cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 997 | cve_metrics dict | cve_references listlengths 1 68 | cve_configurations listlengths 1 5 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 76
values | url stringlengths 37 79 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 128M 2.84B | issue_number int64 1 128k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2022-47659 | 2023-01-05T16:15:10.670 | GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2354"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2354 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough info... | stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data | https://api.github.com/repos/gpac/gpac/issues/2354/comments | 0 | 2022-12-17T10:31:30Z | 2022-12-17T11:29:28Z | https://github.com/gpac/gpac/issues/2354 | 1,501,315,203 | 2,354 |
CVE-2022-47660 | 2023-01-05T16:15:10.890 | GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2357"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"190"
] | 190 | https://github.com/gpac/gpac/issues/2357 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough info... | integer overflow in isomedia/isom_write.c:4931 | https://api.github.com/repos/gpac/gpac/issues/2357/comments | 0 | 2022-12-17T10:31:40Z | 2022-12-17T11:29:29Z | https://github.com/gpac/gpac/issues/2357 | 1,501,315,390 | 2,357 |
CVE-2022-47661 | 2023-01-05T16:15:11.103 | GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2358"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2358 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
heap-buffer-overf... | heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes | https://api.github.com/repos/gpac/gpac/issues/2358/comments | 0 | 2022-12-18T10:23:38Z | 2022-12-19T11:26:12Z | https://github.com/gpac/gpac/issues/2358 | 1,501,850,698 | 2,358 |
CVE-2022-47662 | 2023-01-05T16:15:11.400 | GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2359"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"674"
] | 674 | https://github.com/gpac/gpac/issues/2359 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
segment fault (/s... | Infinite recursion in Media_GetSample isomedia/media.c:662 | https://api.github.com/repos/gpac/gpac/issues/2359/comments | 0 | 2022-12-18T10:23:42Z | 2022-12-19T11:26:12Z | https://github.com/gpac/gpac/issues/2359 | 1,501,850,761 | 2,359 |
CVE-2022-47663 | 2023-01-05T16:15:11.623 | GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2360"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
},
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2360 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [X] I looked for a similar issue and couldn't find any.
- [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels,
# Description
buffer overflow i... | buffer overflow in h263dmx_process filters/reframe_h263.c:609 | https://api.github.com/repos/gpac/gpac/issues/2360/comments | 0 | 2022-12-18T10:23:45Z | 2022-12-19T11:26:13Z | https://github.com/gpac/gpac/issues/2360 | 1,501,850,806 | 2,360 |
CVE-2022-47105 | 2023-01-19T16:15:11.277 | Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4393"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB811AB-8B4F-4A5A-8851-B617184A298A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"89"
] | 89 | https://github.com/jeecgboot/jeecg-boot/issues/4393 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:3.4.4
##### 前端版本:vue2版
##### 问题描述:sql注入检测代码存在绕过.
##### 截图&代码:
SqlInjectionUtil类中sql的注释正则为
```java
private final static Pattern SQL_ANNOTATION = Pattern.compile("/\\*.*\\*/");
```
.无法匹配到%0A, 导致可以利用/\*%0A\*/绕过
关键字检测后存在空格,导致绕过
```java
private final static String XSS_STR = "and |extractvalue|u... | jeecg-boot3.4.4 存在sql注入漏洞 | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4393/comments | 2 | 2022-12-10T09:17:39Z | 2022-12-23T06:03:37Z | https://github.com/jeecgboot/JeecgBoot/issues/4393 | 1,488,266,227 | 4,393 |
CVE-2022-45537 | 2023-01-20T19:15:16.093 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_LIST_URL". | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article publish with reflected-XSS in the ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/34/comments | 1 | 2022-11-14T08:44:20Z | 2023-02-20T10:13:49Z | https://github.com/weng-xianhu/eyoucms/issues/34 | 1,447,630,496 | 34 |
CVE-2022-45538 | 2023-01-20T19:15:16.160 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_GOBACK_URL". | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/35"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article publish with reflected-XSS in the ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/35/comments | 1 | 2022-11-14T08:49:28Z | 2023-02-20T10:13:18Z | https://github.com/weng-xianhu/eyoucms/issues/35 | 1,447,638,304 | 35 |
CVE-2022-45539 | 2023-01-20T19:15:16.223 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/38"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/38 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background file adding with reflected-XSS in the get ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/38/comments | 1 | 2022-11-14T09:06:48Z | 2023-02-20T08:22:13Z | https://github.com/weng-xianhu/eyoucms/issues/38 | 1,447,664,065 | 38 |
CVE-2022-45540 | 2023-01-20T19:15:16.287 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value "name" if the value contains a malformed UTF-8 char. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/37"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/37 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article type adding with reflected-XSS in ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/37/comments | 1 | 2022-11-14T09:00:48Z | 2023-02-20T08:36:11Z | https://github.com/weng-xianhu/eyoucms/issues/37 | 1,447,653,340 | 37 |
CVE-2022-45541 | 2023-01-20T19:15:16.347 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value "value" if the value contains a non-integer char. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/36 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background article attribute type changing with refle... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/36/comments | 1 | 2022-11-14T08:56:29Z | 2023-02-20T10:01:25Z | https://github.com/weng-xianhu/eyoucms/issues/36 | 1,447,647,465 | 36 |
CVE-2022-45542 | 2023-01-20T19:15:16.400 | EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter "filename" when editing any file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.0",
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | ## Background of Website Reflected Cross-Site Scripting
### Influenced Version
<= 1.6.0-UTF8-SP1
<img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png">
### Description
Background file management editor with reflected-XSS ... | Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/33/comments | 1 | 2022-11-14T08:34:33Z | 2023-02-20T10:49:48Z | https://github.com/weng-xianhu/eyoucms/issues/33 | 1,447,617,306 | 33 |
CVE-2022-48007 | 2023-01-27T18:15:14.947 | A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1835"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:13.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CE9B7C-3D2B-4876-B8E3-5EE46628EA5C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/Piwigo/Piwigo/issues/1835 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Hello, I found Stored XSS in Piwigo version 13.4.0.
**Impact:**
In this way, ordinary users can be promoted to administrator users.
**Here are the complete attack steps:**
1. Register an ordinary user.
... | Piwigo-13.4.0-Stored XSS Vulnerability in User-Agent | https://api.github.com/repos/Piwigo/Piwigo/issues/1835/comments | 0 | 2022-12-21T08:21:08Z | 2022-12-25T10:25:36Z | https://github.com/Piwigo/Piwigo/issues/1835 | 1,505,891,189 | 1,835 |
CVE-2023-24162 | 2023-01-31T16:15:09.220 | Deserialization vulnerability in Dromara Hutool v5.8.11 allows attacker to execute arbitrary code via the XmlUtil.readObjectFromXml parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gitee.com/dromara/hutool/issues/I6AEX2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A354824B-591F-4F37-8681-734B7CDE00AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"502"
] | 502 | https://github.com/dromara/hutool/issues/2855 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### Desc
Hutool provides XML utility classes that may be vulnerable to remote code execution when using XmlUtil.readObjectFromXml to interpret untrusted XML strings
### Detailed
The program will call XMLDecoder.readObject to parse the XML string, causing a deserialization vulnerability
*cn.hutool.core.util.... | XmlUtil Deserialization vulnerability | https://api.github.com/repos/chinabugotech/hutool/issues/2855/comments | 1 | 2023-01-13T07:01:40Z | 2023-01-15T03:03:37Z | https://github.com/chinabugotech/hutool/issues/2855 | 1,531,809,515 | 2,855 |
CVE-2023-24163 | 2023-01-31T16:15:09.270 | SQL Inection vulnerability in Dromara hutool before 5.8.21 allows attacker to execute arbitrary code via the aviator template engine. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://gitee.com/dromara/hutool/issues/I6AJWJ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*",
"matchCriteriaId": "786FE505-3B01-48DF-8F35-27B22D0E0312",
"versionEndExcluding": "5.8.21",
"versionEndIncluding": null,
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/dromara/hutool/issues/3149 | [
"Issue Tracking"
] | github.com | [
"dromara",
"hutool"
] | 参考 https://github.com/murphysecurity/murphysec-jetbrains-plugin/issues/15 | CVE-2023-24163 不处理下吗? | https://api.github.com/repos/chinabugotech/hutool/issues/3149/comments | 5 | 2023-06-14T02:42:23Z | 2023-08-11T03:39:23Z | https://github.com/chinabugotech/hutool/issues/3149 | 1,755,936,135 | 3,149 |
CVE-2021-36535 | 2023-02-03T18:15:10.653 | Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/175"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/175 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ### Built:
Jun 30 2021
### Details:
heap-based buffer overflow **mjs.c:7617** in **mjs_set_errorf**
### Command:
./mjs -f Heap_Buffer_Overflow.js
### Result:
==2419050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000178 at pc 0x55555557f3ed bp 0x7fffffffcf40 sp 0x7fffffffcf30
READ of ... | Heap-based Buffer Overflow Vulnerability | https://api.github.com/repos/cesanta/mjs/issues/175/comments | 4 | 2021-06-30T07:10:17Z | 2021-07-27T07:17:09Z | https://github.com/cesanta/mjs/issues/175 | 933,378,748 | 175 |
CVE-2021-36569 | 2023-02-03T18:15:11.290 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /users/delete/2. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/578"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tra... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"352"
] | 352 | https://github.com/daylightstudio/FUEL-CMS/issues/578 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | Hi:
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a user account via a post ID to /users/delete/2

POC:
 vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/578/comments | 0 | 2021-07-02T02:26:46Z | 2021-08-10T17:49:19Z | https://github.com/daylightstudio/FUEL-CMS/issues/578 | 935,354,402 | 578 |
CVE-2021-36570 | 2023-02-03T18:15:11.393 | Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /permissions/delete/2---. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/579"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tra... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"352"
] | 352 | https://github.com/daylightstudio/FUEL-CMS/issues/579 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a Permission via a post ID to /permissions/delete/2

POC:
 vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/579/comments | 0 | 2021-07-02T02:35:59Z | 2021-07-03T01:33:05Z | https://github.com/daylightstudio/FUEL-CMS/issues/579 | 935,357,769 | 579 |
CVE-2021-37304 | 2023-02-03T18:15:11.770 | An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding":... | [
"732"
] | 732 | https://github.com/jeecgboot/jeecg-boot/issues/2793 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
2.4.5

##### 问题描述:
Unauthorized access to the httptrace interface reveals sensitive information such as user cookies
##### 截图&代码:
api interface
http://Ip:8080/jeecg-boot/actuator/httptra... | [security issue] The jeecg-boot version is less than or equal to 2.4.5 httptrace interface has unauthorized access and leaks sensitive information such as user cookies | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2793/comments | 1 | 2021-07-15T08:12:15Z | 2021-07-15T10:06:18Z | https://github.com/jeecgboot/JeecgBoot/issues/2793 | 945,118,917 | 2,793 |
CVE-2021-37305 | 2023-02-03T18:15:11.890 | An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/2794"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2",
"versionEndExcluding": null,
"versionEndIncluding": "2.4.5",
"versionStartExcluding":... | [
"732"
] | 732 | https://github.com/jeecgboot/jeecg-boot/issues/2794 | [
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
<=2.4.5
##### 问题描述:
###### 1. leaks sensitive information api uri: /sys/user/querySysUser?username=admin

leaks sensitive information such as phone .etc
###### 2. Enumerate usernames api ur... | [2 secueiry issue]jeecg-boot <= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2794/comments | 1 | 2021-07-15T08:32:21Z | 2021-08-05T07:02:44Z | https://github.com/jeecgboot/JeecgBoot/issues/2794 | 945,135,797 | 2,794 |
CVE-2022-45755 | 2023-02-08T19:15:11.600 | Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Adv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/39 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Version:V1.6.0-UTF8-SP1

1. Go to the background --> basic information--> home page description

... | Vulnerability: EyouCMS v1.6.0 has a vulnerability that stores cross-site scripting (XSS) | https://api.github.com/repos/weng-xianhu/eyoucms/issues/39/comments | 1 | 2022-11-19T06:37:02Z | 2023-02-20T08:21:46Z | https://github.com/weng-xianhu/eyoucms/issues/39 | 1,456,264,360 | 39 |
CVE-2023-0841 | 2023-02-15T14:15:13.283 | A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw"
},
{
"source": "cna@vuldb.com",
"tags": null,
"url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4"
},
{
"source": "cna@vuldb.com",
"tags": nu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8AB1FE-492D-4281-B779-FD501A50998C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/2396 | null | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677 | https://api.github.com/repos/gpac/gpac/issues/2396/comments | 1 | 2023-02-09T14:19:15Z | 2023-02-13T16:32:29Z | https://github.com/gpac/gpac/issues/2396 | 1,577,978,840 | 2,396 |
CVE-2023-24329 | 2023-02-17T15:15:12.243 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/python/cpython/issues/102153"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/pull/99421"
},
{
"source": "cve@mitre.org",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC324629-0240-4DC0-BAFA-D476D5FDDA61",
"versionEndExcluding": "3.7.17",
"versionEndIncluding": null,
"versionStartExcludin... | [
"20"
] | 20 | https://github.com/python/cpython/issues/102153 | [
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | Everyone (including the [submitter](https://pointernull.com/security/python-url-parse-problem.html) of the now public exploit who submitted the issue half a year ago to `security@python.org` and the [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-24329)) seems to think that #99421 "accidently fixed" CVE-2023-24329.
... | urllib.parse space handling CVE-2023-24329 appears unfixed | https://api.github.com/repos/python/cpython/issues/102153/comments | 37 | 2023-02-22T21:17:17Z | 2023-09-15T19:50:54Z | https://github.com/python/cpython/issues/102153 | 1,595,844,394 | 102,153 |
CVE-2023-25222 | 2023-03-01T15:15:11.860 | A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/615"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/Libr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/LibreDWG/libredwg/issues/615 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | # Description
heap-buffer-overflow in function bit_read_RC at bits.c:320
# Version
```
git log
commit 3c90dc6641e11e486666940d7f354d2df54503d6 (HEAD -> master, tag: 0.12.5.5010, origin/master, origin/HEAD)
Author: Michal Josef Špaček <michal.josef.spacek@gmail.com>
Date: Fri Jan 27 18:50:08 2023 +0100
... | heap-buffer-overflow in function bit_read_RC at bits.c:320 | https://api.github.com/repos/LibreDWG/libredwg/issues/615/comments | 1 | 2023-01-30T08:00:12Z | 2023-04-29T20:50:44Z | https://github.com/LibreDWG/libredwg/issues/615 | 1,561,928,009 | 615 |
CVE-2022-3162 | 2023-03-01T19:15:25.457 | Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API gr... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113756"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://groups.go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1780A92B-C6FB-410B-8374-88D1D296816A",
"versionEndExcluding": null,
"versionEndIncluding": "1.22.15",
"versionStar... | [
"22"
] | 22 | https://github.com/kubernetes/kubernetes/issues/113756 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a ... | CVE-2022-3162: Unauthorized read of Custom Resources | https://api.github.com/repos/kubernetes/kubernetes/issues/113756/comments | 17 | 2022-11-08T21:33:07Z | 2022-12-08T03:40:09Z | https://github.com/kubernetes/kubernetes/issues/113756 | 1,440,934,711 | 113,756 |
CVE-2022-3294 | 2023-03-01T19:15:25.570 | Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections ... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"int... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/113757"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E275C4-8711-435F-85D8-073116D467CF",
"versionEndExcluding": "1.22.16",
"versionEndIncluding": null,
"versionStar... | [
"20"
] | 20 | https://github.com/kubernetes/kubernetes/issues/113757 | [
"Patch",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)
A security issue was discovered in Kubernetes where users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an u... | CVE-2022-3294: Node address isn't always verified when proxying | https://api.github.com/repos/kubernetes/kubernetes/issues/113757/comments | 2 | 2022-11-08T21:33:26Z | 2023-04-27T08:27:18Z | https://github.com/kubernetes/kubernetes/issues/113757 | 1,440,935,103 | 113,757 |
CVE-2023-24789 | 2023-03-06T16:15:10.187 | jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/4511"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "83D5D7DD-38EF-48F6-8C18-F75891A91B66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | [
"89"
] | 89 | https://github.com/jeecgboot/jeecg-boot/issues/4511 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | Use the system default account password to log in to the system.
In the visual design menu - report design, see Figure 1 for details.
<img width="1512" alt="截屏2023-01-29 22 01 08" src="https://user-images.githubusercontent.com/32299945/215331278-68f86a40-1199-463a-b0f0-5441746c7eb1.png">
Then click New Report, see F... | There is a sql injection vulnerability in the jeecg 3.4.4 building block report | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4511/comments | 3 | 2023-01-29T14:16:41Z | 2023-11-01T01:16:34Z | https://github.com/jeecgboot/JeecgBoot/issues/4511 | 1,561,308,445 | 4,511 |
CVE-2023-24781 | 2023-03-07T15:15:11.247 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin/funadmin/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/8 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability Product:funadmin
Vulnerability version:.3.2.0
Vulnerability type:sql injection
Vulnerability Details:
Vulnerability location app\backend\controller\member\MemberLevel.php# is called
app\backend\controller\member\Member.php#index method
<img width="1231" alt="image" src="https://user-images.githubuse... | member.memberLevel#selectFields[name] has sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/8/comments | 1 | 2023-01-29T06:47:02Z | 2023-05-05T06:40:41Z | https://github.com/funadmin/funadmin/issues/8 | 1,561,151,226 | 8 |
CVE-2023-24775 | 2023-03-07T18:15:09.117 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\Member.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin/funadmin/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/9 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability Product:funadmin
Vulnerability version:.3.2.0
Vulnerability type:sql injection
Vulnerability Details:
member.memberLevel#selectFields[value] has sql injection vulnerability
Vulnerability location app\backend\controller\member\MemberLevel.php# is called
app\backend\controller\member\Member.php#index ... | member.memberLevel#selectFields[value] has sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/9/comments | 1 | 2023-01-29T06:48:24Z | 2023-05-05T06:40:41Z | https://github.com/funadmin/funadmin/issues/9 | 1,561,151,535 | 9 |
CVE-2023-24780 | 2023-03-08T00:15:08.937 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/columns. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin/funadmin/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/6 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability Product:funadmin
Vulnerability version:.3.2.0
Vulnerability type:sql injection
Vulnerability Details:
Database management plug-in table.php columns-sql injection vulnerability
Vulnerability occurs in plugin - database management plugin
<img width="1225" alt="image" src="https://user-images.githubuse... | Database management plug-in table.php columns-sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/6/comments | 1 | 2023-01-29T06:43:10Z | 2023-05-05T06:40:40Z | https://github.com/funadmin/funadmin/issues/6 | 1,561,150,447 | 6 |
CVE-2023-24773 | 2023-03-08T16:15:09.403 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin/funadmin/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability Product:funadmin
Vulnerability version:.3.2.0
Vulnerability type:sql injection
Vulnerability Details:
Database management plug-in database.php list-sql injection vulnerability
Vulnerability occurs in plugin - database management plugin
<img width="1225" alt="image" src="https://user-images.githubuse... | Database management plug-in database.php list-sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/4/comments | 1 | 2023-01-29T06:38:54Z | 2023-05-05T06:40:39Z | https://github.com/funadmin/funadmin/issues/4 | 1,561,149,560 | 4 |
CVE-2023-24782 | 2023-03-08T21:15:10.943 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin/funadmin/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/3 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability Product:funadmin
Vulnerability version:.3.2.0
Vulnerability type:sql injection
Vulnerability Details:
Vulnerability occurs in plugin - database management plugin
<img width="1231" alt="image" src="https://user-images.githubusercontent.com/122217858/215309458-00d0c9dc-de41-48ab-9ba2-b146bb6877ea.png">... | Database management plug-in database.php edit-sql registration vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/3/comments | 2 | 2023-01-29T06:36:55Z | 2023-05-05T06:40:39Z | https://github.com/funadmin/funadmin/issues/3 | 1,561,149,146 | 3 |
CVE-2023-24777 | 2023-03-08T22:15:09.797 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/list. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin/funadmin/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/funadmin... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability Product:funadmin
Vulnerability version:.3.2.0
Vulnerability type:sql injection
Vulnerability Details:
Database management plug-in table.php list-sql injection vulnerability
Vulnerability occurs in plugin - database management plugin
<img width="1220" alt="image" src="https://user-images.githubuserco... | Database management plug-in table.php list-sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/5/comments | 1 | 2023-01-29T06:40:52Z | 2023-05-05T06:40:40Z | https://github.com/funadmin/funadmin/issues/5 | 1,561,149,983 | 5 |
CVE-2023-27115 | 2023-03-10T02:15:58.457 | WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::cat_compute_size. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/WebAssembly/wabt/issues/1938"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/WebAssembly/wabt/issues/1992"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"665"
] | 665 | https://github.com/WebAssembly/wabt/issues/1938 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"WebAssembly",
"wabt"
] | ### Environment
```
OS : Linux ubuntu 5.13.0-51-generic #58~20.04.1-Ubuntu SMP Tue Jun 14 11:29:12 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : 57e6a58bfdd0babfd6f7fe401c9f2d8238ec3213
Version : 1.0.29
```
### Proof of concept
[poc.wasm.zip](https://github.com/WebAssembly/wabt/files/8973781/poc.wasm.... | Segmentation fault in wabt::cat_compute_size | https://api.github.com/repos/WebAssembly/wabt/issues/1938/comments | 1 | 2022-06-24T06:43:25Z | 2023-03-17T11:32:55Z | https://github.com/WebAssembly/wabt/issues/1938 | 1,283,331,255 | 1,938 |
CVE-2023-27115 | 2023-03-10T02:15:58.457 | WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::cat_compute_size. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/WebAssembly/wabt/issues/1938"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/WebAssembly/wabt/issues/1992"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"665"
] | 665 | https://github.com/WebAssembly/wabt/issues/1992 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"WebAssembly",
"wabt"
] | ### Environment
```
OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : 3054d61f703d609995798f872fc86b462617c294
Version : 1.0.29
Build : make clang-debug-asan
```
### Proof of concept
[poc-5.wasm.zip](https://github.com/WebA... | SEGV in wabt::cat_compute_size | https://api.github.com/repos/WebAssembly/wabt/issues/1992/comments | 1 | 2022-09-05T13:44:45Z | 2022-09-05T13:49:27Z | https://github.com/WebAssembly/wabt/issues/1992 | 1,362,003,678 | 1,992 |
CVE-2023-27117 | 2023-03-10T02:15:58.553 | WebAssembly v1.0.29 was discovered to contain a heap overflow via the component component wabt::Node::operator. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/WebAssembly/wabt/issues/1989"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/WebAss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"787"
] | 787 | https://github.com/WebAssembly/wabt/issues/1989 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"WebAssembly",
"wabt"
] | ### Environment
```
OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : 3054d61f703d609995798f872fc86b462617c294
Version : 1.0.29
Build : make clang-debug-asan
```
### Proof of concept
[poc-2.wasm.zip](https://github.com/We... | heap overflow in wabt::Node::operator=(wabt::Node&&) | https://api.github.com/repos/WebAssembly/wabt/issues/1989/comments | 1 | 2022-09-05T13:30:58Z | 2023-03-17T12:04:27Z | https://github.com/WebAssembly/wabt/issues/1989 | 1,361,978,096 | 1,989 |
CVE-2023-24774 | 2023-03-10T13:15:11.033 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \controller\auth\Auth.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/funadmin/funadmin/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"89"
] | 89 | https://github.com/funadmin/funadmin/issues/12 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"funadmin",
"funadmin"
] | Vulnerability Product:funadmin
Vulnerability version:.3.2.0
Vulnerability type:sql injection
Vulnerability Details:
Vulnerability location app\backend\controller\auth\Auth.php#adjust index method
<img width="1225" alt="image" src="https://user-images.githubusercontent.com/122217858/215310156-128c1eb6-9516-42bf-b35... | auth.Auth#selectFields[name] has sql injection vulnerability | https://api.github.com/repos/funadmin/funadmin/issues/12/comments | 1 | 2023-01-29T06:54:20Z | 2023-05-05T06:40:42Z | https://github.com/funadmin/funadmin/issues/12 | 1,561,152,964 | 12 |
CVE-2023-27059 | 2023-03-16T22:15:11.453 | A cross-site scripting (XSS) vulnerability in the Edit Group function of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Group Name text field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6450"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisor... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/ChurchCRM/CRM/issues/6450 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] | **If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.**
#### On what page in the application did you find this issue?
#### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows?
windows
#### What browser (and version) are... | A cross-site scripting vulnerability (XSS) exists in the edit group function | https://api.github.com/repos/ChurchCRM/CRM/issues/6450/comments | 7 | 2023-02-19T08:13:59Z | 2024-10-08T01:14:38Z | https://github.com/ChurchCRM/CRM/issues/6450 | 1,590,603,154 | 6,450 |
CVE-2023-1448 | 2023-03-17T07:15:12.093 | A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2388"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/blob/main/gpac/3"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"122"
] | 122 | https://github.com/gpac/gpac/issues/2388 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Heap-buffer-overflow in function gf_m2ts_process_sdt of media_tools/mpegts.c:828 | https://api.github.com/repos/gpac/gpac/issues/2388/comments | 2 | 2023-02-02T14:57:17Z | 2023-03-21T04:19:07Z | https://github.com/gpac/gpac/issues/2388 | 1,568,208,539 | 2,388 |
CVE-2023-1449 | 2023-03-17T07:15:12.347 | A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclo... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2387"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/bl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"415"
] | 415 | https://github.com/gpac/gpac/issues/2387 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Double free in gf_av1_reset_state media_tools/av_parsers.c:4024 | https://api.github.com/repos/gpac/gpac/issues/2387/comments | 2 | 2023-02-02T10:24:45Z | 2023-03-21T04:26:10Z | https://github.com/gpac/gpac/issues/2387 | 1,567,763,524 | 2,387 |
CVE-2023-1452 | 2023-03-17T07:15:12.947 | A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2386"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit"
],
"url": "https://github.com/xxy1126/Vuln/blob/main/gpac/1.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"120"
] | 120 | https://github.com/gpac/gpac/issues/2386 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Buffer overflow in filters/load_text.c:353:14 | https://api.github.com/repos/gpac/gpac/issues/2386/comments | 2 | 2023-02-02T09:53:52Z | 2023-03-21T04:44:47Z | https://github.com/gpac/gpac/issues/2386 | 1,567,701,993 | 2,386 |
CVE-2023-27087 | 2023-03-21T19:15:11.607 | Permissions vulnerabiltiy found in Xuxueli xxl-job v2.2.0, v 2.3.0 and v.2.3.1 allows attacker to obtain sensitive information via the pageList parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3096"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third P... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"280"
] | 280 | https://github.com/xuxueli/xxl-job/issues/3096 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xuxueli",
"xxl-job"
] | Vertical overreach vulnerability exists in XXL-JOB
The defect code is as follows
v2.2.0、v2.3.0、v2.3.1

| XXL-JOB Vertical Overreach vulnerability | https://api.github.com/repos/xuxueli/xxl-job/issues/3096/comments | 1 | 2023-02-20T08:05:04Z | 2025-03-07T03:40:29Z | https://github.com/xuxueli/xxl-job/issues/3096 | 1,591,349,265 | 3,096 |
CVE-2023-27249 | 2023-03-23T02:15:12.733 | swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://swfdump.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc"
},
{
"source": "cve@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"787"
] | 787 | https://github.com/matthiaskramm/swftools/issues/197 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # heap-buffer-overflow
## env
ubuntu20.04
gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1)
swfdump - part of swftools 0.9.2
## sample
[poc.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc)
## crash
```
./swfdump -D poc
==2946990==ERROR: AddressSanitizer: heap-buffer-overflow on addres... | heap-buffer-overflow exists in the function swf_GetPlaceObject in swfobject.c | https://api.github.com/repos/swftools/swftools/issues/197/comments | 0 | 2023-02-26T09:28:41Z | 2023-02-26T09:28:41Z | https://github.com/swftools/swftools/issues/197 | 1,599,986,264 | 197 |
CVE-2023-26924 | 2023-03-27T22:15:21.967 | LLVM a0dab4950 has a segmentation fault in mlir::outlineSingleBlockRegion. NOTE: third parties dispute this because the LLVM security policy excludes "Language front-ends ... for which a malicious input file can cause undesirable behavior." | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Colloportus0/fc16d10d74aedf89d5d1d020ebb89c0c"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2023-01-22:*:*:*:*:*:*:*",
"matchCriteriaId": "71350E43-57E7-48F3-AD46-043D4988D2BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"120"
] | 120 | https://github.com/llvm/llvm-project/issues/60216 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"llvm",
"llvm-project"
] | MLIR built at commit https://github.com/llvm/llvm-project/commit/a0dab4950
Reproduced with:
```shell
mlir-opt --test-scf-if-utils temp.mlir
```
`temp.mlir`:
```mlir
func.func @func(
%arg0: index,
%arg1: index,
%arg2: index,
%arg3: memref<2xf32>) -> memref<2xf32> {
%0 = memref.alloc() : memref<2x... | [mlir] `mlir::outlineSingleBlockRegion` crashes with segmentation fault. | https://api.github.com/repos/llvm/llvm-project/issues/60216/comments | 10 | 2023-01-22T17:08:45Z | 2023-08-02T16:45:00Z | https://github.com/llvm/llvm-project/issues/60216 | 1,552,201,934 | 60,216 |
CVE-2023-26855 | 2023-04-04T02:15:07.113 | The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6449"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"330"
] | 330 | https://github.com/ChurchCRM/CRM/issues/6449 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ChurchCRM",
"CRM"
] |
#### On what page in the application did you find this issue?
https://github.com/ChurchCRM/CRM/blob/74042003a7cdad673bf56c7b6b43a0dabb3ac367/src/ChurchCRM/model/ChurchCRM/User.php#L109
#### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows?
Windows/xampp
#### What browser (an... | Weak Salt Implementation | https://api.github.com/repos/ChurchCRM/CRM/issues/6449/comments | 1 | 2023-02-12T14:43:47Z | 2023-02-16T00:25:20Z | https://github.com/ChurchCRM/CRM/issues/6449 | 1,581,285,056 | 6,449 |
CVE-2023-26991 | 2023-04-04T15:15:09.183 | SWFTools v0.9.2 was discovered to contain a stack-use-after-scope in the swf_ReadSWF2 function in lib/rfxswf.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"416"
] | 416 | https://github.com/matthiaskramm/swftools/issues/196 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | ### Env
Ubuntu 18.04
clang 11.0
swfdump v0.9.2 a part of Swftools v0.9.2
### Reproduce
POC: [poc](https://github.com/yiliang-neo/POC/raw/main/swfdump/POC-swfdump-use-after-scope.swf)
command line:
```
swfdump -D poc
```
### Debug Info
```
==13979==ERROR: AddressSanitizer: stack-use-after-scope on addre... | stack-use-after-scope exists in function swf_ReadSWF2 in lib/rfxswf.c | https://api.github.com/repos/swftools/swftools/issues/196/comments | 0 | 2023-02-16T07:45:42Z | 2023-03-13T07:41:33Z | https://github.com/swftools/swftools/issues/196 | 1,587,191,755 | 196 |
CVE-2023-29374 | 2023-04-05T02:15:37.340 | In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/hwchase17/langchain/issues/1026"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/hwchase17/langchain/issues/8... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C55CEFC-7C13-4D07-A223-1C5E9F7BBF25",
"versionEndExcluding": null,
"versionEndIncluding": "0.0.131",
"versionStartE... | [
"74"
] | 74 | https://github.com/hwchase17/langchain/issues/1026 | [
"Issue Tracking"
] | github.com | [
"hwchase17",
"langchain"
] | I have some concerns about the way some of this code is implemented.
To name the two I've noticed so far, the llm_math and sql_database chains.
It seems these two will blindly execute any code that is fed to it from the llm
This is a major security risk, since this opens anyone who uses these up for remote cod... | Security concerns | https://api.github.com/repos/langchain-ai/langchain/issues/1026/comments | 31 | 2023-02-13T21:46:22Z | 2023-10-25T16:10:08Z | https://github.com/langchain-ai/langchain/issues/1026 | 1,583,115,861 | 1,026 |
CVE-2023-29374 | 2023-04-05T02:15:37.340 | In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/hwchase17/langchain/issues/1026"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/hwchase17/langchain/issues/8... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C55CEFC-7C13-4D07-A223-1C5E9F7BBF25",
"versionEndExcluding": null,
"versionEndIncluding": "0.0.131",
"versionStartE... | [
"74"
] | 74 | https://github.com/hwchase17/langchain/issues/814 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"hwchase17",
"langchain"
] | #Overview
llm math and PAL both use `exec()` and `eval()` which is dangerous, while PAL is more complex and might have to stay that way, llm-math could be made safer by using numexpr rather than `exec()`
I suggest we use something like so:
```python
@tool
def calculator(expr):
"""This tool allows you t... | Exploiting llm-math (and likely PAL) and suggesting and alternative | https://api.github.com/repos/langchain-ai/langchain/issues/814/comments | 2 | 2023-01-31T02:37:23Z | 2023-05-11T16:06:59Z | https://github.com/langchain-ai/langchain/issues/814 | 1,563,517,965 | 814 |
CVE-2023-29576 | 2023-04-11T21:15:30.510 | Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/844"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"125"
] | 125 | https://github.com/axiomatic-systems/Bento4/issues/844 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found SEGV bug in Ap4TrunAtom.h
# BUG
SEGV /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=a... | SEGV Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int) | https://api.github.com/repos/axiomatic-systems/Bento4/issues/844/comments | 0 | 2023-03-14T12:42:26Z | 2024-02-17T17:48:33Z | https://github.com/axiomatic-systems/Bento4/issues/844 | 1,623,402,397 | 844 |
CVE-2023-29574 | 2023-04-12T13:15:07.637 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/841"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"119"
] | 119 | https://github.com/axiomatic-systems/Bento4/issues/841 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp42avc
# BUG
out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=... | out-of-memory in mp42avc | https://api.github.com/repos/axiomatic-systems/Bento4/issues/841/comments | 1 | 2023-03-14T02:40:15Z | 2024-02-17T17:49:29Z | https://github.com/axiomatic-systems/Bento4/issues/841 | 1,622,623,759 | 841 |
CVE-2023-29580 | 2023-04-12T13:15:07.727 | yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/215"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/z... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"653"
] | 653 | https://github.com/yasm/yasm/issues/215 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | # SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./config... | SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create | https://api.github.com/repos/yasm/yasm/issues/215/comments | 1 | 2023-03-31T07:56:32Z | 2024-03-21T12:41:09Z | https://github.com/yasm/yasm/issues/215 | 1,648,868,122 | 215 |
CVE-2023-29571 | 2023-04-12T15:15:13.233 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/241"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"119"
] | 119 | https://github.com/cesanta/mjs/issues/241 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_gc.c:190:11 in gc_sweep
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/poc6.zip
... | SEGV src/mjs_gc.c:190:11 in gc_sweep | https://api.github.com/repos/cesanta/mjs/issues/241/comments | 0 | 2023-03-06T01:35:33Z | 2023-03-06T01:35:33Z | https://github.com/cesanta/mjs/issues/241 | 1,610,494,409 | 241 |
CVE-2023-29573 | 2023-04-13T20:15:16.690 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/840"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/axiomatic-systems/Bento4/issues/840 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp4info
# BUG
out-of-memory (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsani... | out-of-memory in mp4info | https://api.github.com/repos/axiomatic-systems/Bento4/issues/840/comments | 0 | 2023-03-14T02:26:20Z | 2024-02-17T17:08:01Z | https://github.com/axiomatic-systems/Bento4/issues/840 | 1,622,614,615 | 840 |
CVE-2023-29569 | 2023-04-14T12:15:07.770 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/239"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/cesanta/mjs/issues/239 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi... | SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww | https://api.github.com/repos/cesanta/mjs/issues/239/comments | 0 | 2023-03-06T01:14:12Z | 2023-03-06T01:14:12Z | https://github.com/cesanta/mjs/issues/239 | 1,610,480,695 | 239 |
CVE-2023-27043 | 2023-04-19T00:15:07.973 | The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verify... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://python.org"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/python/cpython/issues/102988"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45955EC3-D135-4BF2-8396-744307DD4BF2",
"versionEndExcluding": null,
"versionEndIncluding": "2.7.18",
"versionStartExcludin... | [
"20"
] | 20 | https://github.com/python/cpython/issues/102988 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | # Bug report
I have discovered a way to cause `email.utils.parsaddr()` and `email.utils.getaddresses()` to erroneously return the Real Name portion of a RFC 2822 Address Header in the Email Address portion of the returned tuple. This vulnerability enables me to bypass security systems which allow or deny access or a... | [CVE-2023-27043] Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple | https://api.github.com/repos/python/cpython/issues/102988/comments | 31 | 2023-03-24T03:30:35Z | 2024-09-06T12:29:22Z | https://github.com/python/cpython/issues/102988 | 1,638,659,213 | 102,988 |
CVE-2023-29575 | 2023-04-21T14:15:07.373 | Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/842"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"770"
] | 770 | https://github.com/axiomatic-systems/Bento4/issues/842 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory",
"Vendor Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] |
# Summary
Hello, I found out-of-memory bug in mp42aac
# BUG
out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42aac+0x4c44dd) in operator new(unsigned long)
# Build
ubuntu 20.04
```
export CC=clang
export CXX=clang++
export CFLAGS="-fsanitize=address -g"
export CXXFLAGS="-fsanitize=... | out-of-memory in mp42aac | https://api.github.com/repos/axiomatic-systems/Bento4/issues/842/comments | 1 | 2023-03-14T02:50:05Z | 2024-02-17T17:52:59Z | https://github.com/axiomatic-systems/Bento4/issues/842 | 1,622,631,441 | 842 |
CVE-2023-29579 | 2023-04-24T13:15:07.440 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the component yasm/yasm+0x43b466 in vsprintf. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/214"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/rea... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"787"
] | 787 | https://github.com/yasm/yasm/issues/214 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./conf... | stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf | https://api.github.com/repos/yasm/yasm/issues/214/comments | 1 | 2023-03-30T13:06:13Z | 2024-03-21T12:42:39Z | https://github.com/yasm/yasm/issues/214 | 1,647,586,741 | 214 |
CVE-2023-29582 | 2023-04-24T13:15:07.483 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr1 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189601#c3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/217"
},
{
"source": "cve@mitre.org",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"787"
] | 787 | https://github.com/yasm/yasm/issues/217 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fra... | stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1 | https://api.github.com/repos/yasm/yasm/issues/217/comments | 1 | 2023-03-31T08:22:30Z | 2024-03-22T11:56:45Z | https://github.com/yasm/yasm/issues/217 | 1,648,921,272 | 217 |
CVE-2023-29583 | 2023-04-24T13:15:07.523 | yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr5 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/218"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/rea... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*",
"matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"787"
] | 787 | https://github.com/yasm/yasm/issues/218 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | # stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5
## project address
https://github.com/yasm/yasm
## info
OS:Ubuntu20.04 TLS
Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fram... | stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5 | https://api.github.com/repos/yasm/yasm/issues/218/comments | 1 | 2023-03-31T08:27:44Z | 2024-03-22T11:55:05Z | https://github.com/yasm/yasm/issues/218 | 1,648,929,873 | 218 |
CVE-2023-29570 | 2023-04-24T14:15:07.800 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/240"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"770"
] | 770 | https://github.com/cesanta/mjs/issues/240 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free
## project address
https://github.com/cesanta/mjs
## info
OS:Ubuntu20.04 TLS
Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)`
## Poc
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2... | SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free | https://api.github.com/repos/cesanta/mjs/issues/240/comments | 0 | 2023-03-06T01:27:09Z | 2023-03-06T01:27:09Z | https://github.com/cesanta/mjs/issues/240 | 1,610,488,659 | 240 |
CVE-2023-30406 | 2023-04-24T22:15:09.627 | Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component ecma_find_named_property at /base/ecma-helpers.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5058"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"400"
] | 400 | https://github.com/jerryscript-project/jerryscript/issues/5058 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
1a2c04763aba49f52b1537acd3730098c873511c
###### Build platform
Ubuntu 20.04.2 LTS (Linux 5.15.0-67-generic x86_64)
###### Build steps
Describe how to build JerryScript. Give all the necessary details of the build
(e.g., environment variables, command(s), profile, command line optio... | Segmentation fault in jerry | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5058/comments | 6 | 2023-03-28T06:12:27Z | 2025-01-09T06:48:54Z | https://github.com/jerryscript-project/jerryscript/issues/5058 | 1,643,268,712 | 5,058 |
CVE-2023-30408 | 2023-04-24T22:15:09.677 | Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component build/bin/jerry. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5057"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"400"
] | 400 | https://github.com/jerryscript-project/jerryscript/issues/5057 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | First of all, when reporting a bug, give the issue a descriptive title.
In the body of the issue, optionally give a free-form text description of the
bug. Give the context necessary for others to understand the problem.
Then, provide information necessary to reproduce the bug.
Omit sections that are irrelevant ... | Segmentation fault in jerry | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5057/comments | 2 | 2023-03-27T09:25:43Z | 2025-01-09T06:20:29Z | https://github.com/jerryscript-project/jerryscript/issues/5057 | 1,641,737,938 | 5,057 |
CVE-2023-30410 | 2023-04-24T22:15:09.743 | Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5052 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
1a2c04763aba49f52b1537acd3730098c873511c
###### Build platform
Name the build platform. E.g., copy the output of
Ubuntu Lunar Lobster (development branch) (Linux 5.15.0-67-generic x86_64)
###### Build steps
```sh
python3 tools/build.py --builddir=asan --compile-flag=-fno-omit-fram... | jerry crashed while running the following code. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5052/comments | 2 | 2023-03-15T06:57:23Z | 2024-11-21T10:15:30Z | https://github.com/jerryscript-project/jerryscript/issues/5052 | 1,624,874,619 | 5,052 |
CVE-2023-30414 | 2023-04-24T22:15:09.807 | Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5051 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] |
the following js cause a segmentation fault in jerryscript.
```
function test(){
function f(){
var f = test();
h = f();
}
return f;
}
let a = test();
c = a();
``` | segmentation fault in jerryscript | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5051/comments | 3 | 2023-03-14T03:36:48Z | 2024-11-21T10:13:16Z | https://github.com/jerryscript-project/jerryscript/issues/5051 | 1,622,665,090 | 5,051 |
CVE-2023-30402 | 2023-04-25T16:15:09.590 | YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yasm/yasm/issues/206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"787"
] | 787 | https://github.com/yasm/yasm/issues/206 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | yasm heap buffer overflow
I found a heap-buffer-overflow in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -s -o abc --force-strict $PoC
Details
ASAN report
$./yasm -s ... | yasm heap buffer overflow | https://api.github.com/repos/yasm/yasm/issues/206/comments | 1 | 2023-03-01T01:50:12Z | 2024-03-22T11:53:56Z | https://github.com/yasm/yasm/issues/206 | 1,604,082,214 | 206 |
CVE-2023-30338 | 2023-04-27T15:15:13.787 | Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/emlog/emlog/issues/229"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:2.0.3:*:*:*:pro:*:*:*",
"matchCriteriaId": "5B872763-766F-478B-BA9C-97A85DC372F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/emlog/emlog/issues/229 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"emlog",
"emlog"
] | **Version(latest version)**
emlog_pro_2.0.3
**Actual behavior**
XSS vulnerabilities
**Steps to reproduce the behavior**
1.There is a stored xss in the article writing. The article body(文章正文) and article summary(文章摘要) has the vulnerability.
在写文章功能点,文章正文以及文章摘要处存在存储型xss

swfrender - part of swftools 0.9.2
## sample
[id7_heap-buffer-overflow.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfrender/id7_heap-buffer-overflow.zip)
## crash
```
./swfrender id7_heap-buffer-o... | bug report -- swfrender | https://api.github.com/repos/swftools/swftools/issues/198/comments | 0 | 2023-03-23T06:44:18Z | 2023-03-23T06:44:18Z | https://github.com/swftools/swftools/issues/198 | 1,636,946,205 | 198 |
CVE-2023-30125 | 2023-04-28T14:15:11.083 | EyouCms V1.6.1-UTF8-sp1 is vulnerable to Cross Site Scripting (XSS). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.1-utf8-sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "91E07F04-0ABB-44F1-AAA5-E4E8E7B3DE92",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"79"
] | 79 | https://github.com/weng-xianhu/eyoucms/issues/40 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Version: V1.6.1-UTF8-sp1

1. Go to the background --> Advertising management -->Add new ads
2. Then fill in the payload " <style onload=alert(document.cookie) />"in the ad content.

--------------------------
### Content of the file that causes the iss... | wasm2c hangs on certain inputs and cannot finish execution for a while. | https://api.github.com/repos/WebAssembly/wabt/issues/2180/comments | 5 | 2023-03-27T20:41:27Z | 2023-03-31T17:02:49Z | https://github.com/WebAssembly/wabt/issues/2180 | 1,642,781,849 | 2,180 |
CVE-2023-29994 | 2023-05-04T17:15:13.577 | In NanoMQ v0.15.0-0, Heap overflow occurs in read_byte function of mqtt_code.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emqx/nanomq/issues/1042"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emqx/nanomq... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4383F876-3079-4AC1-A4A9-AE5719B1A077",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/emqx/nanomq/issues/1042 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
Heap overflow occurred in read_byte function of mqtt_code.c Confirmed with address sanitizer
**Expected behavior**
**Actual Behavior**
Heap Overflow(CWE-122)
**To Reproduce**

... | [Bug] Heap-based Buffer Overflow in `mqtt_code.c`(`read_byte`) | https://api.github.com/repos/nanomq/nanomq/issues/1042/comments | 2 | 2023-02-08T05:12:05Z | 2023-02-13T08:28:37Z | https://github.com/nanomq/nanomq/issues/1042 | 1,575,489,854 | 1,042 |
CVE-2023-29995 | 2023-05-04T17:15:13.643 | In NanoMQ v0.15.0-0, a Heap overflow occurs in copyn_utf8_str function of mqtt_parser.c | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emqx/nanomq/issues/1043"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/emqx/nanomq... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4383F876-3079-4AC1-A4A9-AE5719B1A077",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/emqx/nanomq/issues/1043 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
Heap overflow occurred in copyn_utf8_str function of mqtt_parser.c Confirmed with address sanitizer
**Expected behavior**
A clear and concise description of what you expected to happen.
**Actual Behavior**
Heap Overflow(CWE-122)
**To Reproduce**
` | https://api.github.com/repos/nanomq/nanomq/issues/1043/comments | 1 | 2023-02-08T05:23:15Z | 2023-02-15T04:31:35Z | https://github.com/nanomq/nanomq/issues/1043 | 1,575,501,548 | 1,043 |
CVE-2023-29996 | 2023-05-04T17:15:13.690 | In NanoMQ v0.15.0-0, segment fault with Null Pointer Dereference occurs in the process of decoding subinfo_decode and unsubinfo_decode. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/emqx/nanomq/issues/1038"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4383F876-3079-4AC1-A4A9-AE5719B1A077",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/emqx/nanomq/issues/1038 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"emqx",
"nanomq"
] | **Describe the bug**
segments fault with CWE-476 (NULL Pointer Dereference) occurred in the process of decoding `subinfo_decode` and `unsubinfo_decode`
**Expected behavior**
Dos
**Actual Behavior**
Describe what occurred.
**To Reproduce**
```python
import subprocess
import time
import socket
def che... | Segment Fault occurs due to NULL Pointer reference in `subinfo_decode` & `unsubinfo_decode` while broker is parsing mqtt | https://api.github.com/repos/nanomq/nanomq/issues/1038/comments | 3 | 2023-02-07T05:57:05Z | 2023-03-17T07:30:21Z | https://github.com/nanomq/nanomq/issues/1038 | 1,573,731,822 | 1,038 |
CVE-2023-29932 | 2023-05-05T15:15:09.633 | llvm-project commit fdbc55a5 was discovered to contain a segmentation fault via the component mlir::IROperand<mlir::OpOperand. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llvm-project/issues/58745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2022-11-01:*:*:*:*:*:*:*",
"matchCriteriaId": "1B7B4679-F150-4937-8E6C-85F26EECA861",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"119"
] | 119 | https://github.com/llvm/llvm-project/issues/58745 | [
"Issue Tracking",
"Patch"
] | github.com | [
"llvm",
"llvm-project"
] | Reproduced at commit [fdbc55a5](https://github.com/llvm/llvm-project/commit/fdbc55a5)
```shell
mlir-opt --canonicalize temp.mlir
```
[temp.mlir.txt](https://github.com/llvm/llvm-project/files/9915414/temp.mlir.txt)
```console
PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and includ... | [mlir] canonicalize pass crashed with segmentation fault | https://api.github.com/repos/llvm/llvm-project/issues/58745/comments | 2 | 2022-11-02T02:36:31Z | 2022-11-08T04:14:43Z | https://github.com/llvm/llvm-project/issues/58745 | 1,432,381,138 | 58,745 |
CVE-2023-29933 | 2023-05-05T15:15:09.683 | llvm-project commit bd456297 was discovered to contain a segmentation fault via the component mlir::Block::getArgument. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llvm-project/issues/59442"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2022-12-11:*:*:*:*:*:*:*",
"matchCriteriaId": "01176116-1DD3-4B35-8387-6303D4AD731B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/llvm/llvm-project/issues/59442 | [
"Issue Tracking",
"Patch"
] | github.com | [
"llvm",
"llvm-project"
] | MLIR built at commit https://github.com/llvm/llvm-project/commit/0ee6bad6a6725c2913116a8fa7769b067c219f0
Reproduced with:
`mlir-opt --one-shot-bufferize temp.mlir`
temp.mlir:
```mlir
module {
func.func @func() {
%false = arith.constant false
%8 = tensor.empty() : tensor<10x10xf32>
scf.whi... | [mlir] One shot bufferize crashed with segmentation fault. | https://api.github.com/repos/llvm/llvm-project/issues/59442/comments | 2 | 2022-12-11T15:48:38Z | 2023-05-15T14:07:52Z | https://github.com/llvm/llvm-project/issues/59442 | 1,490,145,651 | 59,442 |
CVE-2023-29934 | 2023-05-05T15:15:09.733 | llvm-project commit 6c01b5c was discovered to contain a segmentation fault via the component mlir::Type::getDialect(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llvm-project/issues/59136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2022-11-22:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D60ABE-3E22-40CA-800B-77F8BAD4DCD2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/llvm/llvm-project/issues/59136 | [
"Issue Tracking",
"Patch"
] | github.com | [
"llvm",
"llvm-project"
] | MLIR built at commit https://github.com/llvm/llvm-project/commit/6c01b5cdaddce8df325020659d73cd7728778392
Reproduced with:
`mlir-opt --convert-scf-to-spirv temp.mlir`
```mlir
module {
func.func @func1(%arg0: tensor<2x2xi1>, %arg1: f32) -> f32 {
%true = arith.constant true
%c36976552_i32 = arith.... | [mlir] convert-scf-to-spirv Pass crashed with segmentation fault | https://api.github.com/repos/llvm/llvm-project/issues/59136/comments | 5 | 2022-11-22T17:14:33Z | 2023-01-09T16:37:11Z | https://github.com/llvm/llvm-project/issues/59136 | 1,460,261,889 | 59,136 |
CVE-2023-29935 | 2023-05-05T15:15:09.783 | llvm-project commit a0138390 was discovered to contain an assertion failure at !replacements.count(op) && "operation was already replaced. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llvm-project/issues/59182"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2022-11-23:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8D1FE3-4FF5-447A-8B19-FF362CD84298",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"617"
] | 617 | https://github.com/llvm/llvm-project/issues/59182 | [
"Issue Tracking",
"Patch"
] | github.com | [
"llvm",
"llvm-project"
] | MLIR built at commit https://github.com/llvm/llvm-project/commit/12ebfca621059bf6423a8ea0fcf6225dfe8018eb
Reproduced with:
`mlir-opt --gpu-to-llvm temp.mlir`
temp.mlir:
```mlir
module {
func.func @func1(){
%c1 = arith.constant 1 : index
%alloc_6 = memref.alloc() : memref<2x3xf32>
memref.alloc... | [mlir] gpu-to-llvm Pass crashed with error message "Assertion failed: (!replacements.count(op) && "operation was already replaced")" | https://api.github.com/repos/llvm/llvm-project/issues/59182/comments | 10 | 2022-11-24T03:35:59Z | 2023-08-07T13:34:09Z | https://github.com/llvm/llvm-project/issues/59182 | 1,462,704,527 | 59,182 |
CVE-2023-29939 | 2023-05-05T15:15:09.850 | llvm-project commit a0138390 was discovered to contain a segmentation fault via the component mlir::spirv::TargetEnv::TargetEnv(mlir::spirv::TargetEnvAttr). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llvm-project/issues/59983"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2023-01-12:*:*:*:*:*:*:*",
"matchCriteriaId": "3693A1CB-2899-4946-A444-0FB73D378422",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/llvm/llvm-project/issues/59983 | [
"Issue Tracking",
"Patch"
] | github.com | [
"llvm",
"llvm-project"
] | MLIR built at commit https://github.com/llvm/llvm-project/commit/a0138390
Reproduced with:
`mlir-opt --spirv-lower-abi-attrs temp.mlir`
temp.mlir:
```
spirv.module Logical GLSL450 {
spirv.SpecConstant @sc1 = 1.500000e+00 : f32
spirv.SpecConstant @sc2 = 2.500000e+00 : f32
spirv.SpecConstantComposite @... | [mlir] spirv-lower-abi-attrs crashes with segmentation faults | https://api.github.com/repos/llvm/llvm-project/issues/59983/comments | 2 | 2023-01-13T06:04:46Z | 2023-01-13T16:01:04Z | https://github.com/llvm/llvm-project/issues/59983 | 1,531,754,487 | 59,983 |
CVE-2023-29941 | 2023-05-05T15:15:09.917 | llvm-project commit a0138390 was discovered to contain a segmentation fault via the component matchAndRewriteSortOp<mlir::sparse_tensor::SortOp>(mlir::sparse_tensor::SortOp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llvm-project/issues/59988"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/me... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2023-01-12:*:*:*:*:*:*:*",
"matchCriteriaId": "3693A1CB-2899-4946-A444-0FB73D378422",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/llvm/llvm-project/issues/59988 | [
"Issue Tracking",
"Patch"
] | github.com | [
"llvm",
"llvm-project"
] | MLIR built at commit https://github.com/llvm/llvm-project/commit/a0138390
Reproduced with:
`mlir-opt --sparse-buffer-rewrite temp.mlir`
`temp.mlir`:
```mlir
module attributes {llvm.data_layout = ""} {
llvm.func @func(%arg0: i64, %arg1: !llvm.ptr<i8>, %arg2: !llvm.ptr<i8>, %arg3: i64, %arg4: i64, %arg5: i64,... | [mlir] Sparse-buffer-rewrite pass crashes with Segmentation fault | https://api.github.com/repos/llvm/llvm-project/issues/59988/comments | 2 | 2023-01-13T06:25:31Z | 2023-02-27T15:37:24Z | https://github.com/llvm/llvm-project/issues/59988 | 1,531,773,423 | 59,988 |
CVE-2023-29942 | 2023-05-05T15:15:09.970 | llvm-project commit a0138390 was discovered to contain a segmentation fault via the component mlir::Type::isa<mlir::LLVM::LLVMVoidType. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llvm-project/issues/59990"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/llvm/llv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:llvm:llvm:2023-01-12:*:*:*:*:*:*:*",
"matchCriteriaId": "3693A1CB-2899-4946-A444-0FB73D378422",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/llvm/llvm-project/issues/59990 | [
"Issue Tracking",
"Patch"
] | github.com | [
"llvm",
"llvm-project"
] | MLIR built at commit https://github.com/llvm/llvm-project/commit/a0138390
Reproduced with:
`mlir-opt --convert-spirv-to-llvm temp.mlir`
`temp.mlir`:
```mlir
module {
spirv.module Logical GLSL450 {
spirv.GlobalVariable @var01_scalar bind(0, 1) {aliased} : !spirv.ptr<!spirv.struct<(!spirv.rtarray<f32, s... | [mlir] Convert-spirv-to-llvm Pass trigger Segmentation fault in LLVMStructType verifier | https://api.github.com/repos/llvm/llvm-project/issues/59990/comments | 8 | 2023-01-13T06:31:05Z | 2023-10-30T06:40:18Z | https://github.com/llvm/llvm-project/issues/59990 | 1,531,779,880 | 59,990 |
CVE-2023-31972 | 2023-05-09T13:15:18.503 | yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/209 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] |
I found a heap-use-after-free in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -w -W -M $PoC
Details
ASAN report
$./yasm -w -W -M $PoC
```
yasm: warning: unrecogni... | yasm heap use-after-free bug | https://api.github.com/repos/yasm/yasm/issues/209/comments | 1 | 2023-03-01T02:17:35Z | 2023-05-10T05:20:07Z | https://github.com/yasm/yasm/issues/209 | 1,604,108,494 | 209 |
CVE-2023-31974 | 2023-05-09T13:15:18.550 | yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/208"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/208 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] |
I found a heap-use-after-free in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -w -W -M $PoC
Details
ASAN report
$./yasm -w -W -M $PoC
```
yasm: warning: unrecogni... | yasm heap use-after-free bug | https://api.github.com/repos/yasm/yasm/issues/208/comments | 1 | 2023-03-01T02:08:44Z | 2023-05-10T05:20:11Z | https://github.com/yasm/yasm/issues/208 | 1,604,101,306 | 208 |
CVE-2023-31975 | 2023-05-09T13:15:18.590 | yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityI... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/06/20/6"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwal... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"401"
] | 401 | https://github.com/yasm/yasm/issues/210 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] |
I found a memory leak bug in yasm.
Please confirm.
Thanks!
### Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
### How to trigger
Compile the program with AddressSanitizer
Run command
$ touch u
$ ./yasm -ium u
### Details
ASAN report
$./yasm -ium u
```
yasm: file name ... | yasm memory leak | https://api.github.com/repos/yasm/yasm/issues/210/comments | 5 | 2023-03-01T02:27:11Z | 2024-03-22T11:43:38Z | https://github.com/yasm/yasm/issues/210 | 1,604,119,944 | 210 |
CVE-2023-31973 | 2023-05-09T14:15:13.737 | yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issues/207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yasm/yasm/issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"401"
] | 401 | https://github.com/yasm/yasm/issues/207 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yasm",
"yasm"
] | I found a heap-use-after-free in yasm.
Please confirm.
Thanks!
Test Environment
Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master)
How to trigger
Compile the program with AddressSanitizer
Run command $ ./yasm -w -W -M $PoC
Details
ASAN report
$./yasm -w -W -M $PoC
```
yasm: warning: unrecognized ... | yasm heap use-after-free bug | https://api.github.com/repos/yasm/yasm/issues/207/comments | 1 | 2023-03-01T02:03:35Z | 2023-05-10T05:20:08Z | https://github.com/yasm/yasm/issues/207 | 1,604,096,378 | 207 |
CVE-2023-31976 | 2023-05-09T14:15:13.780 | libming v0.4.8 was discovered to contain a stack buffer overflow via the function makeswf_preprocess at /util/makeswf_utils.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/265"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"787"
] | 787 | https://github.com/libming/libming/issues/265 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] |
When the program input contains the option of "-D" or "-o" , the program will cause stack buffer overflow error.
Test Environment
Ubuntu 20.04, 64 bit libming (master ; commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473))
How to trigger
Compile the progra... | makeswf stack buffer overflow | https://api.github.com/repos/libming/libming/issues/265/comments | 0 | 2023-02-28T06:17:08Z | 2023-02-28T06:17:08Z | https://github.com/libming/libming/issues/265 | 1,602,439,311 | 265 |
CVE-2021-31240 | 2023-05-09T16:15:14.147 | An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/218"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"401"
] | 401 | https://github.com/libming/libming/issues/218 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Hi, I found a memory leak problem.
version: 0.4.8
command: swftophp poc
poc:
[parser.c_2556.zip](https://github.com/libming/libming/files/6276040/parser.c_2556.zip)
Here is the report from ASAN:
```
`header indicates a filesize of 761 but filesize is 550
<?php
$m = new SWFMovie(8);
ming_setscale(1.0);
$m... | Memory leaks in parseSWF_IMPORTASSETS | https://api.github.com/repos/libming/libming/issues/218/comments | 0 | 2021-04-08T04:46:50Z | 2021-04-08T04:46:50Z | https://github.com/libming/libming/issues/218 | 853,054,686 | 218 |
CVE-2023-30083 | 2023-05-09T16:15:14.373 | Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the newVar_N in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/266"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/libming/libming/issues/266 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Heap buffer overflow in the latest version of libming at function newVar_N in util/decompile.c:654.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. co... | Heap buffer overflow in newVar_N() at decompile.c:654 | https://api.github.com/repos/libming/libming/issues/266/comments | 0 | 2023-03-21T06:45:54Z | 2023-03-21T06:45:54Z | https://github.com/libming/libming/issues/266 | 1,633,318,454 | 266 |
CVE-2023-30084 | 2023-05-09T16:15:14.423 | An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/268"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"125"
] | 125 | https://github.com/libming/libming/issues/268 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Invalid memory read in the latest version of libming at function stackVal in util/decompile.c:1238.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. co... | Invalid memory read in stackVal() at decompile.c:1238 | https://api.github.com/repos/libming/libming/issues/268/comments | 0 | 2023-03-21T06:53:51Z | 2023-03-21T06:53:51Z | https://github.com/libming/libming/issues/268 | 1,633,325,057 | 268 |
CVE-2023-30085 | 2023-05-09T16:15:14.470 | Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the cws2fws function in util/decompile.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/267"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"120"
] | 120 | https://github.com/libming/libming/issues/267 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | Allocation size overflow in the latest version of libming at function cws2fws in util/main.c:111.
## Environment
Ubuntu 18.04, 64 bit
libming 0.4.8
## Steps to reproduce
1. download file
```
wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz
tar -zxvf ming-0_4_8.tar.gz
```
2. comp... | Allocation size overflow in cws2fws() at main.c:111 | https://api.github.com/repos/libming/libming/issues/267/comments | 0 | 2023-03-21T06:50:17Z | 2023-03-21T06:50:17Z | https://github.com/libming/libming/issues/267 | 1,633,322,109 | 267 |
CVE-2023-30087 | 2023-05-09T16:15:14.547 | Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/244"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/244 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | Heap buffer overflow in mjs at function mjs_mk_string in mjs.c:13671.
## Environment
Ubuntu 18.04, 64 bit
## Steps to reproduce
1. download file
```
git clone https://github.com/cesanta/mjs.git mjs
cd mjs
git checkout 9eae0e6
```
2. compile libming with ASAN
```
clang -fsanitize=address mjs.c -o mjs_asa... | Heap buffer overflow in mjs_mk_string() at mjs.c:13671 | https://api.github.com/repos/cesanta/mjs/issues/244/comments | 0 | 2023-03-22T09:15:39Z | 2023-03-22T09:15:39Z | https://github.com/cesanta/mjs/issues/244 | 1,635,358,781 | 244 |
CVE-2023-30088 | 2023-05-09T16:15:14.583 | An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/243"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
"119"
] | 119 | https://github.com/cesanta/mjs/issues/243 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | Invalid memory read in mjs at function mjs_execute in mjs.c:9320.
## Environment
Ubuntu 18.04, 64 bit
## Steps to reproduce
1. download file
```
git clone https://github.com/cesanta/mjs.git mjs
cd mjs
git checkout d6c06a6
```
2. compile libming with ASAN
```
clang -fsanitize=address mjs.c -o mjs_asan
`... | Invalid memory read in mjs_execute() at mjs.c:9320 | https://api.github.com/repos/cesanta/mjs/issues/243/comments | 1 | 2023-03-22T09:15:01Z | 2023-05-15T14:19:13Z | https://github.com/cesanta/mjs/issues/243 | 1,635,357,898 | 243 |
CVE-2023-31906 | 2023-05-10T15:15:10.187 | Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5066"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5066 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | heap-buffer-overflow in lexer_compare_identifier_to_chars | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5066/comments | 0 | 2023-04-08T12:50:49Z | 2024-11-22T09:18:15Z | https://github.com/jerryscript-project/jerryscript/issues/5066 | 1,659,514,220 | 5,066 |
CVE-2023-31907 | 2023-05-10T15:15:10.353 | Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5073"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5073 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compi... | heap-buffer-overflow in scanner_literal_is_created | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5073/comments | 0 | 2023-04-19T12:27:29Z | 2023-04-19T12:27:29Z | https://github.com/jerryscript-project/jerryscript/issues/5073 | 1,674,802,543 | 5,073 |
CVE-2023-31908 | 2023-05-10T15:15:10.533 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component ecma_builtin_typedarray_prototype_sort. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5067 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c... | heap-buffer-overflow in ecma_builtin_typedarray_prototype_sort | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5067/comments | 0 | 2023-04-08T13:31:08Z | 2023-04-08T13:39:28Z | https://github.com/jerryscript-project/jerryscript/issues/5067 | 1,659,524,592 | 5,067 |
CVE-2023-31910 | 2023-05-10T15:15:10.697 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component parser_parse_function_statement at /jerry-core/parser/js/js-parser-statm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5076"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"787"
] | 787 | https://github.com/jerryscript-project/jerryscript/issues/5076 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c... | heap-buffer-overflow in parser_parse_function_statement | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5076/comments | 0 | 2023-04-23T16:01:47Z | 2023-04-23T16:01:47Z | https://github.com/jerryscript-project/jerryscript/issues/5076 | 1,680,076,342 | 5,076 |
CVE-2023-31913 | 2023-05-12T14:15:09.773 | Jerryscript 3.0 *commit 1a2c047) was discovered to contain an Assertion Failure via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5061"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5061 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'context_p->scope_stack_size == PARSER_MAXIMUM_DEPTH_OF_SCOPE_STACK' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class):1068. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5061/comments | 0 | 2023-04-06T10:46:13Z | 2024-11-22T09:11:34Z | https://github.com/jerryscript-project/jerryscript/issues/5061 | 1,657,176,424 | 5,061 |
CVE-2023-31914 | 2023-05-12T14:15:09.807 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5071"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"770"
] | 770 | https://github.com/jerryscript-project/jerryscript/issues/5071 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | AddressSanitizer: allocator is out of memory trying to allocate | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5071/comments | 0 | 2023-04-19T11:36:46Z | 2023-04-19T11:36:46Z | https://github.com/jerryscript-project/jerryscript/issues/5071 | 1,674,723,917 | 5,071 |
CVE-2023-31916 | 2023-05-12T14:15:09.847 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5062 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5062/comments | 0 | 2023-04-06T13:12:15Z | 2024-11-22T09:13:35Z | https://github.com/jerryscript-project/jerryscript/issues/5062 | 1,657,404,755 | 5,062 |
CVE-2023-31918 | 2023-05-12T14:15:09.890 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5064"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5064 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32... | Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5064/comments | 0 | 2023-04-06T14:02:51Z | 2023-04-06T14:02:51Z | https://github.com/jerryscript-project/jerryscript/issues/5064 | 1,657,488,796 | 5,064 |
CVE-2023-31919 | 2023-05-12T14:15:09.927 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5069"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5069 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi... | Assertion '!jcontext_has_pending_exception ()' failed at /jerryscript/jerry-core/jcontext/jcontext.c(jcontext_raise_exception):88. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5069/comments | 0 | 2023-04-16T13:13:26Z | 2024-11-22T09:21:07Z | https://github.com/jerryscript-project/jerryscript/issues/5069 | 1,669,965,859 | 5,069 |
CVE-2023-31920 | 2023-05-12T14:15:09.963 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5070"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/5070 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7)
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi... | Assertion 'ecma_find_named_property (func_obj_p, ecma_get_magic_string (LIT_MAGIC_STRING_NAME)) == NULL' failed at /jerryscript/jerry-core/vm/vm.c(vm_loop):2173. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5070/comments | 0 | 2023-04-19T03:29:02Z | 2024-11-22T09:26:01Z | https://github.com/jerryscript-project/jerryscript/issues/5070 | 1,674,113,082 | 5,070 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.