input (parseTypeSystemDefinition)
https://api.github.com/repos/graphql-go/graphql/issues/637/comments
6
2022-07-19T11:49:46Z
2023-04-10T18:12:32Z
https://github.com/graphql-go/graphql/issues/637
1,309,402,405
637
3,923
CVE-2022-34955
2022-08-02T03:15:09.547
Pligg CMS v2.0.2 was discovered to contain a time-based SQL injection vulnerability via the page_size parameter at load_data_for_topusers.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Kliqqi-CMS", "Kliqqi-CMS" ]
There are 2 time-based SQL Injection Vulnerabilities, in /load_data_for_groups.php and /load_data_for_topusers.php respectively. ENV: ubuntu14.04 php 5.5.9 mysql 5.5.62 # SQL Injection in /load_data_for_groups.php vulnerable code: Line16: the $page_size is user controllable and directly used in sql state...
SQL Injection Vulnerabilities
https://api.github.com/repos/Kliqqi-CMS/Kliqqi-CMS/issues/261/comments
2
2022-07-04T02:52:46Z
2022-09-23T14:22:58Z
https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261
1,292,546,568
261
3,924
CVE-2022-25867
2022-08-02T14:15:10.103
The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:socket:socket.io-client_java:*:*:*:*:*:*:*:*", "matchCriteriaId": "22689B5F-7F55-45F5-9D49-27D75E767750", "versionEndExcluding": "2.0.1", "versionEndIncluding": null, "versio...
[ "476" ]
476
https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361
[ "Third Party Advisory" ]
github.com
[ "socketio", "socket.io-client-java" ]
Crash when server emit event. Socket.io-client:0.9.0. `03-12 13:21:42.944 6958-7039/org.smartplayer.client.develop E/EventThread: Task threw exception java.lang.NullPointerException: Attempt to invoke virtual method 'java.lang.String java....
Crash socket-io-client
https://api.github.com/repos/socketio/socket.io-client-java/issues/508/comments
7
2018-03-12T10:26:44Z
2022-07-10T23:03:44Z
https://github.com/socketio/socket.io-client-java/issues/508
304,314,729
508
3,925
CVE-2022-37035
2022-08-02T23:15:18.230
An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed f...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frrouting:frrouting:8.3:-:*:*:*:*:*:*", "matchCriteriaId": "3480A36C-F0A3-4621-96C1-0000E66D8E1C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "362" ]
362
https://github.com/FRRouting/frr/issues/11698
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FRRouting", "frr" ]
<!-- *** ATTENTION *** YOU MUST READ THIS TO HAVE YOUR ISSUE ADDRESSED PLEASE READ AND FILL OUT THIS TEMPLATE NEGLECTING TO PROVIDE INFORMATION REQUESTED HERE WILL RESULT IN SIGNIFICANT DELAYS ADDRESSING YOUR ISSUE ALWAYS PROVIDE: - FRR VERSION - OPERATING SYSTEM VERSION - KERNEL VERSION FAILURE T...
bgpd: A use-after-free bug due to race conditions in 2 threads.
https://api.github.com/repos/FRRouting/frr/issues/11698/comments
17
2022-07-28T04:43:01Z
2023-02-15T08:08:16Z
https://github.com/FRRouting/frr/issues/11698
1,320,384,819
11,698
3,926
CVE-2022-34927
2022-08-03T01:15:07.347
MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/milkytracker/MilkyTracker/commit/3a5474f9102cbdc10fbd9e7b1b2c8d3f3f45d91b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:milkytracker_project:milkytracker:1.03.00:*:*:*:*:*:*:*", "matchCriteriaId": "B3E95369-872F-4ECF-A79E-961E2359F627", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "787" ]
787
https://github.com/milkytracker/MilkyTracker/issues/275
[ "Exploit", "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "milkytracker", "MilkyTracker" ]
### Description There is a bug in the instrument parsing code in `LoaderXM::load` that can cause a stack buffer overflow when the program is supplied with a malformed XM module file. This can be abused by an attacker to corrupt the stack, control program execution flow and gain code execution. ### Execution log ``...
LoaderXM::load instrument size int underflow causes stack buffer overflow
https://api.github.com/repos/milkytracker/MilkyTracker/issues/275/comments
2
2022-06-19T00:31:07Z
2022-08-04T12:29:29Z
https://github.com/milkytracker/MilkyTracker/issues/275
1,275,917,885
275
3,927
CVE-2022-34928
2022-08-03T01:15:07.397
JFinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via /system/user.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "89" ]
89
https://github.com/jflyfox/jfinal_cms/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a SQLI vul in background mode.The route is as following <img width="910" alt="1" src="https://user-images.githubusercontent.com/58795040/175862384-81e6d16e-8c57-493c-a73b-294ef4deb3d3.png"> vulnerable argument passing is as following <img width="713" alt="2" src="https://user-images.githubusercontent.com/...
jfinal_ CMS 5.1.0 SQL injection
https://api.github.com/repos/jflyfox/jfinal_cms/issues/43/comments
0
2022-06-27T04:58:14Z
2022-06-27T04:58:14Z
https://github.com/jflyfox/jfinal_cms/issues/43
1,285,238,213
43
3,928
CVE-2022-34937
2022-08-03T01:15:07.457
Yuba u5cms v8.3.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component savepage.php. This vulnerability allows attackers to execute arbitrary code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/u5cms/u5cms/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yuba:u5cms:8.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "CFE24631-9298-47C8-98FE-60BA7F45869B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "352" ]
352
https://github.com/u5cms/u5cms/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "u5cms", "u5cms" ]
**Summary** Vulnerability Type: Cross-Site Request Forgery Severity: High Estimated CVSS Score: 8.3 (https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) Vulnerable Page: u5admin/savepage.php Impacted version: At least 8.3.5 (but I think <= 10.1.13 are vulnerable too because of...
CSRF can lead to RCE if admin is targeted
https://api.github.com/repos/u5cms/u5cms/issues/51/comments
0
2022-06-27T22:33:19Z
2023-11-24T09:12:41Z
https://github.com/u5cms/u5cms/issues/51
1,286,515,155
51
3,929
CVE-2022-36197
2022-08-03T01:15:07.500
BigTree CMS 4.4.16 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted PDF file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bigtreecms/BigTree-CMS/issues/392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bigtreecms:bigtree_cms:4.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "AEB6ABFA-D209-4EEE-A95A-2D7215EF33AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/bigtreecms/BigTree-CMS/issues/392
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bigtreecms", "BigTree-CMS" ]
A stored cross-site scripting (XSS) vulnerability exists in BigTree-CMS 4.4.16 that allows an authenticated user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack. 1. Login as admin and access the file...
A stored cross-site scripting (XSS) vulnerability exists in BigTree CMS 4.4.16
https://api.github.com/repos/bigtreecms/BigTree-CMS/issues/392/comments
14
2022-07-13T08:52:31Z
2024-05-05T08:19:20Z
https://github.com/bigtreecms/BigTree-CMS/issues/392
1,303,118,093
392
3,930
CVE-2022-34967
2022-08-03T02:15:07.783
The assertion `stmt->Dbc->FirstStmt' failed in MonetDB Database Server v11.43.13.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/MonetDB/MonetDB/issues/7306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monetdb:monetdb:11.43.13:*:*:*:*:*:*:*", "matchCriteriaId": "4217E8A4-6972-44A1-B8B6-45F57F4C6486", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "617" ]
617
https://github.com/MonetDB/MonetDB/issues/7306
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "MonetDB", "MonetDB" ]
**Describe the bug** ODBC Driver assertion failed **To Reproduce** command to start odbc client: ```sh apt install unixodbc # config MonetDB in $HOME/.odbc.ini ... isql monetdb -v ``` Input the following statements: ```sql SELECT avg(42) over (order by row_number() over ()); SELECT 1; ``` It will e...
ODBC Driver Assertion `stmt->Dbc->FirstStmt' Failed
https://api.github.com/repos/MonetDB/MonetDB/issues/7306/comments
8
2022-06-19T01:18:36Z
2024-06-27T13:17:40Z
https://github.com/MonetDB/MonetDB/issues/7306
1,275,924,048
7,306
3,931
CVE-2022-34969
2022-08-03T02:15:07.877
PingCAP TiDB v6.1.0 was discovered to contain a NULL pointer dereference.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/pingcap/tidb/issues/35310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pingcap:tidb:6.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "134E1786-FCEA-430A-A2E8-D083B20CF09C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/pingcap/tidb/issues/35310
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "pingcap", "tidb" ]
## Bug Report Please answer these questions before submitting your issue. Thanks! ### 1. Minimal reproduce step (Required) ```sql SET sql_mode=""; GRANT ALL PRIVILEGES ON *.* to '???'; ``` ### 2. What did you expect to see? (Required) ``` Query OK, 0 rows affected (0.00 sec) ERROR 1410 (42000): You ...
runtime error: invalid memory address or nil pointer dereference (Maybe not a bug)
https://api.github.com/repos/pingcap/tidb/issues/35310/comments
2
2022-06-12T13:45:43Z
2022-06-14T08:52:34Z
https://github.com/pingcap/tidb/issues/35310
1,268,587,049
35,310
3,932
CVE-2022-34992
2022-08-03T18:15:12.017
Luadec v0.9.9 was discovered to contain a heap-buffer overflow via the function UnsetPending.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/viruscamp/luadec/issues/84" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:luadec_project:luadec:0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "86013A43-567F-49FF-8CC6-4402E5AC3839", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/viruscamp/luadec/issues/84
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "viruscamp", "luadec" ]
Hi :) When I was decompiling the Lua script on openwrt, I found a `segmentation fault` error. I try to debug luadec to find the location of bug. Size of some array variables in function structure is 255. However, these variables were accessed out of bounds in decompiling. ```c #define MAXARG_A ((1<<SIZE_A)...
Heap-buffer-overflow in UnsetPending
https://api.github.com/repos/viruscamp/luadec/issues/84/comments
0
2022-06-25T08:51:44Z
2022-06-27T12:02:14Z
https://github.com/viruscamp/luadec/issues/84
1,284,512,320
84
3,933
CVE-2022-35161
2022-08-03T21:15:08.260
GVRET Stable Release as of Aug 15, 2015 was discovered to contain a buffer overflow via the handleConfigCmd function at SerialConsole.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/collin80/GVRET/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:generalized_electric_vehicle_reverse_engineering_tool_project:generalized_electric_vehicle_reverse_engineering_tool:2015-08-15:*:*:*:*:*:*:*", "matchCriteriaId": "B054027C-5AC7-405B-9469-40E5EC4C2A8E", ...
[ "120" ]
120
https://github.com/collin80/GVRET/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "collin80", "GVRET" ]
hi, great project! There is a buffer overflow vulnerability in the handleConfigCmd function of the SerialConsole.cpp file. When cmdString == String("FILEEXT")), the newString is copied to fileNameExt without checking the length, and overflow may occur. ```c void SerialConsole::handleConfigCmd() { int i; ...
buffer overflow in SerialConsole.cpp
https://api.github.com/repos/collin80/GVRET/issues/27/comments
1
2022-07-02T08:16:49Z
2023-10-20T10:13:20Z
https://github.com/collin80/GVRET/issues/27
1,292,000,397
27
3,934
CVE-2022-35505
2022-08-03T21:15:08.303
A segmentation fault in TripleCross v0.1.0 occurs when sending a control command from the client to the server. This occurs because there is no limit to the length of the output of the executed command.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/h3xduck/TripleCross/issues/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:triplecross_project:triplecross:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD36F6DA-0079-479B-9760-FC5C4BDC3FA4", "versionEndExcluding": null, "versionEndIncluding": null, "ve...
[ "770" ]
770
https://github.com/h3xduck/TripleCross/issues/40
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "h3xduck", "TripleCross" ]
hi, great project! I think it's better to limit the size of `res`, otherwise it may cause the program to crash, such as performing "cat /dev/random | od -x", which maybe unlikely in reality. ``` char *execute_command(char *command) { FILE *fp; char *res = calloc(4096, sizeof(char)); char buf[1024]; fp ...
segmentation fault when execute_command and the stack overflow caused by parameters
https://api.github.com/repos/h3xduck/TripleCross/issues/40/comments
5
2022-07-05T17:03:53Z
2023-10-20T10:13:44Z
https://github.com/h3xduck/TripleCross/issues/40
1,294,550,315
40
3,935
CVE-2022-31119
2022-08-04T18:15:09.557
Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions of Nextcloud mail would log user passwords to disk in the event of a misconfiguration. Should an attacker gain access to the logs complete access to affected accounts would be obtainable. It is recommended that the Nextcl...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integri...
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nextcloud/mail/issues/823" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nextc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*", "matchCriteriaId": "1105B681-6F8C-4A93-9095-A0E5E47FB63F", "versionEndExcluding": "1.12.1", "versionEndIncluding": null, "versionStartExcludi...
[ "532" ]
532
https://github.com/nextcloud/mail/issues/823
[ "Third Party Advisory" ]
github.com
[ "nextcloud", "mail" ]
### Steps to reproduce 1. Install mail app 2. configure Mail app, **but** make a fault (e.g. wrong IMAP Server Port) so that the setup is not completed 3. look at nextcloud.log and see: password in PLAINTEXT ### Expected behaviour Do not log in any circumstances (at least not in Log-Level 2/3) ANY passwords to d...
password disclosure in initial setup
https://api.github.com/repos/nextcloud/mail/issues/823/comments
6
2018-03-07T15:47:28Z
2022-07-25T11:58:24Z
https://github.com/nextcloud/mail/issues/823
303,150,826
823
3,936
CVE-2022-35858
2022-08-04T20:15:20.013
The TEE_PopulateTransientObject and __utee_from_attr functions in Samsung mTower 0.3.0 allow a trusted application to trigger a memory overwrite, denial of service, and information disclosure by invoking the function TEE_PopulateTransientObject with a large number in the parameter attrCount.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tee/lib/libutee/tee_api_objects.c#L283" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samsung:mtower:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BCFFBF4-D702-4AE7-9022-337184251075", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "401" ]
401
https://github.com/Samsung/mTower/issues/71
[ "Third Party Advisory" ]
github.com
[ "Samsung", "mTower" ]
**Affected components:** affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_PopulateTransientObject and __utee_from_attr **Attack vector(s)** To exploit the vulnerability, invoke the function TEE_PopulateTransientObject and pass a large number of the parameter "attrCount" ...
Security: Memory Leak in the function TEE_PopulateTransientObject
https://api.github.com/repos/Samsung/mTower/issues/71/comments
1
2022-08-01T06:05:40Z
2022-11-24T20:35:19Z
https://github.com/Samsung/mTower/issues/71
1,323,873,733
71
3,937
CVE-2022-37434
2022-08-05T07:15:07.240
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the n...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Oct/37" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A031AE-1A48-4E95-A632-B0CBD2A8048D", "versionEndExcluding": null, "versionEndIncluding": "1.2.12", "versionStartExcluding": ...
[ "787" ]
787
https://github.com/curl/curl/issues/9271
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "curl", "curl" ]
### I did this Using zlib v1.2.12 [patched](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1) for [CVE-2022-37434](https://nvd.nist.gov/vuln/detail/CVE-2022-37434): ```bash make test # or... cd tests ./runtests.pl 224 test 0224...[HTTP GET gzip compressed content with huge com...
Test 224 fails with CVE-2022-37434 patched zlib
https://api.github.com/repos/curl/curl/issues/9271/comments
12
2022-08-07T23:38:56Z
2022-10-14T07:54:32Z
https://github.com/curl/curl/issues/9271
1,331,154,166
9,271
3,938
CVE-2022-35426
2022-08-10T20:15:54.043
UCMS 1.6 is vulnerable to arbitrary file upload via ucms/sadmin/file PHP file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cc-225/ucms_v1.6/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ucms_project:ucms:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4ED914EC-C479-4D5F-8322-2241E409AECC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "434" ]
434
https://github.com/cc-225/ucms_v1.6/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cc-225", "ucms_v1.6" ]
UCMS_v1.6.0 Arbitrary file upload vulnerability Vulnerability type: V 1.6.0 Recurrence environment: Windows 10 phpstudy Vulnerability description: The vulnerability lies in /ucms-v1.6/ucms/sadmin/file PHP file, the file suffix on is not verified, so any file can be uploaded Loophole recurrence: ...
UCMs v1.6.0 arbitrary file upload
https://api.github.com/repos/cc-225/ucms_v1.6/issues/1/comments
0
2022-07-05T03:46:04Z
2022-07-05T03:46:04Z
https://github.com/cc-225/ucms_v1.6/issues/1
1,293,747,958
1
3,939
CVE-2022-38155
2022-08-11T01:15:10.917
TEE_Malloc in Samsung mTower through 0.3.0 allows a trusted application to achieve Excessive Memory Allocation via a large len value, as demonstrated by a Numaker-PFM-M2351 TEE kernel crash.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tee/lib/libutee/tee_api.c#L314" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B", "versionEndExcluding": null, "versionEndIncluding": "0.3.0", "versionStartExcludin...
[ "770" ]
770
https://github.com/Samsung/mTower/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Samsung", "mTower" ]
**Affected components:** affected source code file: /tee/lib/libutee/tee_api.c, affected functions: TEE_Malloc **Attack vector(s)** To exploit the vulnerability, invoke the function TEE_Malloc and pass a large number to the parameter "len". **Suggested description of the vulnerability for use in the CVE** ...
Security: Memory Allocation with Excessive Size Value in the function TEE_Malloc
https://api.github.com/repos/Samsung/mTower/issues/74/comments
1
2022-08-01T06:09:46Z
2022-11-18T16:06:57Z
https://github.com/Samsung/mTower/issues/74
1,323,878,550
74
3,940
CVE-2022-38223
2022-08-15T11:21:43.557
There is an out-of-bounds write in checkType located in etc.c in w3m 0.5.3. It can be triggered by sending a crafted HTML file to the w3m binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tats/w3m/issues/242" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00030.html" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tats:w3m:0.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "06FBD8AD-A8A0-4E54-B2AE-3F6D9B008628", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": n...
[ "787" ]
787
https://github.com/tats/w3m/issues/242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tats", "w3m" ]
Hello, I found a out of bound write in w3m, function checkType, etc.c:441 while testing my new fuzzer. ## step to reproduce `export CC="gcc -fsanitize=address -g" ./configure --disable-shared && make -j8` `./w3m $POC` ## Environment * Ubuntu 22.04 (docker image) * w3m latest commit c515ea8a47b62408943390f579...
[BUG] out of bound write in checkType, etc.c:441
https://api.github.com/repos/tats/w3m/issues/242/comments
13
2022-08-07T11:27:28Z
2022-12-21T11:16:01Z
https://github.com/tats/w3m/issues/242
1,330,988,298
242
3,941
CVE-2022-36262
2022-08-15T12:15:20.673
An issue was discovered in taocms 3.0.2. in the website settings that allows arbitrary php code to be injected by modifying config.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "URL Repurposed" ], "url": "http://taocms.com" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms" }, { "source": "cve...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "94" ]
94
https://github.com/taogogo/taocms/issues/34
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
1. We enter the management page, Go to website settings. ![image](https://user-images.githubusercontent.com/39737245/179381624-70b8a26f-29c1-4208-b373-fff0250394df.png) 2. Next, I want to inject php code by modifying these settings. From the config.php file we found that the modified configuration will be writte...
Bypass security protection injection code in the website settings function
https://api.github.com/repos/taogogo/taocms/issues/34/comments
0
2022-07-17T03:21:56Z
2022-07-17T03:21:56Z
https://github.com/taogogo/taocms/issues/34
1,306,974,846
34
3,942
CVE-2022-36262
2022-08-15T12:15:20.673
An issue was discovered in taocms 3.0.2. in the website settings that allows arbitrary php code to be injected by modifying config.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "URL Repurposed" ], "url": "http://taocms.com" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms" }, { "source": "cve...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "94" ]
94
https://github.com/taogogo/taocms/issues/34?by=xboy%28topsec%29
null
github.com
[ "taogogo", "taocms" ]
1. We enter the management page, Go to website settings. ![image](https://user-images.githubusercontent.com/39737245/179381624-70b8a26f-29c1-4208-b373-fff0250394df.png) 2. Next, I want to inject php code by modifying these settings. From the config.php file we found that the modified configuration will be writte...
Bypass security protection injection code in the website settings function
https://api.github.com/repos/taogogo/taocms/issues/34/comments
0
2022-07-17T03:21:56Z
2022-07-17T03:21:56Z
https://github.com/taogogo/taocms/issues/34
1,306,974,846
34
3,943
CVE-2020-21365
2022-08-15T20:15:08.107
Directory traversal vulnerability in wkhtmltopdf through 0.12.5 allows remote attackers to read local files and disclose sensitive information via a crafted html file running with the default configurations.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wkhtmltopdf/wkhtmltopdf/issues/4536" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wkhtmltopdf:wkhtmltopdf:*:*:*:*:*:*:*:*", "matchCriteriaId": "188C03DB-7001-45E0-BCF9-C31881353BCC", "versionEndExcluding": null, "versionEndIncluding": "0.12.5", "versionSta...
[ "22" ]
22
https://github.com/wkhtmltopdf/wkhtmltopdf/issues/4536
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wkhtmltopdf", "wkhtmltopdf" ]
**wkhtmltopdf version(s) affected**: all version ( <=0.12.5 ) **OS information** All supported OS **Description** Because the same-origin policy is not strict enough, the html files under the `file` domain can read any files. **How to reproduce** Create an HTML file named `111.html` The file contents a...
The same origin policy allows local files to be read by default
https://api.github.com/repos/wkhtmltopdf/wkhtmltopdf/issues/4536/comments
14
2019-11-21T07:17:33Z
2020-10-20T09:24:57Z
https://github.com/wkhtmltopdf/wkhtmltopdf/issues/4536
526,410,059
4,536
3,944
CVE-2020-23622
2022-08-15T20:15:09.040
An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked CALLBACK parameter in the request header
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/4thline/cling/issues/253" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://zh-cn.tenable.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cling_project:cling:*:*:*:*:*:*:*:*", "matchCriteriaId": "740B8998-CC1B-4AC7-A0EC-216E4230D80F", "versionEndExcluding": null, "versionEndIncluding": "2.1.2", "versionStartExc...
[ "918" ]
918
https://github.com/4thline/cling/issues/253
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "4thline", "cling" ]
The Upnp protocol implemented in the latest version of cling has a flaw, and the CALLBACK parameter in the request header of the service's subscribe request is not checked, resulting in the attacker using this flaw to send malicious data to the device developed using cling, which causes the device to specify to the att...
SSRF and DDOS vulnerability
https://api.github.com/repos/4thline/cling/issues/253/comments
0
2020-06-10T10:10:26Z
2020-06-10T10:10:26Z
https://github.com/4thline/cling/issues/253
636,120,676
253
3,945
CVE-2022-36272
2022-08-16T13:15:11.357
Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/page/verify URI via fieldName parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ming-soft/MCMS/issues/97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mingsoft:mcms:5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "7C5B845C-EA6C-4362-B197-7C58FE4C8129", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/ming-soft/MCMS/issues/97
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ming-soft", "MCMS" ]
# 漏洞分析 漏洞路由位置/${ms.manager.path}/mdiy/page/verify,漏洞点在如下方法,if...else两个条件中的validated方法均存在问题。 <img width="1388" alt="image-20220717104840622" src="https://user-images.githubusercontent.com/76940213/179385662-6320f8e4-9a66-4a5d-a720-1e7bec901c13.png"> 调用了父类的`validated`方法,validated方法中将传入的fieldName和fieldValue复制wher...
Mingsoft MCMS v5.2.8 SQL注入【后台】
https://api.github.com/repos/ming-soft/MCMS/issues/97/comments
1
2022-07-17T06:10:16Z
2022-09-09T01:37:02Z
https://github.com/ming-soft/MCMS/issues/97
1,306,999,774
97
3,946
CVE-2022-36530
2022-08-16T13:15:11.593
An issue was discovered in rageframe2 2.6.37. There is a XSS vulnerability in the user agent related parameters of the info.php page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "URL Repurposed" ], "url": "http://rageframe2.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jianyan74/rageframe2" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rageframe:rageframe:2.6.37:*:*:*:*:*:*:*", "matchCriteriaId": "A47AB39E-4AD7-4349-BBD5-4F11B4D4C0D4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/jianyan74/rageframe2/issues/106
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jianyan74", "rageframe2" ]
## Reflective Cross Site Scripting at info.php 1. I found that at line 50 of backend/common/system/info.php, Receive parameters without any filtering at `$_SERVER['HTTP_USER_AGENT']`. ![image](https://user-images.githubusercontent.com/39737245/179454166-66bdbfb6-674f-407f-a82d-cbb44bd17193.png) 2. This is an ...
Reflective Cross Site Scripting at info.php
https://api.github.com/repos/jianyan74/rageframe2/issues/106/comments
4
2022-07-18T06:57:57Z
2022-09-05T18:30:54Z
https://github.com/jianyan74/rageframe2/issues/106
1,307,490,211
106
3,947
CVE-2022-36530
2022-08-16T13:15:11.593
An issue was discovered in rageframe2 2.6.37. There is a XSS vulnerability in the user agent related parameters of the info.php page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "URL Repurposed" ], "url": "http://rageframe2.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jianyan74/rageframe2" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rageframe:rageframe:2.6.37:*:*:*:*:*:*:*", "matchCriteriaId": "A47AB39E-4AD7-4349-BBD5-4F11B4D4C0D4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "79" ]
79
https://github.com/jianyan74/rageframe2/issues/106?by=xboy%28Topsec%29
null
github.com
[ "jianyan74", "rageframe2" ]
## Reflective Cross Site Scripting at info.php 1. I found that at line 50 of backend/common/system/info.php, Receive parameters without any filtering at `$_SERVER['HTTP_USER_AGENT']`. ![image](https://user-images.githubusercontent.com/39737245/179454166-66bdbfb6-674f-407f-a82d-cbb44bd17193.png) 2. This is an ...
Reflective Cross Site Scripting at info.php
https://api.github.com/repos/jianyan74/rageframe2/issues/106/comments
4
2022-07-18T06:57:57Z
2022-09-05T18:30:54Z
https://github.com/jianyan74/rageframe2/issues/106
1,307,490,211
106
3,948
CVE-2022-34998
2022-08-16T21:15:10.403
JPEGDEC commit be4843c was discovered to contain a global buffer overflow via JPEGDecodeMCU at /src/jpeg.inl.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bitbank2/JPEGDEC/issues/41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitbanksoftware:jpegdec:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2AD48ECE-E09D-4E1E-9483-C049A63EAB96", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "120" ]
120
https://github.com/bitbank2/JPEGDEC/issues/41
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bitbank2", "JPEGDEC" ]
hi, with the help of fuzzing ,I found some crash sample in this repo. crash sample will be offered, and to reproduce the crash info please use command `./linux/jpegdec crash_sample` ## negative-size-param ### sample here: [negative-size-param-crash-sample.zip](https://github.com/bitbank2/JPEGDEC/files/9015823...
BUGS FOUND
https://api.github.com/repos/bitbank2/JPEGDEC/issues/41/comments
2
2022-06-30T03:14:11Z
2025-02-07T17:18:22Z
https://github.com/bitbank2/JPEGDEC/issues/41
1,289,522,620
41
3,949
CVE-2022-35007
2022-08-16T21:15:10.620
PNGDec commit 8abf6be was discovered to contain a heap buffer overflow via __interceptor_fwrite.part.57 at sanitizer_common_interceptors.inc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bitbank2/PNGdec/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pngdec_project:pngdec:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D61EF480-84D3-471F-8D05-3358C729D827", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/bitbank2/PNGdec/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bitbank2", "PNGdec" ]
hi, i found something unusual in this repo, are they new bugs ? To reproduce the crash please use command: `./png_demo @@ /dev/null (replace @@ to the sample's path)` ## FPE ### crash sample [id0-FPE-sample1.zip](https://github.com/bitbank2/PNGdec/files/9018637/id0-FPE-sample1.zip) ### crash info ``` Ad...
BUGS FOUND
https://api.github.com/repos/bitbank2/PNGdec/issues/10/comments
1
2022-06-30T10:01:15Z
2024-03-25T23:07:11Z
https://github.com/bitbank2/PNGdec/issues/10
1,289,895,820
10
3,950
CVE-2022-35100
2022-08-16T21:15:10.973
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via gfxline_getbbox at /lib/gfxtools.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "125" ]
125
https://github.com/matthiaskramm/swftools/issues/182
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
Hi, I currently learn to use fuzz tech to detect bugs and I found something in this repo. in order to reproduce the crash info, please attach ASAN when you compile this repo. ## heap buffer overflow ### reproduce command to reproduce: ./pdf2swf -G -f -t [sample file] -o /dev/null ### sample file [id3_he...
bug found in swftools-pdf2swf
https://api.github.com/repos/swftools/swftools/issues/182/comments
0
2022-07-03T08:46:34Z
2022-07-04T03:25:22Z
https://github.com/swftools/swftools/issues/182
1,292,246,190
182
3,951
CVE-2022-35105
2022-08-16T21:15:11.107
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via /bin/png2swf+0x552cea.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
Hi, I currently learn to use fuzz tech to detect bugs and I found something in this repo. in order to reproduce the crash info, please attach ASAN when you compile this repo. ## heap buffer overflow ### reproduce command to reproduce the crash : ./png2swf -j 50 [sample file] -o /dev/null ### sample file [id...
bug found in swftools-png2swf
https://api.github.com/repos/swftools/swftools/issues/183/comments
0
2022-07-03T08:51:23Z
2022-07-04T03:22:44Z
https://github.com/swftools/swftools/issues/183
1,292,247,150
183
3,952
CVE-2022-35107
2022-08-16T21:15:11.180
SWFTools commit 772e55a2 was discovered to contain a stack overflow via vfprintf at /stdio-common/vfprintf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "770" ]
770
https://github.com/matthiaskramm/swftools/issues/184
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# heap buffer overflow ### reproduce command to reproduce: ./pdf2swf -G -f -t [sample file] -o /dev/null ### sample file [id458_heap_overflow_draw_stroke.zip](https://github.com/matthiaskramm/swftools/files/9036118/id458_heap_overflow_draw_stroke.zip) ### crash info ``` ==11942==ERROR: AddressSanitizer: heap-b...
bug report swftools-pdf2swf
https://api.github.com/repos/swftools/swftools/issues/184/comments
0
2022-07-04T03:13:51Z
2022-07-04T03:20:37Z
https://github.com/swftools/swftools/issues/184
1,292,557,716
184
3,953
CVE-2022-35113
2022-08-16T21:15:11.363
SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via swf_DefineLosslessBitsTagToImage at /modules/swfbits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/185
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# swfrender ## heap buffer overflow ### command to reproduce `./swfrender [sample file] -o /dev/null` ### crash sample [id8_heap-buffer-overflow_swf_DefineLosslessBitsTagToImage.zip](https://github.com/matthiaskramm/swftools/files/9036326/id8_heap-buffer-overflow_swf_DefineLosslessBitsTagToImage.zip) ### cr...
bug found in swfrender
https://api.github.com/repos/swftools/swftools/issues/185/comments
0
2022-07-04T04:15:24Z
2022-07-04T04:15:24Z
https://github.com/swftools/swftools/issues/185
1,292,592,670
185
3,954
CVE-2022-35433
2022-08-16T21:15:11.440
ffjpeg commit caade60a69633d74100bd3c2528bddee0b6a1291 was discovered to contain a memory leak via /src/jfif.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ffjpeg_project:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1391A61-FDE9-48B2-A3F5-5A162BA44F82", "versionEndExcluding": "2021-12-16", "versionEndIncluding": null, "versionS...
[ "401" ]
401
https://github.com/rockcarry/ffjpeg/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
### sample file [id8_memory_leak.zip](https://github.com/rockcarry/ffjpeg/files/9053199/id8_memory_leak.zip) ### command to reproduce `./ffjpeg -d [sample file]` ### execute info ``` usrc overflow ================================================================= ==16225==ERROR: LeakSanitizer: detected me...
memory leak
https://api.github.com/repos/rockcarry/ffjpeg/issues/52/comments
1
2022-07-06T08:50:43Z
2023-07-13T01:47:45Z
https://github.com/rockcarry/ffjpeg/issues/52
1,295,485,297
52
3,955
CVE-2022-35434
2022-08-16T21:15:11.477
jpeg-quantsmooth before commit 8879454 contained a floating point exception (FPE) via /jpeg-quantsmooth/jpegqs+0x4f5d6c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ilyakurdyukov/jpeg-quantsmooth/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg_quant_smooth_project:jpeg_quant_smooth:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E70D5AC-A410-48F8-BE3D-90CD1392BEC5", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "697" ]
697
https://github.com/ilyakurdyukov/jpeg-quantsmooth/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ilyakurdyukov", "jpeg-quantsmooth" ]
### sample file [id0_FPE_jpegqs+0x41c889.zip](https://github.com/ilyakurdyukov/jpeg-quantsmooth/files/9078414/id0_FPE_jpegqs%2B0x41c889.zip) ### command to reproduce `./jpegqs -o [sample file] /dev/null` ### crash detail ``` AddressSanitizerAddressSanitizerAddressSanitizerAddressSanitizer:DEADLYSIGNAL...
New issue about FPB
https://api.github.com/repos/ilyakurdyukov/jpeg-quantsmooth/issues/25/comments
1
2022-07-10T04:04:00Z
2022-07-10T06:38:49Z
https://github.com/ilyakurdyukov/jpeg-quantsmooth/issues/25
1,299,822,380
25
3,956
CVE-2022-36139
2022-08-16T21:15:12.953
SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Writer::writeByte(unsigned char).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "787" ]
787
https://github.com/djcsdy/swfmill/issues/56
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id10_heap-buffer-overflow_writebyte.zip](https://github.com/Cvjark/Poc/files/9080797/id10_heap-buffer-overflow_writebyte.zip) ### command to reproduce `./swfmill simple @@ /dev/null` ### crash detail ``` ================================================================= ==56715==ERROR: Addres...
heap-buffer-overflow in SWF::Writer::writeByte(unsigned char)
https://api.github.com/repos/djcsdy/swfmill/issues/56/comments
0
2022-07-11T03:58:04Z
2022-07-11T03:58:04Z
https://github.com/djcsdy/swfmill/issues/56
1,300,170,829
56
3,957
CVE-2022-36140
2022-08-16T21:15:12.990
SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::DeclareFunction2::write(SWF::Writer*, SWF::Context*).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "754" ]
754
https://github.com/djcsdy/swfmill/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id41_SEGV_DeclareFunction2_write.zip](https://github.com/Cvjark/Poc/files/9080778/id41_SEGV_DeclareFunction2_write.zip) ### command to reproduce `./swfmill simple @@ /dev/null` ### crash detail ``` AddressSanitizer:DEADLYSIGNAL ================================================================...
SEGV in SWF::DeclareFunction2::write(SWF::Writer*, SWF::Context*)
https://api.github.com/repos/djcsdy/swfmill/issues/57/comments
0
2022-07-11T04:01:34Z
2022-07-11T04:01:34Z
https://github.com/djcsdy/swfmill/issues/57
1,300,172,450
57
3,958
CVE-2022-36141
2022-08-16T21:15:13.030
SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::MethodBody::write(SWF::Writer*, SWF::Context*).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/58" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "754" ]
754
https://github.com/djcsdy/swfmill/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id11_SEGV_MethodBodywrite.zip](https://github.com/Cvjark/Poc/files/9080801/id11_SEGV_MethodBodywrite.zip) ### command to reproduce `./swfmill simple @@ /dev/null` ### crash detail ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==56731==ER...
SEGV in SWF::MethodBody::write(SWF::Writer*, SWF::Context*)
https://api.github.com/repos/djcsdy/swfmill/issues/58/comments
0
2022-07-11T04:06:43Z
2022-07-11T04:06:43Z
https://github.com/djcsdy/swfmill/issues/58
1,300,175,740
58
3,959
CVE-2022-36142
2022-08-16T21:15:13.073
SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Reader::getU30().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "787" ]
787
https://github.com/djcsdy/swfmill/issues/61
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id2_heap-buffer-overflow_getU30.zip](https://github.com/Cvjark/Poc/files/9080686/id2_heap-buffer-overflow_getU30.zip) ### command to reproduce `./swfmill swf2xml [sample file] /dev/null` ### crash detail ``` ==55588==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a0000051f3 at pc...
heap-buffer-overflow in SWF::Reader::getU30()
https://api.github.com/repos/djcsdy/swfmill/issues/61/comments
0
2022-07-11T04:27:58Z
2022-07-11T04:27:58Z
https://github.com/djcsdy/swfmill/issues/61
1,300,190,030
61
3,960
CVE-2022-36143
2022-08-16T21:15:13.113
SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via __interceptor_strlen.part at /sanitizer_common/sanitizer_common_interceptors.inc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "787" ]
787
https://github.com/djcsdy/swfmill/issues/62
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id5_heap-buffer-overflow_372.zip](https://github.com/Cvjark/Poc/files/9080709/id5_heap-buffer-overflow_372.zip) ### command to reproduce `./swfmill swf2xml [sample file] /dev/null` ### crash detail ``` ==55620==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a0000051f3 at pc 0x0...
heap-buffer-overflow
https://api.github.com/repos/djcsdy/swfmill/issues/62/comments
0
2022-07-11T04:29:52Z
2022-07-11T04:29:52Z
https://github.com/djcsdy/swfmill/issues/62
1,300,191,194
62
3,961
CVE-2022-36144
2022-08-16T21:15:13.150
SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via base64_encode.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "787" ]
787
https://github.com/djcsdy/swfmill/issues/63
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id11_heap-buffer-overflow_base64_encode.zip](https://github.com/Cvjark/Poc/files/9080710/id11_heap-buffer-overflow_base64_encode.zip) ### command to reproduce `./swfmill swf2xml [sample file] /dev/null` ### crash detail ``` ==55556==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x...
heap-buffer-overflow in base64_encode
https://api.github.com/repos/djcsdy/swfmill/issues/63/comments
0
2022-07-11T04:32:42Z
2022-07-11T04:32:42Z
https://github.com/djcsdy/swfmill/issues/63
1,300,192,907
63
3,962
CVE-2022-36145
2022-08-16T21:15:13.187
SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::Reader::getWord().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "754" ]
754
https://github.com/djcsdy/swfmill/issues/64
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id4_SEGV_getWord.zip](https://github.com/Cvjark/Poc/files/9080713/id4_SEGV_getWord.zip) ### command to reproduce `./swfmill swf2xml [sample file] /dev/null` ### crash detail ``` ==55604==ERROR: AddressSanitizer: SEGV on unknown address 0x629feb002f56 (pc 0x0000005339a8 bp 0x000000bd0dc0 sp 0...
SEGV in SWF::Reader::getWord()
https://api.github.com/repos/djcsdy/swfmill/issues/64/comments
0
2022-07-11T04:34:48Z
2022-07-11T04:34:48Z
https://github.com/djcsdy/swfmill/issues/64
1,300,194,170
64
3,963
CVE-2022-36146
2022-08-16T21:15:13.223
SWFMill commit 53d7690 was discovered to contain a memory allocation issue via operator new[](unsigned long) at asan_new_delete.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/djcsdy/swfmill/issues/65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A", "versionEndExcluding": null, "versionEndIncluding": "0.3.6", "versionStartExcludi...
[ "770" ]
770
https://github.com/djcsdy/swfmill/issues/65
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "djcsdy", "swfmill" ]
### sample file [id0_allocation-size-too-big_new.zip](https://github.com/Cvjark/Poc/files/9080719/id0_allocation-size-too-big_new.zip) ### command to reproduce `./swfmill swf2xml [sample file] /dev/null` ### crash detail ``` ==55540==ERROR: AddressSanitizer: requested allocation size 0xfffffffffffff4d6 (0x4d...
issue about memory allocation
https://api.github.com/repos/djcsdy/swfmill/issues/65/comments
0
2022-07-11T04:36:56Z
2022-07-11T04:48:41Z
https://github.com/djcsdy/swfmill/issues/65
1,300,195,408
65
3,964
CVE-2022-36148
2022-08-16T21:15:13.260
fdkaac commit 53fe239 was discovered to contain a floating point exception (FPE) via wav_open at /src/wav_reader.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nu774/fdkaac/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fdkaac_project:fdkaac:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D97131C-0389-4805-8DA2-DED74C93A0FE", "versionEndExcluding": "1.0.3", "versionEndIncluding": null, "versionStartE...
[ "697" ]
697
https://github.com/nu774/fdkaac/issues/52
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nu774", "fdkaac" ]
### sample file [id0_FPE_in_wav_open.zip](https://github.com/Cvjark/Poc/files/9089415/id0_FPE_in_wav_open.zip) ### command to reproduce `./fdkaac -m3 [sample file] -o /dev/null` ### crash detail ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==78507...
New issue about FPE_in_wav_open
https://api.github.com/repos/nu774/fdkaac/issues/52/comments
3
2022-07-12T04:16:59Z
2022-07-13T12:05:12Z
https://github.com/nu774/fdkaac/issues/52
1,301,512,586
52
3,965
CVE-2022-36149
2022-08-16T21:15:13.297
tifig v0.2.2 was discovered to contain a heap-use-after-free via temInfoEntry().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monostream/tifig/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "416" ]
416
https://github.com/monostream/tifig/issues/70
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monostream", "tifig" ]
### crash sample [id17_heap-use-after-free_in_ItemInfoEntry.zip](https://github.com/monostream/tifig/files/9120846/id17_heap-use-after-free_in_ItemInfoEntry.zip) ### command to reproduce `./tifig -v -p [crash sample] /dev/null` ### crash detail ``` ==53276==ERROR: AddressSanitizer: heap-use-after-free on ad...
heap-use-after-free in ~ItemInfoEntry()
https://api.github.com/repos/monostream/tifig/issues/70/comments
0
2022-07-15T12:46:28Z
2022-07-15T12:46:28Z
https://github.com/monostream/tifig/issues/70
1,305,996,386
70
3,966
CVE-2022-36150
2022-08-16T21:15:13.337
tifig v0.2.2 was discovered to contain a heap-buffer overflow via __asan_memmove at /asan/asan_interceptors_memintrinsics.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monostream/tifig/issues/68" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/monostream/tifig/issues/68
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monostream", "tifig" ]
Hi, by testing this repo, i found something unusual. ### crash sample [id0_heap_buffer_overflow_in __asan_memmove.zip](https://github.com/monostream/tifig/files/9120807/id0_heap_buffer_overflow_in.__asan_memmove.zip) ### command to reproduce `./tifig -p -v [sample file] /dev/null` ### crash detail ``` =...
Heap buffer overflow
https://api.github.com/repos/monostream/tifig/issues/68/comments
0
2022-07-15T12:42:06Z
2022-07-15T12:42:57Z
https://github.com/monostream/tifig/issues/68
1,305,992,249
68
3,967
CVE-2022-36151
2022-08-16T21:15:13.373
tifig v0.2.2 was discovered to contain a segmentation violation via getType() at /common/bbox.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monostream/tifig/issues/69" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "476" ]
476
https://github.com/monostream/tifig/issues/69
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monostream", "tifig" ]
### crash sample [id15_SEGV_in_getType.zip](https://github.com/monostream/tifig/files/9120821/id15_SEGV_in_getType.zip) ### command to reproduce `./tifig -v -p [crash sample] /dev/null` ### crash detail ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==53...
SEGV in getType()
https://api.github.com/repos/monostream/tifig/issues/69/comments
0
2022-07-15T12:44:55Z
2022-07-15T12:44:55Z
https://github.com/monostream/tifig/issues/69
1,305,994,908
69
3,968
CVE-2022-36152
2022-08-16T21:15:13.410
tifig v0.2.2 was discovered to contain a memory leak via operator new[](unsigned long) at /asan/asan_new_delete.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monostream/tifig/issues/72" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "401" ]
401
https://github.com/monostream/tifig/issues/72
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monostream", "tifig" ]
### crash sample [id0_memory_leakF9.zip](https://github.com/monostream/tifig/files/9124886/id0_memory_leakF9.zip) ### command to reproduce `../tifig -v -p [crash sample] /dev/null` ### crash detail ``` ==74044==ERROR: LeakSanitizer: detected memory leaks Direct leak of 10 byte(s) in 1 object(s) alloca...
Issues in this repor about memory leak
https://api.github.com/repos/monostream/tifig/issues/72/comments
0
2022-07-16T01:31:10Z
2022-07-16T01:37:46Z
https://github.com/monostream/tifig/issues/72
1,306,663,543
72
3,969
CVE-2022-36153
2022-08-16T21:15:13.447
tifig v0.2.2 was discovered to contain a segmentation violation via std::vector<unsigned int, std::allocator<unsigned int> >::size() const at /bits/stl_vector.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monostream/tifig/issues/71" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "476" ]
476
https://github.com/monostream/tifig/issues/71
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monostream", "tifig" ]
### sample file [id13_SEGV_in_size.zip](https://github.com/monostream/tifig/files/9124844/id13_SEGV_in_size.zip) ### command to reproduce `./tifig -v -p [crash sample] /dev/null` ### crash detail ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==74081=...
SEGV in this repo
https://api.github.com/repos/monostream/tifig/issues/71/comments
0
2022-07-16T01:13:32Z
2022-07-16T01:13:32Z
https://github.com/monostream/tifig/issues/71
1,306,659,145
71
3,970
CVE-2022-36155
2022-08-16T21:15:13.487
tifig v0.2.2 was discovered to contain a resource allocation issue via operator new(unsigned long) at asan_new_delete.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monostream/tifig/issues/73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "770" ]
770
https://github.com/monostream/tifig/issues/73
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monostream", "tifig" ]
### carsh sample [id41_allocation_too_big.zip](https://github.com/monostream/tifig/files/9124893/id41_allocation_too_big.zip) ### command to reproduce `../tifig -v -p [crash sample ] /dev/null` ### crash detail ``` ==74167==ERROR: AddressSanitizer: requested allocation size 0xffffffffffffffff (0x800 after ...
Issue about resources allocate
https://api.github.com/repos/monostream/tifig/issues/73/comments
0
2022-07-16T01:32:48Z
2022-07-16T01:32:48Z
https://github.com/monostream/tifig/issues/73
1,306,664,251
73
3,971
CVE-2022-37781
2022-08-16T21:15:13.690
fdkaac v1.0.3 was discovered to contain a heap buffer overflow via __interceptor_memcpy.part.46 at /sanitizer_common/sanitizer_common_interceptors.inc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nu774/fdkaac/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fdkaac_project:fdkaac:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "17ACD087-BA4A-4126-AB8F-3903597D79B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/nu774/fdkaac/issues/54
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nu774", "fdkaac" ]
Hi, in the lastest version of this repo [PS: commit ID -> 1a1ee29], I found something insterest. ### POC [1id0-heap-buffer-overflow.zip](https://github.com/nu774/fdkaac/files/9257074/1id0-heap-buffer-overflow.zip) ### command to reproduce `./fdkaac -p5 -b64 POC -o /dev/null` ### output ``` ==122363==ERROR:...
bugs found
https://api.github.com/repos/nu774/fdkaac/issues/54/comments
1
2022-08-04T06:09:23Z
2022-08-04T12:17:07Z
https://github.com/nu774/fdkaac/issues/54
1,328,115,070
54
3,972
CVE-2022-38227
2022-08-16T21:15:13.730
XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/jhcloos/xpdf/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id2-stack-overflow.zip](https://github.com/jhcloos/xpdf/files/9278179/8id2-stack-overflow.zip) ### command to reproduce...
stack overflow
https://api.github.com/repos/jhcloos/xpdf/issues/4/comments
0
2022-08-08T02:27:54Z
2022-08-09T08:18:14Z
https://github.com/jhcloos/xpdf/issues/4
1,331,237,183
4
3,973
CVE-2022-38228
2022-08-16T21:15:13.770
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::transformDataUnit at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/jhcloos/xpdf/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id64_heap_buffer_overflow_in_transformDataUnit.zip](https://github.com/jhcloos/xpdf/files/9278198/8id64_heap_buffer_over...
heap_buffer_overflow_in_transformDataUnit
https://api.github.com/repos/jhcloos/xpdf/issues/7/comments
0
2022-08-08T02:33:28Z
2022-08-08T03:06:49Z
https://github.com/jhcloos/xpdf/issues/7
1,331,240,070
7
3,974
CVE-2022-38229
2022-08-16T21:15:13.813
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readHuffSym(DCTHuffTable*) at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/jhcloos/xpdf/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id0_heap-buffer-overflow_in_readHuffSym.zip](https://github.com/jhcloos/xpdf/files/9278166/8id0_heap-buffer-overflow_in_...
heap-buffer-overflow_in_readHuffSym
https://api.github.com/repos/jhcloos/xpdf/issues/3/comments
2
2022-08-08T02:26:09Z
2022-10-26T16:30:16Z
https://github.com/jhcloos/xpdf/issues/3
1,331,236,173
3
3,975
CVE-2022-38230
2022-08-16T21:15:13.853
XPDF commit ffaf11c was discovered to contain a floating point exception (FPE) via DCTStream::decodeImage() at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "697" ]
697
https://github.com/jhcloos/xpdf/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id63_FPE_in_decodeImage.zip](https://github.com/jhcloos/xpdf/files/9278197/8id63_FPE_in_decodeImage.zip) ### command to...
FPE_in_decodeImage
https://api.github.com/repos/jhcloos/xpdf/issues/6/comments
1
2022-08-08T02:32:16Z
2023-12-08T02:13:42Z
https://github.com/jhcloos/xpdf/issues/6
1,331,239,491
6
3,976
CVE-2022-38231
2022-08-16T21:15:13.893
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::getChar() at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/jhcloos/xpdf/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id93_heap_buffer_overflow_in_getChar.zip](https://github.com/jhcloos/xpdf/files/9278226/8id93_heap_buffer_overflow_in_getC...
heap_buffer_overflow_in_getChar
https://api.github.com/repos/jhcloos/xpdf/issues/11/comments
0
2022-08-08T02:37:53Z
2022-08-09T08:16:19Z
https://github.com/jhcloos/xpdf/issues/11
1,331,242,296
11
3,977
CVE-2022-38233
2022-08-16T21:15:13.933
XPDF commit ffaf11c was discovered to contain a segmentation violation via DCTStream::readMCURow() at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "754" ]
754
https://github.com/jhcloos/xpdf/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id69_SEGV_in_readMCURow.zip](https://github.com/jhcloos/xpdf/files/9278208/8id69_SEGV_in_readMCURow.zip) ### command to...
SEGV_in_readMCURow
https://api.github.com/repos/jhcloos/xpdf/issues/9/comments
0
2022-08-08T02:34:55Z
2022-08-08T03:06:21Z
https://github.com/jhcloos/xpdf/issues/9
1,331,240,842
9
3,978
CVE-2022-38234
2022-08-16T21:15:13.970
XPDF commit ffaf11c was discovered to contain a segmentation violation via Lexer::getObj(Object*) at /xpdf/Lexer.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "754" ]
754
https://github.com/jhcloos/xpdf/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id95_SEGV_in_getObj.zip](https://github.com/jhcloos/xpdf/files/9278229/8id95_SEGV_in_getObj.zip) ### command to reprodu...
SEGV_in_getObj
https://api.github.com/repos/jhcloos/xpdf/issues/12/comments
0
2022-08-08T02:38:41Z
2022-08-08T03:05:40Z
https://github.com/jhcloos/xpdf/issues/12
1,331,242,652
12
3,979
CVE-2022-38235
2022-08-16T21:15:14.007
XPDF commit ffaf11c was discovered to contain a segmentation violation via DCTStream::getChar() at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "754" ]
754
https://github.com/jhcloos/xpdf/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id46_SEGV_in_getChar.zip](https://github.com/jhcloos/xpdf/files/9278186/8id46_SEGV_in_getChar.zip) ### command to repro...
SEGV_in_getChar
https://api.github.com/repos/jhcloos/xpdf/issues/5/comments
0
2022-08-08T02:31:31Z
2023-12-19T11:30:43Z
https://github.com/jhcloos/xpdf/issues/5
1,331,239,126
5
3,980
CVE-2022-38236
2022-08-16T21:15:14.043
XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "120" ]
120
https://github.com/jhcloos/xpdf/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id65_global_buffer_overflow_in_getObj.zip](https://github.com/jhcloos/xpdf/files/9278202/8id65_global_buffer_overflow_in_g...
global_buffer_overflow_in_getObj
https://api.github.com/repos/jhcloos/xpdf/issues/8/comments
0
2022-08-08T02:34:19Z
2022-08-08T03:06:35Z
https://github.com/jhcloos/xpdf/issues/8
1,331,240,551
8
3,981
CVE-2022-38237
2022-08-16T21:15:14.083
XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readScan() at /xpdf/Stream.cc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jhcloos/xpdf/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/jhcloos/xpdf/issues/14
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jhcloos", "xpdf" ]
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual. ### crash sample [8id103_heap_buffer_overflow_in_readScan.zip](https://github.com/jhcloos/xpdf/files/9278231/8id103_heap_buffer_overflow_in...
heap_buffer_overflow_in_readScan
https://api.github.com/repos/jhcloos/xpdf/issues/14/comments
0
2022-08-08T02:39:57Z
2022-08-08T03:05:25Z
https://github.com/jhcloos/xpdf/issues/14
1,331,243,294
14
3,982