cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
997
cve_metrics
dict
cve_references
listlengths
1
68
cve_configurations
listlengths
1
5
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
76 values
url
stringlengths
37
79
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
128M
2.84B
issue_number
int64
1
128k
CVE-2022-47659
2023-01-05T16:15:10.670
GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2354" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2354
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
stack-buffer-overflow utils/bitstream.c:732 in gf_bs_read_data
https://api.github.com/repos/gpac/gpac/issues/2354/comments
0
2022-12-17T10:31:30Z
2022-12-17T11:29:28Z
https://github.com/gpac/gpac/issues/2354
1,501,315,203
2,354
CVE-2022-47660
2023-01-05T16:15:10.890
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in isomedia/isom_write.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2357" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "190" ]
190
https://github.com/gpac/gpac/issues/2357
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough info...
integer overflow in isomedia/isom_write.c:4931
https://api.github.com/repos/gpac/gpac/issues/2357/comments
0
2022-12-17T10:31:40Z
2022-12-17T11:29:29Z
https://github.com/gpac/gpac/issues/2357
1,501,315,390
2,357
CVE-2022-47661
2023-01-05T16:15:11.103
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow via media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2358" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2358
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description heap-buffer-overf...
heap-buffer-overflow media_tools/av_parsers.c:4988 in gf_media_nalu_add_emulation_bytes
https://api.github.com/repos/gpac/gpac/issues/2358/comments
0
2022-12-18T10:23:38Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2358
1,501,850,698
2,358
CVE-2022-47662
2023-01-05T16:15:11.400
GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2359" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "674" ]
674
https://github.com/gpac/gpac/issues/2359
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description segment fault (/s...
Infinite recursion in Media_GetSample isomedia/media.c:662
https://api.github.com/repos/gpac/gpac/issues/2359/comments
0
2022-12-18T10:23:42Z
2022-12-19T11:26:12Z
https://github.com/gpac/gpac/issues/2359
1,501,850,761
2,359
CVE-2022-47663
2023-01-05T16:15:11.623
GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow in h263dmx_process filters/reframe_h263.c:609
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2360" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "120" ]
120
https://github.com/gpac/gpac/issues/2360
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [X] I looked for a similar issue and couldn't find any. - [X] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [X] I give enough information for contributors to reproduce my issue (meaningful title, github labels, # Description buffer overflow i...
buffer overflow in h263dmx_process filters/reframe_h263.c:609
https://api.github.com/repos/gpac/gpac/issues/2360/comments
0
2022-12-18T10:23:45Z
2022-12-19T11:26:13Z
https://github.com/gpac/gpac/issues/2360
1,501,850,806
2,360
CVE-2022-47105
2023-01-19T16:15:11.277
Jeecg-boot v3.4.4 was discovered to contain a SQL injection vulnerability via the component /sys/dict/queryTableData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "7BB811AB-8B4F-4A5A-8851-B617184A298A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4393
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号:3.4.4 ##### 前端版本:vue2版 ##### 问题描述:sql注入检测代码存在绕过. ##### 截图&代码: SqlInjectionUtil类中sql的注释正则为 ```java private final static Pattern SQL_ANNOTATION = Pattern.compile("/\\*.*\\*/"); ``` .无法匹配到%0A, 导致可以利用/\*%0A\*/绕过 关键字检测后存在空格,导致绕过 ```java private final static String XSS_STR = "and |extractvalue|u...
jeecg-boot3.4.4 存在sql注入漏洞
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4393/comments
2
2022-12-10T09:17:39Z
2022-12-23T06:03:37Z
https://github.com/jeecgboot/JeecgBoot/issues/4393
1,488,266,227
4,393
CVE-2022-45537
2023-01-20T19:15:16.093
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_LIST_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/34/comments
1
2022-11-14T08:44:20Z
2023-02-20T10:13:49Z
https://github.com/weng-xianhu/eyoucms/issues/34
1,447,630,496
34
CVE-2022-45538
2023-01-20T19:15:16.160
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article publish component in cookie "ENV_GOBACK_URL".
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article publish with reflected-XSS in the ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/35/comments
1
2022-11-14T08:49:28Z
2023-02-20T10:13:18Z
https://github.com/weng-xianhu/eyoucms/issues/35
1,447,638,304
35
CVE-2022-45539
2023-01-20T19:15:16.223
EyouCMS <= 1.6.0 was discovered a reflected-XSS in FileManager component in GET value "activepath" when creating a new file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/38
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file adding with reflected-XSS in the get ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/38/comments
1
2022-11-14T09:06:48Z
2023-02-20T08:22:13Z
https://github.com/weng-xianhu/eyoucms/issues/38
1,447,664,065
38
CVE-2022-45540
2023-01-20T19:15:16.287
EyouCMS <= 1.6.0 was discovered a reflected-XSS in article type editor component in POST value "name" if the value contains a malformed UTF-8 char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article type adding with reflected-XSS in ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/37/comments
1
2022-11-14T09:00:48Z
2023-02-20T08:36:11Z
https://github.com/weng-xianhu/eyoucms/issues/37
1,447,653,340
37
CVE-2022-45541
2023-01-20T19:15:16.347
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the article attribute editor component in POST value "value" if the value contains a non-integer char.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background article attribute type changing with refle...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/36/comments
1
2022-11-14T08:56:29Z
2023-02-20T10:01:25Z
https://github.com/weng-xianhu/eyoucms/issues/36
1,447,647,465
36
CVE-2022-45542
2023-01-20T19:15:16.400
EyouCMS <= 1.6.0 was discovered a reflected-XSS in the FileManager component in GET parameter "filename" when editing any file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EC81B77-6034-40EF-93BE-42D2F85B3974", "versionEndExcluding": null, "versionEndIncluding": "1.6.0", "versionStartExcludi...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
## Background of Website Reflected Cross-Site Scripting ### Influenced Version <= 1.6.0-UTF8-SP1 <img width="2048" alt="image" src="https://user-images.githubusercontent.com/22876693/201610031-73f82844-05e0-4182-a275-028613c349bd.png"> ### Description Background file management editor with reflected-XSS ...
Vulnerability: EyouCMS-V1.6.0-UTF8-SP1 with Reflected Cross-Site Scripting
https://api.github.com/repos/weng-xianhu/eyoucms/issues/33/comments
1
2022-11-14T08:34:33Z
2023-02-20T10:49:48Z
https://github.com/weng-xianhu/eyoucms/issues/33
1,447,617,306
33
CVE-2022-48007
2023-01-27T18:15:14.947
A stored cross-site scripting (XSS) vulnerability in identification.php of Piwigo v13.4.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the User-Agent.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:13.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4CE9B7C-3D2B-4876-B8E3-5EE46628EA5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1835
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Hello, I found Stored XSS in Piwigo version 13.4.0. **Impact:** In this way, ordinary users can be promoted to administrator users. **Here are the complete attack steps:** 1. Register an ordinary user. ![image](https://user-images.githubusercontent.com/71068573/208852813-4ff58926-0e8b-4940-bb4d-dcba99b4aeae.png)...
Piwigo-13.4.0-Stored XSS Vulnerability in User-Agent
https://api.github.com/repos/Piwigo/Piwigo/issues/1835/comments
0
2022-12-21T08:21:08Z
2022-12-25T10:25:36Z
https://github.com/Piwigo/Piwigo/issues/1835
1,505,891,189
1,835
CVE-2023-24162
2023-01-31T16:15:09.220
Deserialization vulnerability in Dromara Hutool v5.8.11 allows attacker to execute arbitrary code via the XmlUtil.readObjectFromXml parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AEX2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dromara/hutool/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "A354824B-591F-4F37-8681-734B7CDE00AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "502" ]
502
https://github.com/dromara/hutool/issues/2855
[ "Exploit", "Third Party Advisory" ]
github.com
[ "dromara", "hutool" ]
### Desc Hutool provides XML utility classes that may be vulnerable to remote code execution when using XmlUtil.readObjectFromXml to interpret untrusted XML strings ### Detailed The program will call XMLDecoder.readObject to parse the XML string, causing a deserialization vulnerability *cn.hutool.core.util....
XmlUtil Deserialization vulnerability
https://api.github.com/repos/chinabugotech/hutool/issues/2855/comments
1
2023-01-13T07:01:40Z
2023-01-15T03:03:37Z
https://github.com/chinabugotech/hutool/issues/2855
1,531,809,515
2,855
CVE-2023-24163
2023-01-31T16:15:09.270
SQL Inection vulnerability in Dromara hutool before 5.8.21 allows attacker to execute arbitrary code via the aviator template engine.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://gitee.com/dromara/hutool/issues/I6AJWJ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:*:*:*:*:*:*:*:*", "matchCriteriaId": "786FE505-3B01-48DF-8F35-27B22D0E0312", "versionEndExcluding": "5.8.21", "versionEndIncluding": null, "versionStartExcludin...
[ "89" ]
89
https://github.com/dromara/hutool/issues/3149
[ "Issue Tracking" ]
github.com
[ "dromara", "hutool" ]
参考 https://github.com/murphysecurity/murphysec-jetbrains-plugin/issues/15
CVE-2023-24163 不处理下吗?
https://api.github.com/repos/chinabugotech/hutool/issues/3149/comments
5
2023-06-14T02:42:23Z
2023-08-11T03:39:23Z
https://github.com/chinabugotech/hutool/issues/3149
1,755,936,135
3,149
CVE-2021-36535
2023-02-03T18:15:10.653
Buffer Overflow vulnerability in Cesanta mJS 1.26 allows remote attackers to cause a denial of service via crafted .js file to mjs_set_errorf.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/175
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
### Built: Jun 30 2021 ### Details: heap-based buffer overflow **mjs.c:7617** in **mjs_set_errorf** ### Command: ./mjs -f Heap_Buffer_Overflow.js ### Result: ==2419050==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000178 at pc 0x55555557f3ed bp 0x7fffffffcf40 sp 0x7fffffffcf30 READ of ...
Heap-based Buffer Overflow Vulnerability
https://api.github.com/repos/cesanta/mjs/issues/175/comments
4
2021-06-30T07:10:17Z
2021-07-27T07:17:09Z
https://github.com/cesanta/mjs/issues/175
933,378,748
175
CVE-2021-36569
2023-02-03T18:15:11.290
Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /users/delete/2.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "352" ]
352
https://github.com/daylightstudio/FUEL-CMS/issues/578
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
Hi: FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a user account via a post ID to /users/delete/2 ![image](https://user-images.githubusercontent.com/12816285/124211514-caee0e00-db1f-11eb-8d92-cfe57274f4b4.png) POC: ![image](https://user-images.githubusercontent.com/128...
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/578/comments
0
2021-07-02T02:26:46Z
2021-08-10T17:49:19Z
https://github.com/daylightstudio/FUEL-CMS/issues/578
935,354,402
578
CVE-2021-36570
2023-02-03T18:15:11.393
Cross Site Request Forgery vulnerability in FUEL-CMS 1.4.13 allows remote attackers to run arbitrary code via post ID to /permissions/delete/2---.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tra...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "352" ]
352
https://github.com/daylightstudio/FUEL-CMS/issues/579
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a Permission via a post ID to /permissions/delete/2 ![image](https://user-images.githubusercontent.com/12816285/124212110-f45b6980-db20-11eb-8087-154ca9d707ab.png) POC: ![image](https://user-images.githubusercontent.com/128162...
FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/579/comments
0
2021-07-02T02:35:59Z
2021-07-03T01:33:05Z
https://github.com/daylightstudio/FUEL-CMS/issues/579
935,357,769
579
CVE-2021-37304
2023-02-03T18:15:11.770
An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/2793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2", "versionEndExcluding": null, "versionEndIncluding": "2.4.5", "versionStartExcluding":...
[ "732" ]
732
https://github.com/jeecgboot/jeecg-boot/issues/2793
[ "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 2.4.5 ![image](https://user-images.githubusercontent.com/15991940/125751270-42b4ea1e-4ae3-4b8c-a669-b03eca42ac19.png) ##### 问题描述: Unauthorized access to the httptrace interface reveals sensitive information such as user cookies ##### 截图&代码: api interface http://Ip:8080/jeecg-boot/actuator/httptra...
[security issue] The jeecg-boot version is less than or equal to 2.4.5 httptrace interface has unauthorized access and leaks sensitive information such as user cookies
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2793/comments
1
2021-07-15T08:12:15Z
2021-07-15T10:06:18Z
https://github.com/jeecgboot/JeecgBoot/issues/2793
945,118,917
2,793
CVE-2021-37305
2023-02-03T18:15:11.890
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/2794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1F1CC-39F3-4B9F-A810-FE74D5E636F2", "versionEndExcluding": null, "versionEndIncluding": "2.4.5", "versionStartExcluding":...
[ "732" ]
732
https://github.com/jeecgboot/jeecg-boot/issues/2794
[ "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: <=2.4.5 ##### 问题描述: ###### 1. leaks sensitive information api uri: /sys/user/querySysUser?username=admin ![image](https://user-images.githubusercontent.com/15991940/125753825-06d1da62-e1d7-4270-9076-c3802880c76d.png) leaks sensitive information such as phone .etc ###### 2. Enumerate usernames api ur...
[2 secueiry issue]jeecg-boot <= 2.4.5 API interface has unauthorized access and leaks sensitive information such as email,phone and Enumerate usernames that exist in the system
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/2794/comments
1
2021-07-15T08:32:21Z
2021-08-05T07:02:44Z
https://github.com/jeecgboot/JeecgBoot/issues/2794
945,135,797
2,794
CVE-2022-45755
2023-02-08T19:15:11.600
Cross-site scripting (XSS) vulnerability in EyouCMS v1.6.0 allows attackers to execute arbitrary code via the home page description on the basic information page.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Adv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EB987CAE-6D4D-417A-8E0D-9DCC47F986EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/39
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version:V1.6.0-UTF8-SP1 ![屏幕截图1](https://user-images.githubusercontent.com/83074322/202837935-26b30126-1f5f-4047-82f2-f92859b1b81e.jpg) 1. Go to the background --> basic information--> home page description ![图片2](https://user-images.githubusercontent.com/83074322/202837990-8acd9355-f6bd-4392-80ca-377a52eab003.png) ...
Vulnerability: EyouCMS v1.6.0 has a vulnerability that stores cross-site scripting (XSS)
https://api.github.com/repos/weng-xianhu/eyoucms/issues/39/comments
1
2022-11-19T06:37:02Z
2023-02-20T08:21:46Z
https://github.com/weng-xianhu/eyoucms/issues/39
1,456,264,360
39
CVE-2023-0841
2023-02-15T14:15:13.283
A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cna@vuldb.com", "tags": null, "url": "https://github.com/advisories/GHSA-w52x-cp47-xhhw" }, { "source": "cna@vuldb.com", "tags": null, "url": "https://github.com/gpac/gpac/commit/851560e3dc8155d45ace4b0d77421f241ed71dc4" }, { "source": "cna@vuldb.com", "tags": nu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev40-g3602a5ded:*:*:*:*:*:*:*", "matchCriteriaId": "BF8AB1FE-492D-4281-B779-FD501A50998C", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "787" ]
787
https://github.com/gpac/gpac/issues/2396
null
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677
https://api.github.com/repos/gpac/gpac/issues/2396/comments
1
2023-02-09T14:19:15Z
2023-02-13T16:32:29Z
https://github.com/gpac/gpac/issues/2396
1,577,978,840
2,396
CVE-2023-24329
2023-02-17T15:15:12.243
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/python/cpython/issues/102153" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/pull/99421" }, { "source": "cve@mitre.org", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC324629-0240-4DC0-BAFA-D476D5FDDA61", "versionEndExcluding": "3.7.17", "versionEndIncluding": null, "versionStartExcludin...
[ "20" ]
20
https://github.com/python/cpython/issues/102153
[ "Issue Tracking" ]
github.com
[ "python", "cpython" ]
Everyone (including the [submitter](https://pointernull.com/security/python-url-parse-problem.html) of the now public exploit who submitted the issue half a year ago to `security@python.org` and the [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-24329)) seems to think that #99421 "accidently fixed" CVE-2023-24329. ...
urllib.parse space handling CVE-2023-24329 appears unfixed
https://api.github.com/repos/python/cpython/issues/102153/comments
37
2023-02-22T21:17:17Z
2023-09-15T19:50:54Z
https://github.com/python/cpython/issues/102153
1,595,844,394
102,153
CVE-2023-25222
2023-03-01T15:15:11.860
A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/Libr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/615
[ "Exploit", "Vendor Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
# Description heap-buffer-overflow in function bit_read_RC at bits.c:320 # Version ``` git log commit 3c90dc6641e11e486666940d7f354d2df54503d6 (HEAD -> master, tag: 0.12.5.5010, origin/master, origin/HEAD) Author: Michal Josef Špaček <michal.josef.spacek@gmail.com> Date: Fri Jan 27 18:50:08 2023 +0100 ...
heap-buffer-overflow in function bit_read_RC at bits.c:320
https://api.github.com/repos/LibreDWG/libredwg/issues/615/comments
1
2023-01-30T08:00:12Z
2023-04-29T20:50:44Z
https://github.com/LibreDWG/libredwg/issues/615
1,561,928,009
615
CVE-2022-3162
2023-03-01T19:15:25.457
Users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a different type in the same API group without authorization. Clusters are impacted by this vulnerability if all of the following are true: 1. There are 2+ CustomResourceDefinitions sharing the same API gr...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/113756" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1780A92B-C6FB-410B-8374-88D1D296816A", "versionEndExcluding": null, "versionEndIncluding": "1.22.15", "versionStar...
[ "22" ]
22
https://github.com/kubernetes/kubernetes/issues/113756
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) A security issue was discovered in Kubernetes where users authorized to list or watch one type of namespaced custom resource cluster-wide can read custom resources of a ...
CVE-2022-3162: Unauthorized read of Custom Resources
https://api.github.com/repos/kubernetes/kubernetes/issues/113756/comments
17
2022-11-08T21:33:07Z
2022-12-08T03:40:09Z
https://github.com/kubernetes/kubernetes/issues/113756
1,440,934,711
113,756
CVE-2022-3294
2023-03-01T19:15:25.570
Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections ...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "int...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/113757" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "38E275C4-8711-435F-85D8-073116D467CF", "versionEndExcluding": "1.22.16", "versionEndIncluding": null, "versionStar...
[ "20" ]
20
https://github.com/kubernetes/kubernetes/issues/113757
[ "Patch", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) A security issue was discovered in Kubernetes where users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an u...
CVE-2022-3294: Node address isn't always verified when proxying
https://api.github.com/repos/kubernetes/kubernetes/issues/113757/comments
2
2022-11-08T21:33:26Z
2023-04-27T08:27:18Z
https://github.com/kubernetes/kubernetes/issues/113757
1,440,935,103
113,757
CVE-2023-24789
2023-03-06T16:15:10.187
jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/4511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "83D5D7DD-38EF-48F6-8C18-F75891A91B66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/4511
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
Use the system default account password to log in to the system. In the visual design menu - report design, see Figure 1 for details. <img width="1512" alt="截屏2023-01-29 22 01 08" src="https://user-images.githubusercontent.com/32299945/215331278-68f86a40-1199-463a-b0f0-5441746c7eb1.png"> Then click New Report, see F...
There is a sql injection vulnerability in the jeecg 3.4.4 building block report
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4511/comments
3
2023-01-29T14:16:41Z
2023-11-01T01:16:34Z
https://github.com/jeecgboot/JeecgBoot/issues/4511
1,561,308,445
4,511
CVE-2023-24781
2023-03-07T15:15:11.247
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/8
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details: Vulnerability location app\backend\controller\member\MemberLevel.php# is called app\backend\controller\member\Member.php#index method <img width="1231" alt="image" src="https://user-images.githubuse...
member.memberLevel#selectFields[name] has sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/8/comments
1
2023-01-29T06:47:02Z
2023-05-05T06:40:41Z
https://github.com/funadmin/funadmin/issues/8
1,561,151,226
8
CVE-2023-24775
2023-03-07T18:15:09.117
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\Member.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/9
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details: member.memberLevel#selectFields[value] has sql injection vulnerability Vulnerability location app\backend\controller\member\MemberLevel.php# is called app\backend\controller\member\Member.php#index ...
member.memberLevel#selectFields[value] has sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/9/comments
1
2023-01-29T06:48:24Z
2023-05-05T06:40:41Z
https://github.com/funadmin/funadmin/issues/9
1,561,151,535
9
CVE-2023-24780
2023-03-08T00:15:08.937
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/columns.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/6
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details: Database management plug-in table.php columns-sql injection vulnerability Vulnerability occurs in plugin - database management plugin <img width="1225" alt="image" src="https://user-images.githubuse...
Database management plug-in table.php columns-sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/6/comments
1
2023-01-29T06:43:10Z
2023-05-05T06:40:40Z
https://github.com/funadmin/funadmin/issues/6
1,561,150,447
6
CVE-2023-24773
2023-03-08T16:15:09.403
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/4
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details: Database management plug-in database.php list-sql injection vulnerability Vulnerability occurs in plugin - database management plugin <img width="1225" alt="image" src="https://user-images.githubuse...
Database management plug-in database.php list-sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/4/comments
1
2023-01-29T06:38:54Z
2023-05-05T06:40:39Z
https://github.com/funadmin/funadmin/issues/4
1,561,149,560
4
CVE-2023-24782
2023-03-08T21:15:10.943
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/3
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details: Vulnerability occurs in plugin - database management plugin <img width="1231" alt="image" src="https://user-images.githubusercontent.com/122217858/215309458-00d0c9dc-de41-48ab-9ba2-b146bb6877ea.png">...
Database management plug-in database.php edit-sql registration vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/3/comments
2
2023-01-29T06:36:55Z
2023-05-05T06:40:39Z
https://github.com/funadmin/funadmin/issues/3
1,561,149,146
3
CVE-2023-24777
2023-03-08T22:15:09.797
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/list.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin/funadmin/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/funadmin...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details: Database management plug-in table.php list-sql injection vulnerability Vulnerability occurs in plugin - database management plugin <img width="1220" alt="image" src="https://user-images.githubuserco...
Database management plug-in table.php list-sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/5/comments
1
2023-01-29T06:40:52Z
2023-05-05T06:40:40Z
https://github.com/funadmin/funadmin/issues/5
1,561,149,983
5
CVE-2023-27115
2023-03-10T02:15:58.457
WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::cat_compute_size.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1938" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1992"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "665" ]
665
https://github.com/WebAssembly/wabt/issues/1938
[ "Exploit", "Issue Tracking" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.13.0-51-generic #58~20.04.1-Ubuntu SMP Tue Jun 14 11:29:12 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 57e6a58bfdd0babfd6f7fe401c9f2d8238ec3213 Version : 1.0.29 ``` ### Proof of concept [poc.wasm.zip](https://github.com/WebAssembly/wabt/files/8973781/poc.wasm....
Segmentation fault in wabt::cat_compute_size
https://api.github.com/repos/WebAssembly/wabt/issues/1938/comments
1
2022-06-24T06:43:25Z
2023-03-17T11:32:55Z
https://github.com/WebAssembly/wabt/issues/1938
1,283,331,255
1,938
CVE-2023-27115
2023-03-10T02:15:58.457
WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::cat_compute_size.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1938" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1992"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "665" ]
665
https://github.com/WebAssembly/wabt/issues/1992
[ "Exploit", "Issue Tracking" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept [poc-5.wasm.zip](https://github.com/WebA...
SEGV in wabt::cat_compute_size
https://api.github.com/repos/WebAssembly/wabt/issues/1992/comments
1
2022-09-05T13:44:45Z
2022-09-05T13:49:27Z
https://github.com/WebAssembly/wabt/issues/1992
1,362,003,678
1,992
CVE-2023-27117
2023-03-10T02:15:58.553
WebAssembly v1.0.29 was discovered to contain a heap overflow via the component component wabt::Node::operator.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAssembly/wabt/issues/1989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/WebAss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "E65BCD25-B1DD-43CE-9198-810D9F62B81C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/WebAssembly/wabt/issues/1989
[ "Exploit", "Issue Tracking" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609995798f872fc86b462617c294 Version : 1.0.29 Build : make clang-debug-asan ``` ### Proof of concept [poc-2.wasm.zip](https://github.com/We...
heap overflow in wabt::Node::operator=(wabt::Node&&)
https://api.github.com/repos/WebAssembly/wabt/issues/1989/comments
1
2022-09-05T13:30:58Z
2023-03-17T12:04:27Z
https://github.com/WebAssembly/wabt/issues/1989
1,361,978,096
1,989
CVE-2023-24774
2023-03-10T13:15:11.033
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \controller\auth\Auth.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/funadmin/funadmin/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:funadmin:funadmin:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC800090-6420-4971-831D-1E77A18BD45E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/funadmin/funadmin/issues/12
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "funadmin", "funadmin" ]
Vulnerability Product:funadmin Vulnerability version:.3.2.0 Vulnerability type:sql injection Vulnerability Details: Vulnerability location app\backend\controller\auth\Auth.php#adjust index method <img width="1225" alt="image" src="https://user-images.githubusercontent.com/122217858/215310156-128c1eb6-9516-42bf-b35...
auth.Auth#selectFields[name] has sql injection vulnerability
https://api.github.com/repos/funadmin/funadmin/issues/12/comments
1
2023-01-29T06:54:20Z
2023-05-05T06:40:42Z
https://github.com/funadmin/funadmin/issues/12
1,561,152,964
12
CVE-2023-27059
2023-03-16T22:15:11.453
A cross-site scripting (XSS) vulnerability in the Edit Group function of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Group Name text field.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6450" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisor...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/ChurchCRM/CRM/issues/6450
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
**If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.** #### On what page in the application did you find this issue? #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? windows #### What browser (and version) are...
A cross-site scripting vulnerability (XSS) exists in the edit group function
https://api.github.com/repos/ChurchCRM/CRM/issues/6450/comments
7
2023-02-19T08:13:59Z
2024-10-08T01:14:38Z
https://github.com/ChurchCRM/CRM/issues/6450
1,590,603,154
6,450
CVE-2023-1448
2023-03-17T07:15:12.093
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2388" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/3"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "122" ]
122
https://github.com/gpac/gpac/issues/2388
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Heap-buffer-overflow in function gf_m2ts_process_sdt of media_tools/mpegts.c:828
https://api.github.com/repos/gpac/gpac/issues/2388/comments
2
2023-02-02T14:57:17Z
2023-03-21T04:19:07Z
https://github.com/gpac/gpac/issues/2388
1,568,208,539
2,388
CVE-2023-1449
2023-03-17T07:15:12.347
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2387" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/bl...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "415" ]
415
https://github.com/gpac/gpac/issues/2387
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Double free in gf_av1_reset_state media_tools/av_parsers.c:4024
https://api.github.com/repos/gpac/gpac/issues/2387/comments
2
2023-02-02T10:24:45Z
2023-03-21T04:26:10Z
https://github.com/gpac/gpac/issues/2387
1,567,763,524
2,387
CVE-2023-1452
2023-03-17T07:15:12.947
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2386" }, { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://github.com/xxy1126/Vuln/blob/main/gpac/1....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*", "matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "120" ]
120
https://github.com/gpac/gpac/issues/2386
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
Buffer overflow in filters/load_text.c:353:14
https://api.github.com/repos/gpac/gpac/issues/2386/comments
2
2023-02-02T09:53:52Z
2023-03-21T04:44:47Z
https://github.com/gpac/gpac/issues/2386
1,567,701,993
2,386
CVE-2023-27087
2023-03-21T19:15:11.607
Permissions vulnerabiltiy found in Xuxueli xxl-job v2.2.0, v 2.3.0 and v.2.3.1 allows attacker to obtain sensitive information via the pageList parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/3096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "280" ]
280
https://github.com/xuxueli/xxl-job/issues/3096
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
Vertical overreach vulnerability exists in XXL-JOB The defect code is as follows v2.2.0、v2.3.0、v2.3.1 ![image](https://user-images.githubusercontent.com/110451039/220047413-f6e1720d-ea46-406b-82a0-85192041fd4d.png)
XXL-JOB Vertical Overreach vulnerability
https://api.github.com/repos/xuxueli/xxl-job/issues/3096/comments
1
2023-02-20T08:05:04Z
2025-03-07T03:40:29Z
https://github.com/xuxueli/xxl-job/issues/3096
1,591,349,265
3,096
CVE-2023-27249
2023-03-23T02:15:12.733
swfdump v0.9.2 was discovered to contain a heap buffer overflow in the function swf_GetPlaceObject at swfobject.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://swfdump.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc" }, { "source": "cve@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/197
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# heap-buffer-overflow ## env ubuntu20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1) swfdump - part of swftools 0.9.2 ## sample [poc.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfdump/poc) ## crash ``` ./swfdump -D poc ==2946990==ERROR: AddressSanitizer: heap-buffer-overflow on addres...
heap-buffer-overflow exists in the function swf_GetPlaceObject in swfobject.c
https://api.github.com/repos/swftools/swftools/issues/197/comments
0
2023-02-26T09:28:41Z
2023-02-26T09:28:41Z
https://github.com/swftools/swftools/issues/197
1,599,986,264
197
CVE-2023-26924
2023-03-27T22:15:21.967
LLVM a0dab4950 has a segmentation fault in mlir::outlineSingleBlockRegion. NOTE: third parties dispute this because the LLVM security policy excludes "Language front-ends ... for which a malicious input file can cause undesirable behavior."
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/Colloportus0/fc16d10d74aedf89d5d1d020ebb89c0c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https:/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2023-01-22:*:*:*:*:*:*:*", "matchCriteriaId": "71350E43-57E7-48F3-AD46-043D4988D2BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "120" ]
120
https://github.com/llvm/llvm-project/issues/60216
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/a0dab4950 Reproduced with: ```shell mlir-opt --test-scf-if-utils temp.mlir ``` `temp.mlir`: ```mlir func.func @func( %arg0: index, %arg1: index, %arg2: index, %arg3: memref<2xf32>) -> memref<2xf32> { %0 = memref.alloc() : memref<2x...
[mlir] `mlir::outlineSingleBlockRegion` crashes with segmentation fault.
https://api.github.com/repos/llvm/llvm-project/issues/60216/comments
10
2023-01-22T17:08:45Z
2023-08-02T16:45:00Z
https://github.com/llvm/llvm-project/issues/60216
1,552,201,934
60,216
CVE-2023-26855
2023-04-04T02:15:07.113
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ChurchCRM/CRM/issues/6449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "330" ]
330
https://github.com/ChurchCRM/CRM/issues/6449
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ChurchCRM", "CRM" ]
#### On what page in the application did you find this issue? https://github.com/ChurchCRM/CRM/blob/74042003a7cdad673bf56c7b6b43a0dabb3ac367/src/ChurchCRM/model/ChurchCRM/User.php#L109 #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Windows/xampp #### What browser (an...
Weak Salt Implementation
https://api.github.com/repos/ChurchCRM/CRM/issues/6449/comments
1
2023-02-12T14:43:47Z
2023-02-16T00:25:20Z
https://github.com/ChurchCRM/CRM/issues/6449
1,581,285,056
6,449
CVE-2023-26991
2023-04-04T15:15:09.183
SWFTools v0.9.2 was discovered to contain a stack-use-after-scope in the swf_ReadSWF2 function in lib/rfxswf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "416" ]
416
https://github.com/matthiaskramm/swftools/issues/196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
### Env Ubuntu 18.04 clang 11.0 swfdump v0.9.2 a part of Swftools v0.9.2 ### Reproduce POC: [poc](https://github.com/yiliang-neo/POC/raw/main/swfdump/POC-swfdump-use-after-scope.swf) command line: ``` swfdump -D poc ``` ### Debug Info ``` ==13979==ERROR: AddressSanitizer: stack-use-after-scope on addre...
stack-use-after-scope exists in function swf_ReadSWF2 in lib/rfxswf.c
https://api.github.com/repos/swftools/swftools/issues/196/comments
0
2023-02-16T07:45:42Z
2023-03-13T07:41:33Z
https://github.com/swftools/swftools/issues/196
1,587,191,755
196
CVE-2023-29374
2023-04-05T02:15:37.340
In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwchase17/langchain/issues/1026" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/hwchase17/langchain/issues/8...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C55CEFC-7C13-4D07-A223-1C5E9F7BBF25", "versionEndExcluding": null, "versionEndIncluding": "0.0.131", "versionStartE...
[ "74" ]
74
https://github.com/hwchase17/langchain/issues/1026
[ "Issue Tracking" ]
github.com
[ "hwchase17", "langchain" ]
I have some concerns about the way some of this code is implemented. To name the two I've noticed so far, the llm_math and sql_database chains. It seems these two will blindly execute any code that is fed to it from the llm This is a major security risk, since this opens anyone who uses these up for remote cod...
Security concerns
https://api.github.com/repos/langchain-ai/langchain/issues/1026/comments
31
2023-02-13T21:46:22Z
2023-10-25T16:10:08Z
https://github.com/langchain-ai/langchain/issues/1026
1,583,115,861
1,026
CVE-2023-29374
2023-04-05T02:15:37.340
In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that can execute arbitrary code via the Python exec method.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/hwchase17/langchain/issues/1026" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/hwchase17/langchain/issues/8...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C55CEFC-7C13-4D07-A223-1C5E9F7BBF25", "versionEndExcluding": null, "versionEndIncluding": "0.0.131", "versionStartE...
[ "74" ]
74
https://github.com/hwchase17/langchain/issues/814
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "hwchase17", "langchain" ]
#Overview llm math and PAL both use `exec()` and `eval()` which is dangerous, while PAL is more complex and might have to stay that way, llm-math could be made safer by using numexpr rather than `exec()` I suggest we use something like so: ```python @tool def calculator(expr): """This tool allows you t...
Exploiting llm-math (and likely PAL) and suggesting and alternative
https://api.github.com/repos/langchain-ai/langchain/issues/814/comments
2
2023-01-31T02:37:23Z
2023-05-11T16:06:59Z
https://github.com/langchain-ai/langchain/issues/814
1,563,517,965
814
CVE-2023-29576
2023-04-11T21:15:30.510
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/844" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "125" ]
125
https://github.com/axiomatic-systems/Bento4/issues/844
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found SEGV bug in Ap4TrunAtom.h # BUG SEGV /home/ubuntu/fuzz/asan_bento4/Bento4/Source/C++/Core/Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=a...
SEGV Ap4TrunAtom.h:80:80 in AP4_TrunAtom::SetDataOffset(int)
https://api.github.com/repos/axiomatic-systems/Bento4/issues/844/comments
0
2023-03-14T12:42:26Z
2024-02-17T17:48:33Z
https://github.com/axiomatic-systems/Bento4/issues/844
1,623,402,397
844
CVE-2023-29574
2023-04-12T13:15:07.637
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/841" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "119" ]
119
https://github.com/axiomatic-systems/Bento4/issues/841
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp42avc # BUG out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42avc+0x4c44dd) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=...
out-of-memory in mp42avc
https://api.github.com/repos/axiomatic-systems/Bento4/issues/841/comments
1
2023-03-14T02:40:15Z
2024-02-17T17:49:29Z
https://github.com/axiomatic-systems/Bento4/issues/841
1,622,623,759
841
CVE-2023-29580
2023-04-12T13:15:07.727
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yasm/yasm/issues/215" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/z...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "653" ]
653
https://github.com/yasm/yasm/issues/215
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
# SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./config...
SEGV yasm/libyasm/expr.c:87:44 in yasm_expr_create
https://api.github.com/repos/yasm/yasm/issues/215/comments
1
2023-03-31T07:56:32Z
2024-03-21T12:41:09Z
https://github.com/yasm/yasm/issues/215
1,648,868,122
215
CVE-2023-29571
2023-04-12T15:15:13.233
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/241" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "119" ]
119
https://github.com/cesanta/mjs/issues/241
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_gc.c:190:11 in gc_sweep ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/poc6.zip ...
SEGV src/mjs_gc.c:190:11 in gc_sweep
https://api.github.com/repos/cesanta/mjs/issues/241/comments
0
2023-03-06T01:35:33Z
2023-03-06T01:35:33Z
https://github.com/cesanta/mjs/issues/241
1,610,494,409
241
CVE-2023-29573
2023-04-13T20:15:16.690
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/840" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/840
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp4info # BUG out-of-memory (/home/ubuntu/fuzz/Bento4_fuzz/asan/Bento4/cmakebuild/mp4info+0x4c44ed) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsani...
out-of-memory in mp4info
https://api.github.com/repos/axiomatic-systems/Bento4/issues/840/comments
0
2023-03-14T02:26:20Z
2024-02-17T17:08:01Z
https://github.com/axiomatic-systems/Bento4/issues/840
1,622,614,615
840
CVE-2023-29569
2023-04-14T12:15:07.770
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/239" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/z1r00/fuzz_vuln/blob/main/mjs...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/cesanta/mjs/issues/239
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi...
SEGV src/mjs_ffi.c:456 in ffi_cb_impl_wpwwwww
https://api.github.com/repos/cesanta/mjs/issues/239/comments
0
2023-03-06T01:14:12Z
2023-03-06T01:14:12Z
https://github.com/cesanta/mjs/issues/239
1,610,480,695
239
CVE-2023-27043
2023-04-19T00:15:07.973
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verify...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://python.org" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/python/cpython/issues/102988" }, { "source": "cve@mitre.org", "tags": null, "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "45955EC3-D135-4BF2-8396-744307DD4BF2", "versionEndExcluding": null, "versionEndIncluding": "2.7.18", "versionStartExcludin...
[ "20" ]
20
https://github.com/python/cpython/issues/102988
[ "Exploit", "Issue Tracking" ]
github.com
[ "python", "cpython" ]
# Bug report I have discovered a way to cause `email.utils.parsaddr()` and `email.utils.getaddresses()` to erroneously return the Real Name portion of a RFC 2822 Address Header in the Email Address portion of the returned tuple. This vulnerability enables me to bypass security systems which allow or deny access or a...
[CVE-2023-27043] Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple
https://api.github.com/repos/python/cpython/issues/102988/comments
31
2023-03-24T03:30:35Z
2024-09-06T12:29:22Z
https://github.com/python/cpython/issues/102988
1,638,659,213
102,988
CVE-2023-29575
2023-04-21T14:15:07.373
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory", "Vendor Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/842" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "770" ]
770
https://github.com/axiomatic-systems/Bento4/issues/842
[ "Exploit", "Issue Tracking", "Third Party Advisory", "Vendor Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hello, I found out-of-memory bug in mp42aac # BUG out-of-memory (/home/ubuntu/fuzz/asan_bento4/Bento4/cmakebuild/mp42aac+0x4c44dd) in operator new(unsigned long) # Build ubuntu 20.04 ``` export CC=clang export CXX=clang++ export CFLAGS="-fsanitize=address -g" export CXXFLAGS="-fsanitize=...
out-of-memory in mp42aac
https://api.github.com/repos/axiomatic-systems/Bento4/issues/842/comments
1
2023-03-14T02:50:05Z
2024-02-17T17:52:59Z
https://github.com/axiomatic-systems/Bento4/issues/842
1,622,631,441
842
CVE-2023-29579
2023-04-24T13:15:07.440
yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the component yasm/yasm+0x43b466 in vsprintf. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/214" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-buffer-overflow/yasm/rea...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "787" ]
787
https://github.com/yasm/yasm/issues/214
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
# stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./conf...
stack-buffer-overflow yasm/yasm+0x43b466 in vsprintf
https://api.github.com/repos/yasm/yasm/issues/214/comments
1
2023-03-30T13:06:13Z
2024-03-21T12:42:39Z
https://github.com/yasm/yasm/issues/214
1,647,586,741
214
CVE-2023-29582
2023-04-24T13:15:07.483
yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr1 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2189601#c3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/217" }, { "source": "cve@mitre.org", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "787" ]
787
https://github.com/yasm/yasm/issues/217
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
# stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1 ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fra...
stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1235 in parse_expr1
https://api.github.com/repos/yasm/yasm/issues/217/comments
1
2023-03-31T08:22:30Z
2024-03-22T11:56:45Z
https://github.com/yasm/yasm/issues/217
1,648,921,272
217
CVE-2023-29583
2023-04-24T13:15:07.523
yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via the function parse_expr5 at /nasm/nasm-parse.c. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/218" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/z1r00/fuzz_vuln/blob/main/yasm/stack-overflow/parse_expr5/rea...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.55.g101bc:*:*:*:*:*:*:*", "matchCriteriaId": "4A03B4FD-736D-40B7-87B0-AC4EF2660C4B", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "787" ]
787
https://github.com/yasm/yasm/issues/218
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
# stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5 ## project address https://github.com/yasm/yasm ## info OS:Ubuntu20.04 TLS Build: ./autogen.sh && make distclean && CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-fram...
stack-overflow yasm/modules/parsers/nasm/nasm-parse.c:1303 in parse_expr5
https://api.github.com/repos/yasm/yasm/issues/218/comments
1
2023-03-31T08:27:44Z
2024-03-22T11:55:05Z
https://github.com/yasm/yasm/issues/218
1,648,929,873
218
CVE-2023-29570
2023-04-24T14:15:07.800
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/240" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "770" ]
770
https://github.com/cesanta/mjs/issues/240
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
# SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free ## project address https://github.com/cesanta/mjs ## info OS:Ubuntu20.04 TLS Build: `$(DOCKER_CLANG) -fsanitize=address $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)` ## Poc https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2...
SEGV src/mjs_ffi.c:982:24 in mjs_ffi_cb_free
https://api.github.com/repos/cesanta/mjs/issues/240/comments
0
2023-03-06T01:27:09Z
2023-03-06T01:27:09Z
https://github.com/cesanta/mjs/issues/240
1,610,488,659
240
CVE-2023-30406
2023-04-24T22:15:09.627
Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component ecma_find_named_property at /base/ecma-helpers.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "400" ]
400
https://github.com/jerryscript-project/jerryscript/issues/5058
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 1a2c04763aba49f52b1537acd3730098c873511c ###### Build platform Ubuntu 20.04.2 LTS (Linux 5.15.0-67-generic x86_64) ###### Build steps Describe how to build JerryScript. Give all the necessary details of the build (e.g., environment variables, command(s), profile, command line optio...
Segmentation fault in jerry
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5058/comments
6
2023-03-28T06:12:27Z
2025-01-09T06:48:54Z
https://github.com/jerryscript-project/jerryscript/issues/5058
1,643,268,712
5,058
CVE-2023-30408
2023-04-24T22:15:09.677
Jerryscript commit 1a2c047 was discovered to contain a segmentation violation via the component build/bin/jerry.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "400" ]
400
https://github.com/jerryscript-project/jerryscript/issues/5057
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
First of all, when reporting a bug, give the issue a descriptive title. In the body of the issue, optionally give a free-form text description of the bug. Give the context necessary for others to understand the problem. Then, provide information necessary to reproduce the bug. Omit sections that are irrelevant ...
Segmentation fault in jerry
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5057/comments
2
2023-03-27T09:25:43Z
2025-01-09T06:20:29Z
https://github.com/jerryscript-project/jerryscript/issues/5057
1,641,737,938
5,057
CVE-2023-30410
2023-04-24T22:15:09.743
Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component ecma_op_function_construct at /operations/ecma-function-object.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5052
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 1a2c04763aba49f52b1537acd3730098c873511c ###### Build platform Name the build platform. E.g., copy the output of Ubuntu Lunar Lobster (development branch) (Linux 5.15.0-67-generic x86_64) ###### Build steps ```sh python3 tools/build.py --builddir=asan --compile-flag=-fno-omit-fram...
jerry crashed while running the following code.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5052/comments
2
2023-03-15T06:57:23Z
2024-11-21T10:15:30Z
https://github.com/jerryscript-project/jerryscript/issues/5052
1,624,874,619
5,052
CVE-2023-30414
2023-04-24T22:15:09.807
Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5051" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB495C8-348F-4B04-B31F-1F4EE471CC22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5051
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
the following js cause a segmentation fault in jerryscript. ``` function test(){ function f(){ var f = test(); h = f(); } return f; } let a = test(); c = a(); ```
segmentation fault in jerryscript
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5051/comments
3
2023-03-14T03:36:48Z
2024-11-21T10:13:16Z
https://github.com/jerryscript-project/jerryscript/issues/5051
1,622,665,090
5,051
CVE-2023-30402
2023-04-25T16:15:09.590
YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re. Note: This has been disputed by third parties who argue this is a bug and not a security issue because yasm is a standalone program not designed to run untrusted code.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yasm/yasm/issues/206" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/yasm/yasm/issues/206
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yasm", "yasm" ]
yasm heap buffer overflow I found a heap-buffer-overflow in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -s -o abc --force-strict $PoC Details ASAN report $./yasm -s ...
yasm heap buffer overflow
https://api.github.com/repos/yasm/yasm/issues/206/comments
1
2023-03-01T01:50:12Z
2024-03-22T11:53:56Z
https://github.com/yasm/yasm/issues/206
1,604,082,214
206
CVE-2023-30338
2023-04-27T15:15:13.787
Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/emlog/emlog/issues/229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:2.0.3:*:*:*:pro:*:*:*", "matchCriteriaId": "5B872763-766F-478B-BA9C-97A85DC372F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/emlog/emlog/issues/229
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "emlog", "emlog" ]
**Version(latest version)** emlog_pro_2.0.3 **Actual behavior** XSS vulnerabilities **Steps to reproduce the behavior** 1.There is a stored xss in the article writing. The article body(文章正文) and article summary(文章摘要) has the vulnerability. 在写文章功能点,文章正文以及文章摘要处存在存储型xss ![image](https://user-images.githubus...
XSS vulnerabilities in pro2.0.3
https://api.github.com/repos/emlog/emlog/issues/229/comments
2
2023-03-31T02:58:46Z
2023-10-27T04:26:32Z
https://github.com/emlog/emlog/issues/229
1,648,589,849
229
CVE-2023-29950
2023-04-27T20:15:40.207
swfrender v0.9.2 was discovered to contain a heap buffer overflow in the function enumerateUsedIDs_fillstyle at modules/swftools.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/198
[ "Exploit", "Vendor Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
# 1.heap-buffer-overflow ## env ubuntu20.04 gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.1) swfrender - part of swftools 0.9.2 ## sample [id7_heap-buffer-overflow.zip](https://github.com/keepinggg/poc/blob/main/poc_of_swfrender/id7_heap-buffer-overflow.zip) ## crash ``` ./swfrender id7_heap-buffer-o...
bug report -- swfrender
https://api.github.com/repos/swftools/swftools/issues/198/comments
0
2023-03-23T06:44:18Z
2023-03-23T06:44:18Z
https://github.com/swftools/swftools/issues/198
1,636,946,205
198
CVE-2023-30125
2023-04-28T14:15:11.083
EyouCms V1.6.1-UTF8-sp1 is vulnerable to Cross Site Scripting (XSS).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.1-utf8-sp1:*:*:*:*:*:*:*", "matchCriteriaId": "91E07F04-0ABB-44F1-AAA5-E4E8E7B3DE92", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "79" ]
79
https://github.com/weng-xianhu/eyoucms/issues/40
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
Version: V1.6.1-UTF8-sp1 ![image](https://user-images.githubusercontent.com/47726460/227478224-441945d3-d648-4a98-b416-db5ce54559b7.png) 1. Go to the background --> Advertising management -->Add new ads 2. Then fill in the payload " <style onload=alert(document.cookie) />"in the ad content. ![image](https://us...
There is a xss causes XSS to steal sensitive information of logged-in users
https://api.github.com/repos/weng-xianhu/eyoucms/issues/40/comments
0
2023-03-24T09:24:19Z
2024-03-22T06:48:55Z
https://github.com/weng-xianhu/eyoucms/issues/40
1,639,023,869
40
CVE-2023-30300
2023-05-03T20:15:10.327
An issue in the component hang.wasm of WebAssembly 1.0 causes an infinite loop.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/2180" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:w3:webassembly:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "84AAF761-2870-48C9-9FB8-34701902B4ED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "835" ]
835
https://github.com/WebAssembly/wabt/issues/2180
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Describe the bug Certain `hang.wasm` causes `wasm2c` an infinite loop. `wasm2c` tries to access a memory that is not permitted instead of providing `type mismatch` error for a while. `wasm2c --version`: 1.0.32 (git~1.0.32-46-g47a589a1) -------------------------- ### Content of the file that causes the iss...
wasm2c hangs on certain inputs and cannot finish execution for a while.
https://api.github.com/repos/WebAssembly/wabt/issues/2180/comments
5
2023-03-27T20:41:27Z
2023-03-31T17:02:49Z
https://github.com/WebAssembly/wabt/issues/2180
1,642,781,849
2,180
CVE-2023-29994
2023-05-04T17:15:13.577
In NanoMQ v0.15.0-0, Heap overflow occurs in read_byte function of mqtt_code.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emqx/nanomq/issues/1042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emqx/nanomq...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "4383F876-3079-4AC1-A4A9-AE5719B1A077", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/emqx/nanomq/issues/1042
[ "Exploit", "Issue Tracking" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** Heap overflow occurred in read_byte function of mqtt_code.c Confirmed with address sanitizer **Expected behavior** **Actual Behavior** Heap Overflow(CWE-122) **To Reproduce** ![](https://user-images.githubusercontent.com/32904385/217438822-a770c8bf-58c6-4d26-9a63-5b5569fe12dd.png) ...
[Bug] Heap-based Buffer Overflow in `mqtt_code.c`(`read_byte`)
https://api.github.com/repos/nanomq/nanomq/issues/1042/comments
2
2023-02-08T05:12:05Z
2023-02-13T08:28:37Z
https://github.com/nanomq/nanomq/issues/1042
1,575,489,854
1,042
CVE-2023-29995
2023-05-04T17:15:13.643
In NanoMQ v0.15.0-0, a Heap overflow occurs in copyn_utf8_str function of mqtt_parser.c
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emqx/nanomq/issues/1043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/emqx/nanomq...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "4383F876-3079-4AC1-A4A9-AE5719B1A077", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "787" ]
787
https://github.com/emqx/nanomq/issues/1043
[ "Exploit", "Issue Tracking" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** Heap overflow occurred in copyn_utf8_str function of mqtt_parser.c Confirmed with address sanitizer **Expected behavior** A clear and concise description of what you expected to happen. **Actual Behavior** Heap Overflow(CWE-122) **To Reproduce** ![](https://user-images.githubuserconten...
[Bug] Heap-based Buffer Overflow in `mqtt_parser.c` - `copyn_utf8_str()`
https://api.github.com/repos/nanomq/nanomq/issues/1043/comments
1
2023-02-08T05:23:15Z
2023-02-15T04:31:35Z
https://github.com/nanomq/nanomq/issues/1043
1,575,501,548
1,043
CVE-2023-29996
2023-05-04T17:15:13.690
In NanoMQ v0.15.0-0, segment fault with Null Pointer Dereference occurs in the process of decoding subinfo_decode and unsubinfo_decode.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/emqx/nanomq/issues/1038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "4383F876-3079-4AC1-A4A9-AE5719B1A077", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "476" ]
476
https://github.com/emqx/nanomq/issues/1038
[ "Exploit", "Third Party Advisory" ]
github.com
[ "emqx", "nanomq" ]
**Describe the bug** segments fault with CWE-476 (NULL Pointer Dereference) occurred in the process of decoding `subinfo_decode` and `unsubinfo_decode` **Expected behavior** Dos **Actual Behavior** Describe what occurred. **To Reproduce** ```python import subprocess import time import socket def che...
Segment Fault occurs due to NULL Pointer reference in `subinfo_decode` & `unsubinfo_decode` while broker is parsing mqtt
https://api.github.com/repos/nanomq/nanomq/issues/1038/comments
3
2023-02-07T05:57:05Z
2023-03-17T07:30:21Z
https://github.com/nanomq/nanomq/issues/1038
1,573,731,822
1,038
CVE-2023-29932
2023-05-05T15:15:09.633
llvm-project commit fdbc55a5 was discovered to contain a segmentation fault via the component mlir::IROperand<mlir::OpOperand.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llvm-project/issues/58745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2022-11-01:*:*:*:*:*:*:*", "matchCriteriaId": "1B7B4679-F150-4937-8E6C-85F26EECA861", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "119" ]
119
https://github.com/llvm/llvm-project/issues/58745
[ "Issue Tracking", "Patch" ]
github.com
[ "llvm", "llvm-project" ]
Reproduced at commit [fdbc55a5](https://github.com/llvm/llvm-project/commit/fdbc55a5) ```shell mlir-opt --canonicalize temp.mlir ``` [temp.mlir.txt](https://github.com/llvm/llvm-project/files/9915414/temp.mlir.txt) ```console PLEASE submit a bug report to https://github.com/llvm/llvm-project/issues/ and includ...
[mlir] canonicalize pass crashed with segmentation fault
https://api.github.com/repos/llvm/llvm-project/issues/58745/comments
2
2022-11-02T02:36:31Z
2022-11-08T04:14:43Z
https://github.com/llvm/llvm-project/issues/58745
1,432,381,138
58,745
CVE-2023-29933
2023-05-05T15:15:09.683
llvm-project commit bd456297 was discovered to contain a segmentation fault via the component mlir::Block::getArgument.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llvm-project/issues/59442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2022-12-11:*:*:*:*:*:*:*", "matchCriteriaId": "01176116-1DD3-4B35-8387-6303D4AD731B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/llvm/llvm-project/issues/59442
[ "Issue Tracking", "Patch" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/0ee6bad6a6725c2913116a8fa7769b067c219f0 Reproduced with: `mlir-opt --one-shot-bufferize temp.mlir` temp.mlir: ```mlir module { func.func @func() { %false = arith.constant false %8 = tensor.empty() : tensor<10x10xf32> scf.whi...
[mlir] One shot bufferize crashed with segmentation fault.
https://api.github.com/repos/llvm/llvm-project/issues/59442/comments
2
2022-12-11T15:48:38Z
2023-05-15T14:07:52Z
https://github.com/llvm/llvm-project/issues/59442
1,490,145,651
59,442
CVE-2023-29934
2023-05-05T15:15:09.733
llvm-project commit 6c01b5c was discovered to contain a segmentation fault via the component mlir::Type::getDialect().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llvm-project/issues/59136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2022-11-22:*:*:*:*:*:*:*", "matchCriteriaId": "B0D60ABE-3E22-40CA-800B-77F8BAD4DCD2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/llvm/llvm-project/issues/59136
[ "Issue Tracking", "Patch" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/6c01b5cdaddce8df325020659d73cd7728778392 Reproduced with: `mlir-opt --convert-scf-to-spirv temp.mlir` ```mlir module { func.func @func1(%arg0: tensor<2x2xi1>, %arg1: f32) -> f32 { %true = arith.constant true %c36976552_i32 = arith....
[mlir] convert-scf-to-spirv Pass crashed with segmentation fault
https://api.github.com/repos/llvm/llvm-project/issues/59136/comments
5
2022-11-22T17:14:33Z
2023-01-09T16:37:11Z
https://github.com/llvm/llvm-project/issues/59136
1,460,261,889
59,136
CVE-2023-29935
2023-05-05T15:15:09.783
llvm-project commit a0138390 was discovered to contain an assertion failure at !replacements.count(op) && "operation was already replaced.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llvm-project/issues/59182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2022-11-23:*:*:*:*:*:*:*", "matchCriteriaId": "9B8D1FE3-4FF5-447A-8B19-FF362CD84298", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "617" ]
617
https://github.com/llvm/llvm-project/issues/59182
[ "Issue Tracking", "Patch" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/12ebfca621059bf6423a8ea0fcf6225dfe8018eb Reproduced with: `mlir-opt --gpu-to-llvm temp.mlir` temp.mlir: ```mlir module { func.func @func1(){ %c1 = arith.constant 1 : index %alloc_6 = memref.alloc() : memref<2x3xf32> memref.alloc...
[mlir] gpu-to-llvm Pass crashed with error message "Assertion failed: (!replacements.count(op) && "operation was already replaced")"
https://api.github.com/repos/llvm/llvm-project/issues/59182/comments
10
2022-11-24T03:35:59Z
2023-08-07T13:34:09Z
https://github.com/llvm/llvm-project/issues/59182
1,462,704,527
59,182
CVE-2023-29939
2023-05-05T15:15:09.850
llvm-project commit a0138390 was discovered to contain a segmentation fault via the component mlir::spirv::TargetEnv::TargetEnv(mlir::spirv::TargetEnvAttr).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llvm-project/issues/59983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2023-01-12:*:*:*:*:*:*:*", "matchCriteriaId": "3693A1CB-2899-4946-A444-0FB73D378422", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/llvm/llvm-project/issues/59983
[ "Issue Tracking", "Patch" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/a0138390 Reproduced with: `mlir-opt --spirv-lower-abi-attrs temp.mlir` temp.mlir: ``` spirv.module Logical GLSL450 { spirv.SpecConstant @sc1 = 1.500000e+00 : f32 spirv.SpecConstant @sc2 = 2.500000e+00 : f32 spirv.SpecConstantComposite @...
[mlir] spirv-lower-abi-attrs crashes with segmentation faults
https://api.github.com/repos/llvm/llvm-project/issues/59983/comments
2
2023-01-13T06:04:46Z
2023-01-13T16:01:04Z
https://github.com/llvm/llvm-project/issues/59983
1,531,754,487
59,983
CVE-2023-29941
2023-05-05T15:15:09.917
llvm-project commit a0138390 was discovered to contain a segmentation fault via the component matchAndRewriteSortOp<mlir::sparse_tensor::SortOp>(mlir::sparse_tensor::SortOp.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llvm-project/issues/59988" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/me...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2023-01-12:*:*:*:*:*:*:*", "matchCriteriaId": "3693A1CB-2899-4946-A444-0FB73D378422", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/llvm/llvm-project/issues/59988
[ "Issue Tracking", "Patch" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/a0138390 Reproduced with: `mlir-opt --sparse-buffer-rewrite temp.mlir` `temp.mlir`: ```mlir module attributes {llvm.data_layout = ""} { llvm.func @func(%arg0: i64, %arg1: !llvm.ptr<i8>, %arg2: !llvm.ptr<i8>, %arg3: i64, %arg4: i64, %arg5: i64,...
[mlir] Sparse-buffer-rewrite pass crashes with Segmentation fault
https://api.github.com/repos/llvm/llvm-project/issues/59988/comments
2
2023-01-13T06:25:31Z
2023-02-27T15:37:24Z
https://github.com/llvm/llvm-project/issues/59988
1,531,773,423
59,988
CVE-2023-29942
2023-05-05T15:15:09.970
llvm-project commit a0138390 was discovered to contain a segmentation fault via the component mlir::Type::isa<mlir::LLVM::LLVMVoidType.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llvm-project/issues/59990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/llvm/llv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:llvm:llvm:2023-01-12:*:*:*:*:*:*:*", "matchCriteriaId": "3693A1CB-2899-4946-A444-0FB73D378422", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/llvm/llvm-project/issues/59990
[ "Issue Tracking", "Patch" ]
github.com
[ "llvm", "llvm-project" ]
MLIR built at commit https://github.com/llvm/llvm-project/commit/a0138390 Reproduced with: `mlir-opt --convert-spirv-to-llvm temp.mlir` `temp.mlir`: ```mlir module { spirv.module Logical GLSL450 { spirv.GlobalVariable @var01_scalar bind(0, 1) {aliased} : !spirv.ptr<!spirv.struct<(!spirv.rtarray<f32, s...
[mlir] Convert-spirv-to-llvm Pass trigger Segmentation fault in LLVMStructType verifier
https://api.github.com/repos/llvm/llvm-project/issues/59990/comments
8
2023-01-13T06:31:05Z
2023-10-30T06:40:18Z
https://github.com/llvm/llvm-project/issues/59990
1,531,779,880
59,990
CVE-2023-31972
2023-05-09T13:15:18.503
yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/yasm/yasm/issues/209
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a heap-use-after-free in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -w -W -M $PoC Details ASAN report $./yasm -w -W -M $PoC ``` yasm: warning: unrecogni...
yasm heap use-after-free bug
https://api.github.com/repos/yasm/yasm/issues/209/comments
1
2023-03-01T02:17:35Z
2023-05-10T05:20:07Z
https://github.com/yasm/yasm/issues/209
1,604,108,494
209
CVE-2023-31974
2023-05-09T13:15:18.550
yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "416" ]
416
https://github.com/yasm/yasm/issues/208
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a heap-use-after-free in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -w -W -M $PoC Details ASAN report $./yasm -w -W -M $PoC ``` yasm: warning: unrecogni...
yasm heap use-after-free bug
https://api.github.com/repos/yasm/yasm/issues/208/comments
1
2023-03-01T02:08:44Z
2023-05-10T05:20:11Z
https://github.com/yasm/yasm/issues/208
1,604,101,306
208
CVE-2023-31975
2023-05-09T13:15:18.590
yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityI...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/06/20/6" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwal...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AD6556F7-3880-452A-ABA9-1A8A14BA41F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "401" ]
401
https://github.com/yasm/yasm/issues/210
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a memory leak bug in yasm. Please confirm. Thanks! ### Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) ### How to trigger Compile the program with AddressSanitizer Run command $ touch u $ ./yasm -ium u ### Details ASAN report $./yasm -ium u ``` yasm: file name ...
yasm memory leak
https://api.github.com/repos/yasm/yasm/issues/210/comments
5
2023-03-01T02:27:11Z
2024-03-22T11:43:38Z
https://github.com/yasm/yasm/issues/210
1,604,119,944
210
CVE-2023-31973
2023-05-09T14:15:13.737
yasm v1.3.0 was discovered to contain a use after free via the function expand_mmac_params at /nasm/nasm-pp.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issues/207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yasm/yasm/issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "401" ]
401
https://github.com/yasm/yasm/issues/207
[ "Exploit", "Issue Tracking" ]
github.com
[ "yasm", "yasm" ]
I found a heap-use-after-free in yasm. Please confirm. Thanks! Test Environment Ubuntu 20.04, 64 bit yasm (version: v1.3.0 ;master) How to trigger Compile the program with AddressSanitizer Run command $ ./yasm -w -W -M $PoC Details ASAN report $./yasm -w -W -M $PoC ``` yasm: warning: unrecognized ...
yasm heap use-after-free bug
https://api.github.com/repos/yasm/yasm/issues/207/comments
1
2023-03-01T02:03:35Z
2023-05-10T05:20:08Z
https://github.com/yasm/yasm/issues/207
1,604,096,378
207
CVE-2023-31976
2023-05-09T14:15:13.780
libming v0.4.8 was discovered to contain a stack buffer overflow via the function makeswf_preprocess at /util/makeswf_utils.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "787" ]
787
https://github.com/libming/libming/issues/265
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
When the program input contains the option of "-D" or "-o" , the program will cause stack buffer overflow error. Test Environment Ubuntu 20.04, 64 bit libming (master ; commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473)) How to trigger Compile the progra...
makeswf stack buffer overflow
https://api.github.com/repos/libming/libming/issues/265/comments
0
2023-02-28T06:17:08Z
2023-02-28T06:17:08Z
https://github.com/libming/libming/issues/265
1,602,439,311
265
CVE-2021-31240
2023-05-09T16:15:14.147
An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "401" ]
401
https://github.com/libming/libming/issues/218
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Hi, I found a memory leak problem. version: 0.4.8 command: swftophp poc poc: [parser.c_2556.zip](https://github.com/libming/libming/files/6276040/parser.c_2556.zip) Here is the report from ASAN: ``` `header indicates a filesize of 761 but filesize is 550 <?php $m = new SWFMovie(8); ming_setscale(1.0); $m...
Memory leaks in parseSWF_IMPORTASSETS
https://api.github.com/repos/libming/libming/issues/218/comments
0
2021-04-08T04:46:50Z
2021-04-08T04:46:50Z
https://github.com/libming/libming/issues/218
853,054,686
218
CVE-2023-30083
2023-05-09T16:15:14.373
Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the newVar_N in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/libming/libming/issues/266
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Heap buffer overflow in the latest version of libming at function newVar_N in util/decompile.c:654. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. co...
Heap buffer overflow in newVar_N() at decompile.c:654
https://api.github.com/repos/libming/libming/issues/266/comments
0
2023-03-21T06:45:54Z
2023-03-21T06:45:54Z
https://github.com/libming/libming/issues/266
1,633,318,454
266
CVE-2023-30084
2023-05-09T16:15:14.423
An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/libming/libming/issues/268
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Invalid memory read in the latest version of libming at function stackVal in util/decompile.c:1238. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. co...
Invalid memory read in stackVal() at decompile.c:1238
https://api.github.com/repos/libming/libming/issues/268/comments
0
2023-03-21T06:53:51Z
2023-03-21T06:53:51Z
https://github.com/libming/libming/issues/268
1,633,325,057
268
CVE-2023-30085
2023-05-09T16:15:14.470
Buffer Overflow vulnerability found in Libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the cws2fws function in util/decompile.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "120" ]
120
https://github.com/libming/libming/issues/267
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
Allocation size overflow in the latest version of libming at function cws2fws in util/main.c:111. ## Environment Ubuntu 18.04, 64 bit libming 0.4.8 ## Steps to reproduce 1. download file ``` wget https://github.com/libming/libming/archive/refs/tags/ming-0_4_8.tar.gz tar -zxvf ming-0_4_8.tar.gz ``` 2. comp...
Allocation size overflow in cws2fws() at main.c:111
https://api.github.com/repos/libming/libming/issues/267/comments
0
2023-03-21T06:50:17Z
2023-03-21T06:50:17Z
https://github.com/libming/libming/issues/267
1,633,322,109
267
CVE-2023-30087
2023-05-09T16:15:14.547
Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/244" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "787" ]
787
https://github.com/cesanta/mjs/issues/244
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
Heap buffer overflow in mjs at function mjs_mk_string in mjs.c:13671. ## Environment Ubuntu 18.04, 64 bit ## Steps to reproduce 1. download file ``` git clone https://github.com/cesanta/mjs.git mjs cd mjs git checkout 9eae0e6 ``` 2. compile libming with ASAN ``` clang -fsanitize=address mjs.c -o mjs_asa...
Heap buffer overflow in mjs_mk_string() at mjs.c:13671
https://api.github.com/repos/cesanta/mjs/issues/244/comments
0
2023-03-22T09:15:39Z
2023-03-22T09:15:39Z
https://github.com/cesanta/mjs/issues/244
1,635,358,781
244
CVE-2023-30088
2023-05-09T16:15:14.583
An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "119" ]
119
https://github.com/cesanta/mjs/issues/243
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
Invalid memory read in mjs at function mjs_execute in mjs.c:9320. ## Environment Ubuntu 18.04, 64 bit ## Steps to reproduce 1. download file ``` git clone https://github.com/cesanta/mjs.git mjs cd mjs git checkout d6c06a6 ``` 2. compile libming with ASAN ``` clang -fsanitize=address mjs.c -o mjs_asan `...
Invalid memory read in mjs_execute() at mjs.c:9320
https://api.github.com/repos/cesanta/mjs/issues/243/comments
1
2023-03-22T09:15:01Z
2023-05-15T14:19:13Z
https://github.com/cesanta/mjs/issues/243
1,635,357,898
243
CVE-2023-31906
2023-05-10T15:15:10.187
Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5066
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
heap-buffer-overflow in lexer_compare_identifier_to_chars
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5066/comments
0
2023-04-08T12:50:49Z
2024-11-22T09:18:15Z
https://github.com/jerryscript-project/jerryscript/issues/5066
1,659,514,220
5,066
CVE-2023-31907
2023-05-10T15:15:10.353
Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5073
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compi...
heap-buffer-overflow in scanner_literal_is_created
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5073/comments
0
2023-04-19T12:27:29Z
2023-04-19T12:27:29Z
https://github.com/jerryscript-project/jerryscript/issues/5073
1,674,802,543
5,073
CVE-2023-31908
2023-05-10T15:15:10.533
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component ecma_builtin_typedarray_prototype_sort.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5067
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c...
heap-buffer-overflow in ecma_builtin_typedarray_prototype_sort
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5067/comments
0
2023-04-08T13:31:08Z
2023-04-08T13:39:28Z
https://github.com/jerryscript-project/jerryscript/issues/5067
1,659,524,592
5,067
CVE-2023-31910
2023-05-10T15:15:10.697
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow via the component parser_parse_function_statement at /jerry-core/parser/js/js-parser-statm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/5076
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --c...
heap-buffer-overflow in parser_parse_function_statement
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5076/comments
0
2023-04-23T16:01:47Z
2023-04-23T16:01:47Z
https://github.com/jerryscript-project/jerryscript/issues/5076
1,680,076,342
5,076
CVE-2023-31913
2023-05-12T14:15:09.773
Jerryscript 3.0 *commit 1a2c047) was discovered to contain an Assertion Failure via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5061
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->scope_stack_size == PARSER_MAXIMUM_DEPTH_OF_SCOPE_STACK' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class):1068.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5061/comments
0
2023-04-06T10:46:13Z
2024-11-22T09:11:34Z
https://github.com/jerryscript-project/jerryscript/issues/5061
1,657,176,424
5,061
CVE-2023-31914
2023-05-12T14:15:09.807
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "770" ]
770
https://github.com/jerryscript-project/jerryscript/issues/5071
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
AddressSanitizer: allocator is out of memory trying to allocate
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5071/comments
0
2023-04-19T11:36:46Z
2023-04-19T11:36:46Z
https://github.com/jerryscript-project/jerryscript/issues/5071
1,674,723,917
5,071
CVE-2023-31916
2023-05-12T14:15:09.847
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5062
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5062/comments
0
2023-04-06T13:12:15Z
2024-11-22T09:13:35Z
https://github.com/jerryscript-project/jerryscript/issues/5062
1,657,404,755
5,062
CVE-2023-31918
2023-05-12T14:15:09.890
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5064
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/1a2c04763aba49f52b1537acd3730098c873511c Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32...
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5064/comments
0
2023-04-06T14:02:51Z
2023-04-06T14:02:51Z
https://github.com/jerryscript-project/jerryscript/issues/5064
1,657,488,796
5,064
CVE-2023-31919
2023-05-12T14:15:09.927
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5069
[ "Exploit", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion '!jcontext_has_pending_exception ()' failed at /jerryscript/jerry-core/jcontext/jcontext.c(jcontext_raise_exception):88.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5069/comments
0
2023-04-16T13:13:26Z
2024-11-22T09:21:07Z
https://github.com/jerryscript-project/jerryscript/issues/5069
1,669,965,859
5,069
CVE-2023-31920
2023-05-12T14:15:09.963
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/5070
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: 05dbbd13[](05dbbd134c3b9e2482998f267857dd3722001cd7) Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-poi...
Assertion 'ecma_find_named_property (func_obj_p, ecma_get_magic_string (LIT_MAGIC_STRING_NAME)) == NULL' failed at /jerryscript/jerry-core/vm/vm.c(vm_loop):2173.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5070/comments
0
2023-04-19T03:29:02Z
2024-11-22T09:26:01Z
https://github.com/jerryscript-project/jerryscript/issues/5070
1,674,113,082
5,070