ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NuGet | GHSA-fm9p-5m9f-rq85 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20... | {'CVE-2019-0915'} | 2022-03-03T05:13:09.041076Z | 2021-03-29T21:00:03Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'} |
NuGet | GHSA-h23m-w6x5-jwr4 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0923'} | 2022-03-03T05:14:08.577126Z | 2021-03-29T21:00:08Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'} |
NuGet | GHSA-prxj-c66c-4gcf | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0924'} | 2022-03-03T05:12:53.230422Z | 2021-03-29T21:00:12Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null | {'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f'} |
NuGet | GHSA-6r92-cgxc-r5fg | Denial of service in CBOR library | ### Impact
Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.
Affected versions _include_ versions 4.0.0 through 4.5.0.
This vulnerability was privately... | null | 2022-03-03T05:12:53.419938Z | 2022-01-21T23:35:35Z | HIGH | null | {'CWE-407'} | {'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1', 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95', 'https://github.com/peteroupc/CBOR'} | null | {'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'} | {'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'} |
NuGet | GHSA-v89p-5hr2-4rh4 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196. | {'CVE-2019-1197'} | 2022-03-03T05:12:53.493944Z | 2021-03-29T20:56:15Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null | {'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-5q7q-qqw2-hjq7 | Cross-Site Scripting in AjaxNetProfessional | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects.
### Description
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and t... | {'CVE-2021-43853'} | 2022-03-03T05:13:21.805430Z | 2022-01-06T18:32:24Z | HIGH | null | {'CWE-79'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43853', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7', 'https://github.com/michaelschwarz/Ajax.NET-Professional/relea... | null | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b'} |
NuGet | GHSA-8gvg-8vhf-h26g | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0937'} | 2022-03-03T05:12:59.188688Z | 2021-03-29T20:59:03Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null | {'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} |
NuGet | GHSA-rx34-jff5-ph35 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-20... | {'CVE-2019-0917'} | 2022-03-03T05:13:15.368520Z | 2021-03-29T21:00:06Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'} |
NuGet | GHSA-6r7c-6w96-8pvw | Remote Code Execution in AjaxNetProfessional | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
### Description
Serialization is a process of converting an object into a sequence of bytes which ... | null | 2022-03-03T05:11:30.895768Z | 2021-12-07T21:21:49Z | CRITICAL | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', ... | null | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} |
NuGet | GHSA-jvjp-vh27-r9h5 | Cross-site Scripting in PiranhaCMS | In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution. | {'CVE-2021-25977'} | 2022-03-03T05:14:07.242632Z | 2021-10-27T18:53:03Z | MODERATE | null | {'CWE-79'} | {'https://github.com/PiranhaCMS/piranha.core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977', 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'} | null | {'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'} | {'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'} |
NuGet | GHSA-mw7r-3g6w-85qg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1131'} | 2022-03-03T05:12:46.071533Z | 2021-03-29T20:57:46Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null | {'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-2rfj-2mwp-787v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-20... | {'CVE-2019-0993'} | 2022-03-03T05:11:34.130533Z | 2021-03-29T20:57:51Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0993', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'} |
NuGet | GHSA-pwpr-vp2v-99xw | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1138'} | 2022-03-03T05:13:05.852214Z | 2021-03-29T20:56:11Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1138', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1138'} | null | {'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046'} |
NuGet | GHSA-q99r-j969-6jwr | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1237'} | 2022-03-03T05:13:44.392146Z | 2021-03-29T20:56:04Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045'} | null | {'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045'} |
NuGet | GHSA-vw2g-5827-m9fp | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366. | {'CVE-2019-1308'} | 2022-03-03T05:12:56.773266Z | 2021-03-29T20:55:52Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'} | {'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
NuGet | GHSA-9824-rp6m-xx9w | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-20... | {'CVE-2019-0989'} | 2022-03-03T05:13:01.401560Z | 2021-03-29T20:59:04Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'} |
NuGet | GHSA-9475-xg6m-j7pw | Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET | ### Impact
Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved.
The Sus... | {'CVE-2020-5268'} | 2022-03-03T05:12:52.477872Z | 2020-04-22T20:59:37Z | MODERATE | null | {'CWE-303'} | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241', 'https://github.com/Sustainsys/Saml2/issues/712', 'https://www.nuget.org/packages/Sustainsys.Saml2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw'} | null | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} |
NuGet | GHSA-874w-m2v2-mj64 | Double Free in Adplug | AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h. | {'CVE-2019-15151'} | 2022-03-03T05:13:08.121515Z | 2021-03-29T20:48:45Z | CRITICAL | null | {'CWE-415'} | {'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e', 'https://githu... | null | {'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'} | {'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'} |
NuGet | GHSA-m22m-h4rf-pwq3 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3. | {'CVE-2021-32840'} | 2022-03-03T05:13:40.088268Z | 2022-02-01T16:22:50Z | HIGH | null | {'CWE-22'} | {'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32840', 'https://github.com/icsharpcode/SharpZipLib', 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc... | null | {'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'} | {'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'} |
NuGet | GHSA-xpwp-rq3x-x6v7 | Critical severity vulnerability that affects recurly-api-client | The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources. | {'CVE-2017-0907'} | 2022-03-03T05:12:43.938941Z | 2018-10-16T17:35:04Z | CRITICAL | null | {'CWE-918'} | {'https://hackerone.com/reports/288635', 'https://dev.recurly.com/page/net-updates', 'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7', 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907'} | null | {'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'} | {'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'} |
NuGet | GHSA-grvw-q343-58wh | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298. | {'CVE-2019-1300'} | 2022-03-03T05:13:58.668379Z | 2021-03-29T20:55:57Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'} | null | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'} |
NuGet | GHSA-v5rv-hpxg-8x49 | Signature validation bypass in ServiceStack | ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature. | {'CVE-2020-28042'} | 2022-03-03T05:13:06.294605Z | 2021-01-13T19:13:11Z | MODERATE | null | {'CWE-347'} | {'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/', 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585... | null | {'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'} | {'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'} |
NuGet | GHSA-5rcr-q3rx-j7vr | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106. | {'CVE-2019-1107'} | 2022-03-03T05:13:46.158859Z | 2021-03-29T20:57:35Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} |
NuGet | GHSA-hrmm-f4j8-8vxc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-20... | {'CVE-2019-0922'} | 2022-03-03T05:14:02.985181Z | 2021-03-29T21:00:11Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'} |
NuGet | GHSA-6j89-jhpr-849f | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366. | {'CVE-2019-1307'} | 2022-03-03T05:13:12.777814Z | 2021-03-29T20:55:46Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b'} | {'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
NuGet | GHSA-ppxc-pmx9-qjv9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1195'} | 2022-03-03T05:12:39.713478Z | 2021-03-29T20:57:59Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null | {'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-7q36-4xx7-xcxf | Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack | ### Impact
When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors:
1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized.
1. stack overflow - leading to the d... | {'CVE-2020-5234'} | 2022-03-03T05:13:22.194363Z | 2020-01-31T17:59:20Z | MODERATE | null | {'CWE-121'} | {'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34... | null | {'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'} | {'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007'} |
NuGet | GHSA-7423-5qfm-g648 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-20... | {'CVE-2019-0916'} | 2022-03-03T05:13:45.933184Z | 2021-03-29T21:00:09Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'} |
NuGet | GHSA-2x7h-96h5-rq84 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is po... | {'CVE-2021-32841'} | 2022-03-03T05:13:28.356898Z | 2022-02-01T16:22:57Z | MODERATE | null | {'CWE-22'} | {'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/icsharpcode/SharpZipLib', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b... | null | {'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'} | {'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'} |
NuGet | GHSA-g8j6-m4p7-5rfq | High severity vulnerability that affects DotNetNuke.Core | DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources. | {'CVE-2017-0929'} | 2022-03-03T05:13:02.306663Z | 2018-10-16T17:18:12Z | HIGH | null | {'CWE-918'} | {'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3', 'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq', 'https://github.com/dnnsoftware/Dnn.Platform', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0929'} | null | {'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'} | {'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'} |
NuGet | GHSA-rh4p-g7x6-8pqg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1062'} | 2022-03-03T05:13:18.764715Z | 2021-03-29T20:59:09Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1062', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'} |
NuGet | GHSA-9qw8-ccq9-ffj9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1139'} | 2022-03-03T05:14:02.943957Z | 2021-03-29T20:57:53Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139'} | null | {'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-w89r-qch4-8jv5 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20... | {'CVE-2019-0912'} | 2022-03-03T05:13:37.247605Z | 2021-03-29T20:59:59Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'} |
NuGet | GHSA-2x75-mf24-588m | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1092'} | 2022-03-03T05:14:00.642186Z | 2021-03-29T20:59:11Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1092', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} |
NuGet | GHSA-2452-3rwv-x89c | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300. | {'CVE-2019-1298'} | 2022-03-03T05:13:43.259043Z | 2021-03-29T20:56:01Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298'} | null | {'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782'} |
NuGet | GHSA-hfvc-g252-rp4g | Denial of Service in i18n | This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | {'CVE-2020-7791'} | 2022-03-03T05:14:11.849809Z | 2020-12-14T19:50:22Z | MODERATE | null | {'CWE-400', 'CWE-20'} | {'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://sn... | null | {'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'} | {'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'} |
NuGet | GHSA-6w5m-jgc5-8cgc | orchardcore is vulnerable to Cross-site Scripting | orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0159'} | 2022-03-03T05:14:13.613996Z | 2022-01-21T23:57:49Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://github.com/orchardcms/orchardcore'} | null | {'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} | {'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} |
NuGet | GHSA-2wwc-w2gw-4329 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335. | {'CVE-2019-1366'} | 2022-03-03T05:13:27.978381Z | 2021-03-29T20:55:36Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf'} | {'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
NuGet | GHSA-rqrc-8q8f-cp9c | Infinite loop in .Net Bond | A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads. | {'CVE-2020-1469'} | 2022-04-08T18:34:02.348210Z | 2022-04-08T18:11:51Z | HIGH | null | {'CWE-434', 'CWE-835'} | {'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469', 'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469', 'https://github.com/microsoft/bond/commit/3... | null | {'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'} | {'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'} |
NuGet | GHSA-7378-6268-4278 | High severity vulnerability that affects DotNetZip | DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | {'CVE-2018-1002205'} | 2022-03-03T05:13:57.586333Z | 2018-10-16T17:16:40Z | HIGH | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/re... | null | {'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'} | {'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'} |
NuGet | GHSA-pjxv-w3qj-j8m3 | Directory Traversal in elFinder.AspNet | This affects the package elFinder.AspNet before 1.1.1.
The user-controlled file name is not properly sanitized before it is used to create a file system path.
| {'CVE-2021-23415'} | 2022-03-03T05:13:27.755638Z | 2021-08-09T20:42:13Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720', 'https://github.com/mguinness/elFinder.AspNet'} | null | {'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'} | {'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'} |
NuGet | GHSA-mjww-934m-h4jw | Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua | A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates. | {'CVE-2020-29457'} | 2022-03-03T05:13:00.413150Z | 2021-11-19T20:19:53Z | MODERATE | null | {'CWE-295'} | {'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25', 'https://github.com/OPCFoundation/UA-.N... | null | {'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'} | {'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'} |
NuGet | GHSA-53r4-h27g-rg3x | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-20... | {'CVE-2019-0992'} | 2022-03-03T05:12:36.945087Z | 2021-03-29T20:59:07Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0992'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'} |
NuGet | GHSA-fxh6-w476-hgr4 | Directory Traversal in SharpCompress | SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction. | {'CVE-2018-1002206'} | 2022-03-03T05:13:37.184703Z | 2019-09-11T22:59:57Z | MODERATE | null | {'CWE-22'} | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'} | null | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'} | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'} |
NuGet | GHSA-mvvp-gwgc-5hrp | Path Traversal in elFinder.Net.Core | This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path. | {'CVE-2021-23407'} | 2022-03-03T05:13:33.232451Z | 2021-08-02T17:30:27Z | HIGH | null | {'CWE-22'} | {'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://github.com/trannamtrung1st/elFinder.Net.Core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://github.com/trannamtrung1st/elFinder.Net... | null | {'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'} | {'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'} |
OSS-Fuzz | OSV-2021-1168 | Heap-buffer-overflow in exif_get_slong | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
exif_get_slong
exif_get_long
exif_get_rational
```
| null | 2022-04-13T03:04:40.883862Z | 2021-08-25T00:01:25.325827Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570', 'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'} | {'https://github.com/libexif/libexif/commit/ce946b93dfd34b2187d9f9fb01603943fbb32137'} | {'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'} | {'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'} |
OSS-Fuzz | OSV-2021-386 | Stack-buffer-overflow in ot::Coap::Message::AppendUintOption | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831
```
Crash type: Stack-buffer-overflow READ 1
Crash state:
ot::Coap::Message::AppendUintOption
ot::Coap::Message::AppendBlockOption
otCoapMessageAppendBlock2Option
```
| null | 2022-04-13T03:04:38.946438Z | 2021-02-13T00:00:59.547439Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831', 'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'} | {'https://github.com/openthread/openthread/commit/2cd36266abaaf8b79ebb0441e6ed2ec3847cf3ca'} | {'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'} | {'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'} |
OSS-Fuzz | OSV-2020-386 | Heap-buffer-overflow in OPENSSL_strlcpy | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
OPENSSL_strlcpy
OPENSSL_strlcat
ERR_add_error_vdata
```
| null | 2022-04-13T03:04:38.742191Z | 2020-07-01T00:00:06.528477Z | HIGH | null | null | {'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107'} | {'https://github.com/openssl/openssl/commit/10f8b36874fca928c3f41834babac8ee94dd3f09'} | {'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'} | {'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'} |
OSS-Fuzz | OSV-2017-39 | Use-of-uninitialized-value in IsRelativeSymlinkSafe | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308
```
Crash type: Use-of-uninitialized-value
Crash state:
IsRelativeSymlinkSafe
ExtractUnixLink30
ExtractSymlink
```
| null | 2022-04-13T03:04:35.323958Z | 2021-01-13T21:56:03.501889Z | MEDIUM | null | null | {'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308'} | {'https://github.com/aawc/unrar/commit/d2e5341ebf6f34c9bd5939c3ac812cb2cd983081'} | {'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987'} | {'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987'} |
OSS-Fuzz | OSV-2020-2076 | Use-of-uninitialized-value in UpdateDecStatNoFreezingInfo | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346
```
Crash type: Use-of-uninitialized-value
Crash state:
UpdateDecStatNoFreezingInfo
UpdateDecStat
WelsDec::DecodeFrameConstruction
```
| null | 2022-04-13T03:04:37.372384Z | 2020-10-16T00:00:42.366443Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346', 'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'} | {'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} | {'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'} | {'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'} |
OSS-Fuzz | OSV-2020-369 | UNKNOWN READ in ot::TimerScheduler::Remove | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383
```
Crash type: UNKNOWN READ
Crash state:
ot::TimerScheduler::Remove
ot::Mle::Mle::Stop
otThreadSetEnabled
```
| null | 2022-04-13T03:04:38.951596Z | 2020-07-01T00:00:05.571696Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383', 'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'} | {'https://github.com/openthread/openthread/commit/3eb5a106ffa6678e23c6bc244e843e264cae9b31'} | {'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'} | {'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'} |
OSS-Fuzz | OSV-2020-693 | Heap-buffer-overflow in parse_sec_attr_44 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
parse_sec_attr_44
setcos_select_file
sc_select_file
```
| null | 2022-04-13T03:04:41.597761Z | 2020-07-01T00:00:25.178023Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798', 'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'} | {'https://github.com/OpenSC/OpenSC/commit/7a1e42e1352201127d1a97b6cb5f41e48cace0f5'} | {'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'} | {'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'} |
OSS-Fuzz | OSV-2020-2099 | Heap-buffer-overflow in decode_chars | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
decode_chars
decode_font
process_text
```
| null | 2022-04-13T03:04:30.610125Z | 2020-10-28T00:00:05.887987Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674', 'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'} | {'https://github.com/libass/libass/commit/910211f1c0078e37546f73e95306724358b89be2'} | {'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'} | {'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'} |
OSS-Fuzz | OSV-2020-2133 | Heap-buffer-overflow in tdefl_compress_lz_codes | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263
```
Crash type: Heap-buffer-overflow WRITE 8
Crash state:
tdefl_compress_lz_codes
tdefl_compress_block
tdefl_flush_block
```
| null | 2022-04-13T03:29:21.391124Z | 2020-11-08T00:00:05.283717Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263', 'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'} | {'https://github.com/fluent/fluent-bit//commit/03ff96d82f5f51a8bea6981fc9d7e8c3429c50b1', 'https://github.com/fluent/fluent-bit//commit/7a588237fdb744e5825fb119753dcad2e8878866'} | {'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'} | {'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'} |
OSS-Fuzz | OSV-2020-739 | UNKNOWN READ in str_decref | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756
```
Crash type: UNKNOWN READ
Crash state:
str_decref
obj_free
mrb_gc_destroy
```
| null | 2022-04-13T03:04:39.688080Z | 2020-07-01T00:00:27.971876Z | MEDIUM | null | null | {'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756'} | {'https://github.com/mruby/mruby/commit/caba5fef274ab7df91b7247182ecbf2483b853b8'} | {'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2'} | {'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2'} |
OSS-Fuzz | OSV-2021-369 | Segv on unknown address in blosc_read_header | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761
```
Crash type: Segv on unknown address
Crash state:
blosc_read_header
blosc2_getitem_ctx
blosc_getitem
```
| null | 2022-04-13T03:04:40.205415Z | 2021-02-11T00:01:00.831869Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761', 'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'} | {'https://github.com/Blosc/c-blosc2/commit/57fca38a4f51687d71e451ae29df6b353764fb72'} | {'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'} | {'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'} |
OSS-Fuzz | OSV-2021-739 | Stack-buffer-overflow in flb_sds_cat | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025
```
Crash type: Stack-buffer-overflow READ {*}
Crash state:
flb_sds_cat
flb_ra_translate
record_ac_fuzzer.c
```
| null | 2022-04-13T03:04:38.249988Z | 2021-05-08T00:01:15.452663Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57', 'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c'} | {'https://github.com/fluent/fluent-bit//commit/68746b76af8b143daf477033a6799902be2f3cad'} | {'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57'} | {'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57'} |
OSS-Fuzz | OSV-2020-410 | Global-buffer-overflow in lex_multiline_string | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455
Crash type: Global-buffer-overflow READ 1
Crash state:
lex_multiline_string
lex_next
parse_config
| null | 2021-03-09T04:49:05.872972Z | 2020-07-01T00:00:07.995615Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455', 'git://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'} | {'git://github.com/lpereira/lwan/commit/c9ac13203b6685d3bf89ab6d257b37dd6b0d5833'} | {'https://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'} | {'https://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'} |
OSS-Fuzz | OSV-2020-1965 | UNKNOWN READ in asn1_item_print_ctx | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920
```
Crash type: UNKNOWN READ
Crash state:
asn1_item_print_ctx
asn1_template_print_ctx
asn1_item_print_ctx
```
| null | 2022-04-13T03:04:38.790305Z | 2020-10-03T00:00:22.855250Z | MEDIUM | null | null | {'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920'} | {'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'} | {'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'} | {'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'} |
OSS-Fuzz | OSV-2020-943 | Heap-buffer-overflow in pcpp::HeaderField::HeaderField | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
pcpp::HeaderField::HeaderField
pcpp::TextBasedProtocolMessage::parseFields
pcpp::SipResponseLayer::SipResponseLayer
```
| null | 2022-04-13T03:04:38.590838Z | 2020-07-22T00:00:21.373584Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528', 'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'} | {'https://github.com/seladb/PcapPlusPlus/commit/4366d2f86bf105025765a0ce3db6e647ba0f3508'} | {'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'} | {'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'} |
OSS-Fuzz | OSV-2020-1066 | Heap-buffer-overflow in dav1dFeedData | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
dav1dFeedData
dav1dCodecGetNextImage
avifDecoderNextImage
```
| null | 2022-04-13T03:34:31.037013Z | 2020-07-22T21:49:44.588962Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947', 'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1'} | {'https://github.com/AOMediaCodec/libavif/commit/4be7ce1dd3f0a45cd2555c94bd76a8f40baabcc4'} | {'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1', 'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be'} | {'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1'} |
OSS-Fuzz | OSV-2018-143 | Global-buffer-overflow in CFF::BlendArg::set_blends | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714
```
Crash type: Global-buffer-overflow READ 8
Crash state:
CFF::BlendArg::set_blends
CFF::CFF2CSOpSet<CFF2CSOpSet_SubrSubset, CFF::SubrSubsetParam, CFF::PathProcsNul
CFF2CSOpSet_SubrSubset::process_op
```
| null | 2022-04-13T03:35:31.377146Z | 2021-01-13T00:01:01.540340Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714', 'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'} | {'https://github.com/harfbuzz/harfbuzz/commit/0996c0ff6279f377e2b14f08663df2ce82de2b14'} | {'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'} | {'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'} |
OSS-Fuzz | OSV-2021-555 | Uncaught exception in java.base/java.util.concurrent.ConcurrentHashMap.putVal | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395
```
Crash type: Uncaught exception
Crash state:
java.base/java.util.concurrent.ConcurrentHashMap.putVal
java.base/java.util.concurrent.ConcurrentHashMap.put
com.fasterxml.jackson.core.util.InternCache.intern
```
| null | 2022-04-13T03:04:31.802020Z | 2021-03-25T00:00:09.158172Z | LOW | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501', 'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd'} | {'https://github.com/FasterXML/jackson-core/commit/2bd85ebcdd94233d9e59a0833f29e06ce4281f3b'} | {'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501'} | {'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501'} |
OSS-Fuzz | OSV-2020-1573 | Use-of-uninitialized-value in void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633
```
Crash type: Use-of-uninitialized-value
Crash state:
void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop
ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig
ArduinoJsonNUMBER_71::Js... | null | 2022-04-13T03:04:39.357700Z | 2020-08-04T00:00:11.334079Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633', 'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'} | {'https://github.com/bblanchon/ArduinoJson/commit/298864bafe080e6a0a42185445b278be92820110'} | {'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'} | {'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'} |
OSS-Fuzz | OSV-2020-806 | Segv on unknown address in process_ndpi_collected_info | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122
```
Crash type: Segv on unknown address
Crash state:
process_ndpi_collected_info
packet_processing
ndpi_workflow_process_packet
```
| null | 2022-04-13T03:04:35.988021Z | 2020-07-14T05:37:42.995133Z | null | null | null | {'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122'} | {'https://github.com/ntop/nDPI/commit/4a09b4efa053a26e187119a540da4b41dd8a24d8'} | {'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'} | {'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'} |
OSS-Fuzz | OSV-2020-1123 | Index-out-of-bounds in store_reg_arm | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026
```
Crash type: Index-out-of-bounds
Crash state:
store_reg_arm
gen_load_exclusive_arm
disas_arm_insn_arm
```
| null | 2022-04-13T03:04:39.220642Z | 2020-07-22T21:49:48.909471Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026', 'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'} | {'https://github.com/unicorn-engine/unicorn/commit/46999575fb9e82ccd925e835d0d7db47200e010d'} | {'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'} | {'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'} |
OSS-Fuzz | OSV-2020-63 | UNKNOWN READ in arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20697
```
Crash type: UNKNOWN READ
Crash state:
arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend
parquet::PlainByteArrayDecoder::DecodeArrowDense
parquet::PlainByteArrayDecoder::DecodeArrow
```
| null | 2022-04-13T03:04:31.882807Z | 2020-06-24T01:51:12.364400Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20697', 'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} |
OSS-Fuzz | OSV-2020-555 | Heap-use-after-free in WelsDec::CWelsDecoder::SetOption | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18747
```
Crash type: Heap-use-after-free WRITE 1
Crash state:
WelsDec::CWelsDecoder::SetOption
decoder_fuzzer.cpp
WelsCommon::WelsFree
```
| null | 2022-04-13T03:04:37.579466Z | 2020-07-01T00:00:16.726929Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18747', 'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'} | {'https://github.com/cisco/openh264/commit/2091de60c6a235a3236475d2208139f6a8862f48'} | {'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'} | {'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'} |
OSS-Fuzz | OSV-2020-105 | Segv on unknown address in cbor_typeof | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21387
```
Crash type: Segv on unknown address
Crash state:
cbor_typeof
_cbor_nested_describe
_cbor_nested_describe
```
| null | 2022-04-13T03:04:41.481665Z | 2020-06-24T01:51:14.307336Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21387', 'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'} | {'https://github.com/PJK/libcbor/commit/6e6050e9ca2a898de1c6b0f3babadb745b5047da'} | {'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'} | {'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'} |
OSS-Fuzz | OSV-2020-1820 | Stack-buffer-overflow in hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25815
```
Crash type: Stack-buffer-overflow READ 2
Crash state:
hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha
hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha
hermes::regex::Parser<... | null | 2022-04-13T03:04:31.093016Z | 2020-09-21T00:00:18.040780Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25815', 'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'} | {'https://github.com/facebook/hermes/commit/58f7c31e9da3ac8cdf894307080929fa93648870'} | {'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'} | {'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'} |
OSS-Fuzz | OSV-2020-781 | Heap-buffer-overflow in __libcpp_memchr | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23328
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
__libcpp_memchr
memchr
pcpp::HeaderField::HeaderField
```
| null | 2022-04-13T03:04:38.663249Z | 2020-07-14T05:37:32.830824Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23328', 'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'} | {'https://github.com/seladb/PcapPlusPlus/commit/aeaa2e1cd094ff2083517bf4c987dc3a1380ec71'} | {'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'} | {'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'} |
OSS-Fuzz | OSV-2021-1353 | Heap-buffer-overflow in MqttClient_DecodePacket | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39056
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
MqttClient_DecodePacket
MqttClient_WaitType
MqttClient_Unsubscribe
```
| null | 2022-04-13T03:04:34.005024Z | 2021-09-22T00:01:32.692141Z | HIGH | null | null | {'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39056'} | {'https://github.com/wolfSSL/wolfMQTT/commit/237f693c5731dcbd6adc9de69d9f575421c4414e'} | {'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2'} | {'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2'} |
OSS-Fuzz | OSV-2018-114 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10933
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
BEInt<unsigned int, 4>::operator unsigned int
OT::OffsetTo<OT::UnsizedArrayOf<OT::IntType<short, 2u> >, OT::IntType<unsigned i
AAT::KerxSubTableFormat2::get_kerning
```
| null | 2022-04-13T03:04:33.142061Z | 2021-01-13T00:00:52.786317Z | MEDIUM | null | null | {'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10933'} | {'https://github.com/harfbuzz/harfbuzz/commit/c9165f5450b99e6d93e2a168b198384a221eef58'} | {'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42'} | {'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42'} |
OSS-Fuzz | OSV-2021-447 | Heap-buffer-overflow in luaG_runerror | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31331
```
Crash type: Heap-buffer-overflow READ 8
Crash state:
luaG_runerror
luaD_pretailcall
luaV_execute
```
| null | 2022-04-13T03:36:53.712818Z | 2021-02-25T00:02:41.560298Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31331', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979', 'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6'} | {'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6'} | {'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979'} | {'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979'} |
OSS-Fuzz | OSV-2021-914 | UNKNOWN READ in mrb_vm_ci_env | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35718
```
Crash type: UNKNOWN READ
Crash state:
mrb_vm_ci_env
cipop
mrb_vm_exec
```
| null | 2022-04-13T03:04:39.759907Z | 2021-07-03T00:01:26.278614Z | MEDIUM | null | null | {'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35718'} | {'https://github.com/mruby/mruby/commit/99dbcec89c892bc90f36fbf38e46a9ec971e3a77'} | {'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4'} | {'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4'} |
OSS-Fuzz | OSV-2020-1898 | Heap-buffer-overflow in WelsDec::UpdateP16x16RefIdx | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26078
```
Crash type: Heap-buffer-overflow WRITE 2
Crash state:
WelsDec::UpdateP16x16RefIdx
WelsDec::PredBDirectTemporal
WelsDec::ParseInterBInfo
```
| null | 2022-04-13T03:04:37.589868Z | 2020-10-02T00:00:14.116993Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26078', 'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} | {'https://github.com/cisco/openh264/commit/66ef706acd55b0b8daec32ca299d2586a1f473c9'} | {'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} | {'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} |
OSS-Fuzz | OSV-2020-447 | UNKNOWN READ in yyparse | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17968
```
Crash type: UNKNOWN READ
Crash state:
yyparse
mrb_parser_parse
mrb_parse_nstring
```
| null | 2022-04-13T03:04:39.703625Z | 2020-07-01T00:00:10.057682Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17968', 'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'} | {'https://github.com/mruby/mruby/commit/ec6c8b2a3c5c499d8832ef82a2ad941cbac4a80a'} | {'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'} | {'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'} |
OSS-Fuzz | OSV-2020-502 | Heap-use-after-free in WelsDec::SetUnRef | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18644
```
Crash type: Heap-use-after-free WRITE 1
Crash state:
WelsDec::SetUnRef
WelsDec::WelsResetRefPic
WelsFreeDynamicMemory
```
| null | 2022-04-13T03:04:37.542309Z | 2020-07-01T00:00:13.377454Z | HIGH | null | null | {'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18644'} | {'https://github.com/cisco/openh264/commit/c185ac351eff0ae277bfe14a3b2ad52e9ed8ab81'} | {'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec'} | {'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec'} |
OSS-Fuzz | OSV-2020-34 | UNKNOWN READ in parquet::LevelDecoder::SetData | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20666
```
Crash type: UNKNOWN READ
Crash state:
parquet::LevelDecoder::SetData
parquet::ColumnReaderImplBase<parquet::PhysicalType<
parquet::ColumnReaderImplBase<parquet::PhysicalType<
```
| null | 2022-04-13T03:04:32.024330Z | 2020-06-24T01:51:11.146400Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20666', 'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} |
OSS-Fuzz | OSV-2021-152 | Stack-buffer-overflow in ot::NetworkData::ServerTlv::GetServer16 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5878
```
Crash type: Stack-buffer-overflow READ 2
Crash state:
ot::NetworkData::ServerTlv::GetServer16
ot::NetworkData::Leader::RlocLookup
ot::NetworkData::Leader::RegisterNetworkData
```
| null | 2022-04-13T03:04:38.987900Z | 2021-01-13T21:56:33.613485Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5878', 'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'} | {'https://github.com/openthread/openthread/commit/9190aa21c4b3983c05aad6be8fd5d62942b8cbd8'} | {'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'} | {'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'} |
OSS-Fuzz | OSV-2021-1216 | Global-buffer-overflow in fr_is_base16_nstd | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38283
```
Crash type: Global-buffer-overflow READ 1
Crash state:
fr_is_base16_nstd
fr_base16_decode_nstd
fr_value_box_from_str
```
| null | 2022-04-13T03:04:40.152583Z | 2021-09-10T00:00:35.488094Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38283', 'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'} | {'https://github.com/FreeRADIUS/freeradius-server/commit/6c6878ce4cdc5ac58e5115553656e05c9695544e'} | {'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'} | {'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'} |
OSS-Fuzz | OSV-2021-1646 | Heap-buffer-overflow in uncompress_b44_impl | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41625
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
uncompress_b44_impl
default_decompress_chunk
exr_decoding_run
```
| null | 2022-04-13T03:21:51.316157Z | 2021-12-04T00:01:33.435462Z | MEDIUM | null | null | {'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41625', 'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06'} | {'https://github.com/AcademySoftwareFoundation/openexr/commit/40eb606dc5e8b04b7634f8a4a15f44b4e2044191', 'https://github.com/AcademySoftwareFoundation/openexr/commit/57b05e055c7065ac5873f64e42350449be1eccb8'} | {'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95', 'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06'} | {'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06', 'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95'} |
OSS-Fuzz | OSV-2022-321 | Stack-use-after-scope in std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<g | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46468
```
Crash type: Stack-use-after-scope WRITE 1
Crash state:
std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<g
tf::Executor::_invoke
tf::Executor::_consume_task
```
| null | 2022-04-13T03:04:39.574474Z | 2022-04-09T00:00:21.286205Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46468', 'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'} | {'https://github.com/GrokImageCompression/grok/commit/a27b85d5d31dc6da58aa8af859e63448a6384150'} | {'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'} | {'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'} |
OSS-Fuzz | OSV-2021-1083 | Heap-buffer-overflow in flb_hash_get_by_id | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36718
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
flb_hash_get_by_id
utils_fuzzer.c
```
| null | 2022-04-13T03:38:50.195219Z | 2021-08-01T00:00:59.162586Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36718', 'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'} | {'https://github.com/fluent/fluent-bit//commit/10ceb5b2ab6635a000f3eceaa267e1e34496de6b'} | {'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'} | {'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'} |
OSS-Fuzz | OSV-2020-797 | Use-of-uninitialized-value in MipsAsmParser::isPicAndNotNxxAbi | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22778
```
Crash type: Use-of-uninitialized-value
Crash state:
MipsAsmParser::isPicAndNotNxxAbi
MipsAsmParser::processInstruction
MipsAsmParser::MatchAndEmitInstruction
```
| null | 2022-04-13T03:04:37.905755Z | 2020-07-14T05:37:37.559643Z | MEDIUM | null | null | {'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22778'} | {'https://github.com/keystone-engine/keystone/commit/d49b6fa4013efb919d434bfd439311d6cb67a0f7'} | {'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871'} | {'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871'} |
OSS-Fuzz | OSV-2017-78 | Negative-size-param in UA_SecureChannel_processChunk | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3609
```
Crash type: Negative-size-param
Crash state:
UA_SecureChannel_processChunk
processCompleteChunk
UA_Connection_processChunks
```
| null | 2022-04-13T03:04:41.415024Z | 2021-01-13T21:57:35.111717Z | null | null | null | {'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3609'} | {'https://github.com/open62541/open62541/commit/84d46ddefe21c7eb5f678a5046fa200ac1b4e617'} | {'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b'} | {'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b'} |
OSS-Fuzz | OSV-2020-328 | UNKNOWN READ in dotnet_parse_tilde_2 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16448
```
Crash type: UNKNOWN READ
Crash state:
dotnet_parse_tilde_2
dotnet_parse_tilde
dotnet_parse_com
```
| null | 2022-04-13T03:25:20.410918Z | 2020-07-01T00:00:03.116576Z | MEDIUM | null | null | {'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc', 'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16448'} | {'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'} | {'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc'} | {'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc'} |
OSS-Fuzz | OSV-2017-97 | Use-after-poison in rawspeed::unroll_loop_t<void rawspeed::LJpegDecompressor::decodeN<4> | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4451
```
Crash type: Use-after-poison WRITE 2
Crash state:
rawspeed::unroll_loop_t<void rawspeed::LJpegDecompressor::decodeN<4>
void rawspeed::LJpegDecompressor::decodeN<4>
rawspeed::AbstractLJpegDecompressor::decode
```
| null | 2022-04-13T03:04:36.488088Z | 2021-01-13T21:57:40.779998Z | HIGH | null | null | {'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4451'} | {'https://github.com/darktable-org/rawspeed/commit/45e6fd6c608326ae7df6419c62cc8db6a2f15281'} | {'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09'} | {'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09'} |
OSS-Fuzz | OSV-2022-264 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessRow | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=45822
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
jxl::N_AVX2::BlendingStage::ProcessRow
jxl::LowMemoryRenderPipeline::RenderRect
jxl::LowMemoryRenderPipeline::ProcessBuffers
```
| null | 2022-04-13T03:04:38.130266Z | 2022-03-21T00:00:16.278407Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=45822', 'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} | {'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} | {'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} | {'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} |
OSS-Fuzz | OSV-2021-282 | Heap-buffer-overflow in LibRaw_buffer_datastream::read | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30324
```
Crash type: Heap-buffer-overflow WRITE {*}
Crash state:
LibRaw_buffer_datastream::read
LibRaw::uncompressed_fp_dng_load_raw
LibRaw::unpack
```
| null | 2022-04-13T03:04:39.979494Z | 2021-02-06T00:00:24.519678Z | HIGH | null | null | {'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30324'} | {'https://github.com/libraw/libraw/commit/4c954948ba2de262b9cb23a1843fb8651aa3dcc1'} | {'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e'} | {'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e'} |
OSS-Fuzz | OSV-2021-778 | UNKNOWN READ in helper_uc_tracecode | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34457
Crash type: UNKNOWN READ
Crash state:
helper_uc_tracecode
| null | 2021-05-20T00:01:16.313394Z | 2021-05-20T00:01:16.313104Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34457', 'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'} | {'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'} | {'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'} | {'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'} |
OSS-Fuzz | OSV-2021-902 | Heap-buffer-overflow in ebitmap_match_any | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35553
```
Crash type: Heap-buffer-overflow READ 8
Crash state:
ebitmap_match_any
avtab_map
cil_check_neverallow
```
| null | 2022-04-13T03:04:42.344343Z | 2021-06-27T00:01:23.702334Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35553', 'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'} | {'https://github.com/SELinuxProject/selinux/commit/37863b0b1444c85a1ddc6c333c8bfea0c678c592'} | {'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'} | {'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'} |
OSS-Fuzz | OSV-2018-102 | Heap-buffer-overflow in r_read_le32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11303
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
r_read_le32
r_bin_file_get_strings
r_bin_object_set_items
```
| null | 2022-04-13T03:04:36.594467Z | 2021-01-13T00:00:44.549063Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11303', 'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a', 'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3'} | {'https://github.com/radare/radare2/commit/d8269a9e2bacbcfbd76fac63b461cea523460d7c'} | {'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a', 'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3'} | {'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3', 'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a'} |
OSS-Fuzz | OSV-2021-514 | UNKNOWN READ in _fini | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31953
```
Crash type: UNKNOWN READ
Crash state:
_fini
```
| null | 2022-04-13T03:04:32.242907Z | 2021-03-12T00:00:13.850530Z | MEDIUM | null | null | {'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31953'} | {'https://github.com/SerenityOS/serenity/commit/51b880b0383089822f513330cd64f93b54b9f21c'} | {'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0'} | {'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0'} |
OSS-Fuzz | OSV-2018-417 | UNKNOWN READ in boost::sub_match<std::__1::__wrap_iter<char const*> >::sub_match | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9539
```
Crash type: UNKNOWN READ
Crash state:
boost::sub_match<std::__1::__wrap_iter<char const*> >::sub_match
_ZNSt3__16vectorIN5boost9sub_matchINS_11__wrap_iterIPKcEEEENS_9allocatorIS7_EEE1
boost::match_results<std::__1::__wrap_iter<char const*>... | null | 2022-04-13T03:04:40.905295Z | 2021-01-15T00:01:14.949558Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9539', 'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'} | {'https://github.com/boostorg/boost/commit/d81afd08ff461a21836f71829fd21dabf57f80a9', 'https://github.com/boostorg/boost/commit/9f411f107c378e51c773657c196205eca093f51b'} | {'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'} | {'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'} |
OSS-Fuzz | OSV-2021-144 | Use-of-uninitialized-value in rawspeed::RawImageData::checkMemIsInitialized | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7171
```
Crash type: Use-of-uninitialized-value
Crash state:
rawspeed::RawImageData::checkMemIsInitialized
Cr2Decompressor.cpp
rawspeed::alignedMalloc
```
| null | 2022-04-13T03:04:36.476158Z | 2021-01-13T21:56:24.820945Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7171', 'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'} | {'https://github.com/darktable-org/rawspeed/commit/ad4f8565aa1ed3d2a9afb4ac56e17eeb06f70b8d'} | {'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'} | {'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'} |
OSS-Fuzz | OSV-2020-847 | Use-of-uninitialized-value in ycck_cmyk_convert | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18732
```
Crash type: Use-of-uninitialized-value
Crash state:
ycck_cmyk_convert
sep_upsample
process_data_simple_main
```
| null | 2022-04-13T03:04:31.574083Z | 2020-07-14T22:13:44.357655Z | MEDIUM | null | null | {'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18732'} | {'https://github.com/qpdf/qpdf/commit/0ae344d002755d1f218fe4fbd818a814bc3ebdbc'} | {'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95'} | {'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95'} |
OSS-Fuzz | OSV-2020-22 | Container-overflow in parquet::schema::Unflatten | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20897
```
Crash type: Container-overflow READ 4
Crash state:
parquet::schema::Unflatten
parquet::FileMetaData::FileMetaDataImpl::FileMetaDataImpl
parquet::FileMetaData::FileMetaData
```
| null | 2022-04-13T03:04:31.828829Z | 2020-06-24T01:51:10.604817Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20897', 'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} | {'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'} | {'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} | {'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} |
OSS-Fuzz | OSV-2020-514 | UNKNOWN READ in asn1_item_print_ctx | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14546
```
Crash type: UNKNOWN READ
Crash state:
asn1_item_print_ctx
asn1_template_print_ctx
asn1_item_print_ctx
```
| null | 2022-04-13T03:04:38.813418Z | 2020-07-01T00:00:13.902833Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14546', 'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'} | {'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'} | {'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'} | {'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'} |
OSS-Fuzz | OSV-2021-847 | Heap-buffer-overflow in frame_get_vlmetalayers | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35086
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
frame_get_vlmetalayers
frame_to_schunk
blosc2_schunk_from_buffer
```
| null | 2022-04-13T03:04:40.375178Z | 2021-06-10T00:01:13.857277Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35086', 'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'} | {'https://github.com/Blosc/c-blosc2/commit/4d2510757d797781aed92193012294e7732afe9a'} | {'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'} | {'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.