ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
NuGet
GHSA-2qgv-2cv4-g4cg
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0832'}
2022-03-03T05:12:32.601494Z
2021-07-28T18:57:27Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0832', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0832'}
null
NuGet
GHSA-62gw-3rmj-wmp2
High severity vulnerability that affects System.Management.Automation
## Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in .NET Core # Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in PowerShell Core ## Executive Summary A denial of service vulnerability exists when PowerShell Core or .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a PowerShell Core scripts. The update addresses the vulnerability by correcting how the .NET Core handles web requests. System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).) ## Discussion Please [open a support question](https://github.com/PowerShell/PowerShell/issues/new?assignees=&labels=Issue-Question&template=Support_Question.md&title=Support+Question) to discussion the PowerShell aspects of this advisory. Please use dotnet/announcements#121 for discussion of the .NET aspects this advisory. ## <a name="affected-software">Affected Software</a> The vulnerability affects PowerShell Core prior to the following versions: | PowerShell Core Version | Fixed in | |-------------------------|-------------------| | 6.1 | 6.1.6 | | 6.2 | 6.2.3 | | 7.0 | unaffected | ## Advisory FAQ ### How do I know if I am affected? If all of the following are true: 1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected. 1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`. ### How do I update to an unaffected version? Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core. ## Other Information ### Reporting Security Issues If you have found a potential security issue in PowerShell Core, please email details to secure@microsoft.com. ### Support You can ask questions about this issue on GitHub in the PowerShell organization. This is located at https://github.com/PowerShell/. The Announcements repo (https://github.com/PowerShell/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions. ### What if the update breaks my script or module? You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core. This should be treated as a temporary measure. Therefore, the script or module should be updated to work with the patched version of PowerShell Core. ### Acknowledgments Paul Ryman of VMware Sydney Engineering Team Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information. ### External Links [CVE-2019-1301](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301) ### Revisions V1.0 (September 12, 2019): Advisory published. *Version 1.0* *Last Updated 2019-09-12*
{'CVE-2019-1301'}
2022-03-03T05:14:10.104246Z
2019-09-13T13:25:47Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1301', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-62gw-3rmj-wmp2', 'https://github.com/advisories/GHSA-62gw-3rmj-wmp2', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301'}
null
NuGet
GHSA-8pp6-8x4q-c5mx
Server side request forgery in C1 CMS
C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary files to zero size (effectively delete them) leading to denial of service (DoS) or altering application logic. The authenticated user may unknowingly perform the actions by visiting a specially crafted site. Patched in C1 CMS v6.12, no known workarounds exist.
{'CVE-2022-24789'}
2022-04-07T15:46:50.839867Z
2022-03-30T00:00:31Z
HIGH
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24789', 'https://github.com/Orckestra/C1-CMS-Foundation', 'https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45', 'https://github.com/Orckestra/C1-CMS-Foundation/releases/tag/v6.12'}
null
NuGet
GHSA-8m73-w2r2-6xxj
Insecure defaults in UmbracoForms
This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types, depending on their security needs and policies.
{'CVE-2020-7685'}
2022-03-03T05:13:10.518744Z
2020-07-29T17:29:51Z
HIGH
null
{'CWE-1188'}
{'https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7685'}
null
NuGet
GHSA-958r-g534-ccmr
Moderate severity vulnerability that affects MadsKristensen.AspNetCore.Miniblog
madskristensen Miniblog.Core through 2019-01-16 allows remote attackers to execute arbitrary ASPX code via an IMG element with a data: URL, because SaveFilesToDisk in Controllers/BlogController.cs writes a decoded base64 string to a file without validating the extension.
{'CVE-2019-9845'}
2022-03-03T05:13:47.353764Z
2019-07-05T21:11:13Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/madskristensen/Miniblog.Core/blob/master/src/Controllers/BlogController.cs#L142', 'https://github.com/madskristensen/Miniblog.Core', 'https://rastating.github.io/miniblog-remote-code-execution/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9845', 'https://github.com/advisories/GHSA-958r-g534-ccmr'}
null
NuGet
GHSA-6xh7-4v2w-36q6
ASP.NET Core fails to properly validate web requests
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
{'CVE-2017-0247'}
2022-04-26T19:15:30.589738Z
2018-10-16T19:58:05Z
HIGH
null
{'CWE-20'}
{'https://technet.microsoft.com/en-us/library/security/4021279.aspx', 'https://github.com/aspnet/Announcements/issues/239', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0247', 'https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS', 'https://github.com/advisories/GHSA-6xh7-4v2w-36q6'}
null
NuGet
GHSA-5frh-8cmj-gc59
High severity vulnerability that affects System.Management.Automation
## Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability # Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability ## Executive Summary A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine. To exploit the vulnerability, an attacker would first have access to the local machine where PowerShell is running in Constrained Language mode. By doing that an attacker could leverage script debugging to abuse signed modules in an unintended way. The update addresses the vulnerability by correcting how PowerShell functions in Constrained Language Mode. System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).) ## Discussion Please use PowerShell/PowerShell#TBD for discussion of this advisory. ## <a name="affected-software">Affected Software</a> The vulnerability affects PowerShell Core prior to the following versions: | PowerShell Core Version | Fixed in | |-------------------------|-------------------| | 6.1 | 6.1.5 | | 6.2 | 6.2.2 | ## Advisory FAQ ### How do I know if I am affected? If all of the following are true: 1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected. 1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`. ### How do I update to an unaffected version? Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core. ## Other Information ### Reporting Security Issues If you have found a potential security issue in PowerShell Core, please email details to secure@microsoft.com. ### Support You can ask questions about this issue on GitHub in the PowerShell organization. This is located at https://github.com/PowerShell/. The Announcements repo (https://github.com/PowerShell/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions. ### What if the update breaks my script or module? You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core. This should be treated as a temporary measure. Therefore, the script or module should be updated to work with the patched version of PowerShell Core. ### Acknowledgments Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information. ### External Links [CVE-2019-1167](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167) ### Revisions V1.0 (July 16, 2019): Advisory published. *Version 1.0* *Last Updated 2019-07-16*
{'CVE-2019-1167'}
2022-03-03T05:13:03.806720Z
2019-07-17T19:14:18Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-5frh-8cmj-gc59', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1167', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-5frh-8cmj-gc59'}
null
NuGet
GHSA-vw2g-5827-m9fp
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.
{'CVE-2019-1308'}
2022-03-03T05:12:56.773266Z
2021-03-29T20:55:52Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1308', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'}
null
NuGet
GHSA-qwwr-qc2p-6283
Out-of-bounds write in libpng
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
{'CVE-2018-14550'}
2022-03-03T05:13:30.858298Z
2021-03-22T16:57:07Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14550', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612', 'https://github.com/glennrp/libpng', 'https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/glennrp/libpng/issues/246', 'https://security.gentoo.org/glsa/201908-02'}
null
NuGet
GHSA-9824-rp6m-xx9w
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0989'}
2022-03-03T05:13:01.401560Z
2021-03-29T20:59:04Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}
null
NuGet
GHSA-x7fx-mcc9-27j7
Inappropriate implementation in V8 in CefSharp
High CVE-2020-16013: Inappropriate implementation in V8. - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013 Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild. There is currently little to no public information on the issue other than it has been flagged as `High` severity.
{'CVE-2020-16013'}
2022-03-03T05:13:49.080541Z
2020-11-27T20:12:55Z
HIGH
null
{'CWE-787', 'CWE-119'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16013', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-x7fx-mcc9-27j7', 'https://crbug.com/1147206', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}
null
NuGet
GHSA-qxx8-292g-2w66
Improper Authentication
### Impact A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an an attacker to have internal knowledge of the bot. ### Patches The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case. ### Workarounds Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator which throws an exception if the Claims are Skill Claims. For detailed instructions, see the link in the References section. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet) * Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
null
2022-03-03T05:14:01.958202Z
2021-03-08T15:50:01Z
HIGH
null
{'CWE-287'}
{'https://aka.ms/SkillClaimsValidationDotnet', 'https://github.com/microsoft/botbuilder-dotnet/security/advisories/GHSA-qxx8-292g-2w66', 'https://www.nuget.org/packages/Microsoft.Bot.Connector/'}
null
NuGet
GHSA-2cwj-8chv-9pp9
XML External Entity attack in log4net
Apache log4net before 2.0.10 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users.
{'CVE-2018-1285'}
2022-04-25T23:16:56.185266Z
2021-01-29T19:47:23Z
CRITICAL
null
{'CWE-611'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/', 'https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/', 'https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-LOG4NET-568897', 'https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872@%3Cdev.logging.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866@%3Cdev.logging.apache.org%3E', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2018-1285', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732@%3Cdev.logging.apache.org%3E', 'https://issues.apache.org/jira/browse/LOG4NET-575', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1285', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.nuget.org/packages/log4net/', 'https://github.com/apache/logging-log4net', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/', 'https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d@%3Cdev.logging.apache.org%3E'}
null
NuGet
GHSA-c77f-4rgj-jfr4
Cross-site Scripting in Beego
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
{'CVE-2021-39391'}
2021-09-27T18:58:23Z
2021-09-15T20:23:28Z
HIGH
null
{'CWE-79', 'CWE-64'}
{'https://github.com/beego/beego/issues/4727', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39391', 'https://github.com/beego/beego'}
null
NuGet
GHSA-9475-xg6m-j7pw
Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET
### Impact Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved. The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session. ### Patches Version 1.0.2 and 2.7.0 are patched. ### Workarounds Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP. ### For more information If you have any questions or comments about this advisory: * Comment on #103 * Email us at security@sustainsys.com if you think that there are further security issues.
{'CVE-2020-5268'}
2022-03-03T05:12:52.477872Z
2020-04-22T20:59:37Z
MODERATE
null
{'CWE-303'}
{'https://github.com/Sustainsys/Saml2/issues/712', 'https://www.nuget.org/packages/Sustainsys.Saml2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
null
NuGet
GHSA-jv2c-mhcq-6wp4
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0829'}
2022-03-03T05:13:54.641761Z
2021-07-28T18:57:39Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0829', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0829'}
null
NuGet
GHSA-874w-m2v2-mj64
Double Free in Adplug
AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h.
{'CVE-2019-15151'}
2022-03-03T05:13:08.121515Z
2021-03-29T20:48:45Z
CRITICAL
null
{'CWE-415'}
{'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151', 'https://github.com/adplug/adplug/issues/91'}
null
NuGet
GHSA-m22m-h4rf-pwq3
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3.
{'CVE-2021-32840'}
2022-03-03T05:13:40.088268Z
2022-02-01T16:22:50Z
HIGH
null
{'CWE-22'}
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32840', 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc', 'https://github.com/icsharpcode/SharpZipLib', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'}
null
NuGet
GHSA-jrmq-rv9w-63rv
Umbraco ApplicationURL Overwrite
Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites users to the site. For Umbraco versions less than 9.2.0, if the Application URL is not specifically configured, the attacker can manipulate this value and store it persistently affecting all users for components where the "UmbracoApplicationUrl" is used. For example, the attacker is able to change the URL users receive when resetting their password so that it points to the attackers server, when the user follows this link the reset token can be intercepted by the attacker resulting in account takeover.
{'CVE-2022-22690'}
2022-03-03T05:13:47.635567Z
2022-01-21T23:34:24Z
HIGH
null
{'CWE-444'}
{'https://github.com/umbraco/Umbraco-CMS', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22690'}
null
NuGet
GHSA-xpwp-rq3x-x6v7
Critical severity vulnerability that affects recurly-api-client
The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
{'CVE-2017-0907'}
2022-03-03T05:12:43.938941Z
2018-10-16T17:35:04Z
CRITICAL
null
{'CWE-918'}
{'https://dev.recurly.com/page/net-updates', 'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7', 'https://hackerone.com/reports/288635', 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907'}
null
NuGet
GHSA-wmpm-fq7r-jq56
Imporoper path validation in elFinder.NetCore
This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation.
{'CVE-2021-23427'}
2022-03-03T05:12:57.836160Z
2021-09-02T22:05:17Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23427', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L226', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L226', 'https://github.com/gordon-matt/elFinder.NetCore'}
null
NuGet
GHSA-365p-96qv-xr7g
ASP.NET Core allow an elevation of privilege
ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka "ASP.NET Core Elevation Of Privilege Vulnerability".
{'CVE-2018-0787'}
2022-04-26T19:15:43.889740Z
2018-10-16T19:56:59Z
HIGH
null
{'CWE-640'}
{'https://github.com/aspnet/Announcements/issues/295', 'http://www.securitytracker.com/id/1040525', 'https://github.com/advisories/GHSA-365p-96qv-xr7g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0787', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0787', 'http://www.securityfocus.com/bid/103282'}
null
NuGet
GHSA-cmhx-cq75-c4mj
Regular Expression Denial of Service (ReDoS)
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.
{'CVE-2019-0820'}
2022-03-03T05:12:47.255590Z
2021-08-04T21:03:46Z
MODERATE
null
{'CWE-400'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820', 'https://access.redhat.com/errata/RHSA-2019:1259', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0820'}
null
NuGet
GHSA-9cxh-gqpx-qc5m
Credential Disclosure in System.DirectoryServices.Protocols
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux. ### Patches Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux. Package name | Vulnerable versions | Secure versions ------------ | ---------------- | ------------------------- System.DirectoryServices.Protocols | 5.0.0 | 5.0.1 ### Other Details - Announcement for this issue can be found at dotnet/announcements#202 - An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301 - MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355
{'CVE-2021-41355'}
2022-03-03T05:14:16.252121Z
2021-10-12T17:49:25Z
MODERATE
null
{'CWE-200'}
{'https://github.com/dotnet/runtime/issues/60301', 'https://github.com/dotnet/runtime', 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355'}
null
NuGet
GHSA-fvpg-qx3g-7mp7
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0771'}
2022-03-03T05:13:51.799924Z
2019-04-09T19:43:29Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771', 'https://github.com/advisories/GHSA-fvpg-qx3g-7mp7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0771'}
null
NuGet
GHSA-grvw-q343-58wh
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298.
{'CVE-2019-1300'}
2022-03-03T05:13:58.668379Z
2021-03-29T20:55:57Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300'}
null
NuGet
GHSA-4vp3-vfww-8648
Incorrect permission enforcement in UmbracoCms
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
{'CVE-2020-29454'}
2022-03-03T05:13:08.289579Z
2021-04-13T15:48:05Z
MODERATE
null
{'CWE-732'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-29454', 'https://github.com/umbraco/Umbraco-CMS/pull/9361'}
null
NuGet
GHSA-xxfr-jrgh-x392
Remote code execution in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1180.
{'CVE-2020-1172'}
2022-03-03T05:14:04.519376Z
2021-08-02T17:29:01Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/pull/6500', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1172', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1172'}
null
NuGet
GHSA-v5rv-hpxg-8x49
Signature validation bypass in ServiceStack
ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.
{'CVE-2020-28042'}
2022-03-03T05:13:06.294605Z
2021-01-13T19:13:11Z
MODERATE
null
{'CWE-347'}
{'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519', 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.nuget.org/packages/ServiceStack/'}
null
NuGet
GHSA-5rcr-q3rx-j7vr
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106.
{'CVE-2019-1107'}
2022-03-03T05:13:46.158859Z
2021-03-29T20:57:35Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
null
NuGet
GHSA-3w9q-c44j-37jj
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783.
{'CVE-2019-0773'}
2022-03-03T05:13:59.087096Z
2019-04-09T19:43:32Z
HIGH
null
{'CWE-787'}
{'https://github.com/advisories/GHSA-3w9q-c44j-37jj', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0773'}
null
NuGet
GHSA-gvqv-779r-4jgp
Use after free in CefSharp
CVE-2020-16017: Use after free in site isolation - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017 Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild. There is currently little to no public information on the issue other than it has been flagged as `High` severity.
{'CVE-2020-16017'}
2022-03-03T05:12:54.570961Z
2020-11-27T20:13:05Z
HIGH
null
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16017', 'https://crbug.com/1146709', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}
null
NuGet
GHSA-hrmm-f4j8-8vxc
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0922'}
2022-03-03T05:14:02.985181Z
2021-03-29T21:00:11Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-ghhp-997w-qr28
.NET Core Remote Code Execution Vulnerability
.NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112. ### Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed. ### Discussion Discussion for this issue can be found at dotnet/runtime#49377 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ### Affected software The vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability. Vulnerable package versions: Any .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below. Package Name | Vulnerable Versions | Secure Versions -|-|- System.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1 System.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2 System.Text.Encodings.Web | 5.0.0 | 5.0.1 Please validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.
{'CVE-2021-26701'}
2022-03-03T05:13:15.944964Z
2021-04-21T19:38:01Z
CRITICAL
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/', 'https://github.com/dotnet/announcements/issues/178'}
null
NuGet
GHSA-7rq6-7gv8-c37h
Missing Authorization with Default Settings in Dashboard UI
Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. ### Impact Missing authorization when default options are used for the Dashboard UI, e.g. when no custom authorization rules are used as recommended in the [Using Dashboard](https://docs.hangfire.io/en/latest/configuration/using-dashboard.html#configuring-authorization) documentation article. #### Impacted If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted: ```csharp app.UseHangfireDashboard(); // Impacted app.UseHangfireDashboard("/hangfire", new DashboardOptions()); // Impacted ``` #### Not Impacted If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted: ```csharp app.UseHangfireDashboard("/hangfire", new DashboardOptions { Authorization = new []{ new SomeAuthorizationFilter(); } // Not impacted }); ``` ### Patches Patch is already available in version [1.7.26](https://github.com/HangfireIO/Hangfire/releases/tag/v1.7.26) and already available on NuGet.org, please see [Hangfire.Core 1.7.26](https://www.nuget.org/packages/Hangfire.Core/1.7.26). Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. ### Workarounds It is possible to fix the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. In this case upgrade is not required. ```csharp // using Hangfire.Dashboard; app.UseHangfireDashboard("/hangfire", new DashboardOptions { Authorization = new []{ new LocalRequestsOnlyAuthorizationFilter(); } }); ``` ### References Original GitHub Issue: https://github.com/HangfireIO/Hangfire/issues/1958
{'CVE-2021-41238'}
2021-11-03T14:35:35Z
2021-11-03T17:30:59Z
HIGH
null
{'CWE-862'}
{'https://github.com/HangfireIO/Hangfire', 'https://github.com/HangfireIO/Hangfire/issues/1958', 'https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h', 'https://www.nuget.org/packages/Hangfire.Core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41238'}
null
NuGet
GHSA-6j89-jhpr-849f
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366.
{'CVE-2019-1307'}
2022-03-03T05:13:12.777814Z
2021-03-29T20:55:46Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307'}
null
NuGet
GHSA-7jgj-8wvc-jh57
.NET Core Information Disclosure
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
{'CVE-2018-8292'}
2022-03-03T05:14:01.988987Z
2021-04-21T19:16:06Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8292', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292', 'http://www.securityfocus.com/bid/105548', 'https://github.com/dotnet/announcements/issues/88', 'https://access.redhat.com/errata/RHSA-2018:2902'}
null
NuGet
GHSA-9rjp-r58j-fxgq
Path traversal in elFinder.NetCore
This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal
{'CVE-2021-23428'}
2022-03-03T05:13:31.269942Z
2021-09-02T22:05:26Z
HIGH
null
{'CWE-20', 'CWE-22'}
{'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23428', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L387', 'https://github.com/gordon-matt/elFinder.NetCore', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838'}
null
NuGet
GHSA-ppxc-pmx9-qjv9
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1195'}
2022-03-03T05:12:39.713478Z
2021-03-29T20:57:59Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
NuGet
GHSA-cwqq-w8c3-r2jw
Uncontrolled Resource Consumption in MetadataExtractor
MetadataExtractor 2.1.0 allows stack consumption.
{'CVE-2019-14262'}
2022-03-03T05:14:05.345035Z
2019-08-23T00:04:56Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-14262', 'https://github.com/drewnoakes/metadata-extractor-dotnet/pull/190', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}
null
NuGet
GHSA-7q36-4xx7-xcxf
Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack
### Impact When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors: 1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized. 1. stack overflow - leading to the deserializing process crashing. ### Patches The following steps are required to mitigate this risk. 1. Upgrade to a version of the library where a fix is available 1. Add code to your application to put MessagePack into the defensive `UntrustedData` mode. 1. Identify all MessagePack extensions that implement `IMessagePackFormatter&lt;T&gt;` implementations that do not ship with the MessagePack library to include the security mitigations. This includes those acquired from 3rd party packages and classes included directly into your project. Any AOT formatters generated with the MPC tool must be regenerated with the patched version of mpc. 1. Review your messagepack-serializable data structures for hash-based collections that use custom or unusual types for the hashed key. See below for details on handling such situations. Review the `MessagePackSecurity` class to tweak any settings as necessary to strike the right balance between performance, functionality, and security. Specialized `IEqualityComparer&lt;T&gt;` implementations provide the hash collision resistance. Each type of hashed key may require a specialized implementation of its own. The patched MessagePack library includes many such implementations for primitive types commonly used as keys in hash-based collections. If your data structures use custom types as keys in these hash-based collections, putting MessagePack in `UntrustedData` mode may lead the deserializer to throw an exception because no safe `IEqualityComparer&lt;T&gt;` is available for your custom `T` type. You can provide your own safe implementation by deriving from the `MessagePackSecurity` class and overriding the `GetHashCollisionResistantEqualityComparer&lt;T&gt;()` method to return your own custom implementation when `T` matches your type, and fallback to `return base.GetHashCollisionResistantEqualityComparer&lt;T&gt;();` for types you do not have custom implementations for. Unrelated to this advisory, but as general security guidance, you should also avoid the Typeless serializer/formatters/resolvers for untrusted data as that opens the door for the untrusted data to potentially deserialize unanticipated types that can compromise security. #### MessagePack 1.x users 1. Upgrade to any 1.9.x version. 1. When deserializing untrusted data, put MessagePack into a more secure mode with: ```cs MessagePackSecurity.Active = MessagePackSecurity.UntrustedData; ``` In MessagePack v1.x this is a static property and thus the security level is shared by the entire process or AppDomain. Use MessagePack v2.1 or later for better control over the security level for your particular use. 1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `MessagePackSecurity` class. Review any custom-written `IMessagePackFormatter&lt;T&gt;` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required. In particular, a formatter that deserializes an object (as opposed to a primitive value) should wrap the deserialization in a `using (MessagePackSecurity.DepthStep())` block. For example: ```cs public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options) { if (reader.TryReadNil()) { return default; } else { using (MessagePackSecurity.DepthStep()) // STACK OVERFLOW MITIGATION { MyObject o = new MyObject(); // deserialize members of the object here. return o; } } } ``` If your custom formatter creates hash-based collections (e.g. `Dictionary&lt;K, V&gt;` or `HashSet&lt;T&gt;`) where the hashed key comes from the messagepack data, always instantiate your collection using `MessagePackSecurity.Active.GetEqualityComparer&lt;T&gt;()` as the equality comparer: ```cs var collection = new HashSet&lt;T&gt;(MessagePackSecurity.Active.GetEqualityComparer&lt;T&gt;()); ``` This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm. Learn more about [best security practices when reading untrusted data with MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security). #### MessagePack 2.x users 1. Upgrade to any 2.1.x or later version. 1. When deserializing untrusted data, put MessagePack into a more secure mode by configuring your `MessagePackSerializerOptions.Security` property: ```cs var options = MessagePackSerializerOptions.Standard .WithSecurity(MessagePackSecurity.UntrustedData); // Pass the options explicitly for the greatest control. T object = MessagePackSerializer.Deserialize&lt;T&gt;(data, options); // Or set the security level as the default. MessagePackSerializer.DefaultOptions = options; ``` 1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `Security` member on the `MessagePackSerializerOptions` parameter. Review any custom-written `IMessagePackFormatter&lt;T&gt;` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required. In particular, a formatter that deserializes an object (as opposed to a primitive value) should call `options.Security.DepthStep(ref reader);` before deserializing the object&#39;s members, and be sure to revert the depth step with `reader.Depth--;` before exiting the method. For example: ```cs public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options) { if (reader.TryReadNil()) { return default; } else { options.Security.DepthStep(ref reader); // STACK OVERFLOW MITIGATION, line 1 try { MyObject o = new MyObject(); // deserialize members of the object here. return o; } finally { reader.Depth--; // STACK OVERFLOW MITIGATION, line 2 } } } ``` If your custom formatter creates hash-based collections (e.g. `Dictionary&lt;K, V&gt;` or `HashSet&lt;T&gt;`) where the hashed key comes from the messagepack data, always instantiate your collection using `options.Security.GetEqualityComparer&lt;TKey&gt;()` as the equality comparer: ```cs var collection = new HashSet&lt;T&gt;(options.Security.GetEqualityComparer&lt;T&gt;()); ``` This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm. Learn more about [best security practices when reading untrusted data with MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security). ### Workarounds The security vulnerabilities are in the formatters. Avoiding the built-in formatters entirely in favor of reading messagepack primitive data directly or relying on carefully written custom formatters can provide a workaround. MessagePack v1.x users may utilize the `MessagePackBinary` static class directly to read the data they expect. MessagePack v2.x users may utilize the `MessagePackReader` struct directly to read the data they expect. ### References Learn more about best security practices when reading untrusted data with [MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security) or [MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security). ### For more information If you have any questions or comments about this advisory: * Open an issue in [MessagePack-CSharp](https://github.com/neuecc/MessagePack-CSharp/issues/new/choose) * [Email us](mailto:andrewarnott@gmail.com)
{'CVE-2020-5234'}
2022-03-03T05:13:22.194363Z
2020-01-31T17:59:20Z
MODERATE
null
{'CWE-121'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5234', 'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/issues/810', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'}
null
NuGet
GHSA-qwwg-gc55-qqrv
Out-of-bounds Write in Chakra
Chakra Scripting Engine Memory Corruption Vulnerability
{'CVE-2020-17131'}
2022-03-03T05:13:32.773319Z
2021-04-13T15:54:40Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17131', 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v11124', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131', 'https://github.com/chakra-core/ChakraCore/pull/6531'}
null
NuGet
GHSA-7423-5qfm-g648
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0916'}
2022-03-03T05:13:45.933184Z
2021-03-29T21:00:09Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-2x7h-96h5-rq84
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability.
{'CVE-2021-32841'}
2022-03-03T05:13:28.356898Z
2022-02-01T16:22:57Z
MODERATE
null
{'CWE-22'}
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}
null
NuGet
GHSA-qpvx-gpqm-g98j
Critical severity vulnerability that affects Auth0-WCF-Service-JWT
Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application.
{'CVE-2019-7644'}
2022-03-03T05:14:11.380083Z
2019-04-18T14:28:03Z
CRITICAL
null
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-7644', 'https://github.com/advisories/GHSA-qpvx-gpqm-g98j', 'https://auth0.com/docs/security/bulletins/cve-2019-7644'}
null
NuGet
GHSA-jhx3-2w5x-x39x
High severity vulnerability that affects Microsoft.ChakraCore
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'.
{'CVE-2019-0746'}
2022-03-03T05:13:20.300080Z
2019-04-09T19:43:38Z
MODERATE
null
null
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0746', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0746', 'https://github.com/advisories/GHSA-jhx3-2w5x-x39x'}
null
NuGet
GHSA-cgpw-2gph-2r9g
Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.App, and Microsoft.AspNetCore.Server.Kestrel.Core
Microsoft is aware of a denial of service vulnerability in ASP.NET Core when a malformed request is terminated. An attacker who successfully exploited this vulnerability could cause a denial of service attack. The update addresses the vulnerability by correcting how ASP.NET Core handles such requests.
null
2022-03-03T05:14:10.817951Z
2018-10-16T19:59:59Z
MODERATE
null
null
{'https://github.com/aspnet/Announcements/issues/311', 'https://github.com/advisories/GHSA-cgpw-2gph-2r9g'}
null
NuGet
GHSA-g8j6-m4p7-5rfq
High severity vulnerability that affects DotNetNuke.Core
DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources.
{'CVE-2017-0929'}
2022-03-03T05:13:02.306663Z
2018-10-16T17:18:12Z
HIGH
null
{'CWE-918'}
{'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq', 'https://github.com/dnnsoftware/Dnn.Platform', 'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0929'}
null
NuGet
GHSA-rh4p-g7x6-8pqg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1062'}
2022-03-03T05:13:18.764715Z
2021-03-29T20:59:09Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1062', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
null
NuGet
GHSA-9qw8-ccq9-ffj9
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1139'}
2022-03-03T05:14:02.943957Z
2021-03-29T20:57:53Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
NuGet
GHSA-mv2r-q4g5-j8q5
Microsoft.Data.OData Library improperly handles web requests
A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData.
{'CVE-2018-8269'}
2022-04-26T19:15:33.814215Z
2018-10-16T19:58:31Z
HIGH
null
null
{'http://www.securityfocus.com/bid/105322', 'https://github.com/advisories/GHSA-mv2r-q4g5-j8q5', 'https://www.exploit-db.com/exploits/46101/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8269', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8269'}
null
NuGet
GHSA-868x-rg4c-cjqg
Allocation of Resources Without Limits or Throttling in Apache Avro
A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.
{'CVE-2021-43045'}
2022-03-03T05:12:44.845846Z
2022-01-08T00:39:20Z
HIGH
null
{'CWE-770'}
{'http://www.openwall.com/lists/oss-security/2022/01/06/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43045', 'https://lists.apache.org/thread/5fttw9vk6gd2p3b846nox7hcj5469xfd'}
null
NuGet
GHSA-v76m-f5cx-8rg4
Moderate severity vulnerability that affects DotNetNuke.Core
Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 7.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{'CVE-2015-1566'}
2022-03-03T05:12:55.069394Z
2018-10-16T19:33:25Z
MODERATE
null
{'CWE-79'}
{'http://www.dnnsoftware.com/platform/manage/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1566', 'http://secunia.com/advisories/62832', 'https://github.com/advisories/GHSA-v76m-f5cx-8rg4'}
null
NuGet
GHSA-w89r-qch4-8jv5
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0912'}
2022-03-03T05:13:37.247605Z
2021-03-29T20:59:59Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-2x75-mf24-588m
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1092'}
2022-03-03T05:14:00.642186Z
2021-03-29T20:59:11Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1092'}
null
NuGet
GHSA-6cc6-66f5-mxjj
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0826'}
2022-03-03T05:12:54.986188Z
2021-07-28T18:58:03Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0826', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0826'}
null
NuGet
GHSA-j3jw-j2j8-2wv9
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43569'}
2022-03-03T05:13:27.411400Z
2021-11-10T20:58:03Z
CRITICAL
null
{'CWE-347'}
{'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-dotnet', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43569', 'https://github.com/starkbank/ecdsa-dotnet/releases/tag/v1.3.2'}
null
NuGet
GHSA-86gw-g9jv-8vfg
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0848.
{'CVE-2020-0833'}
2022-03-03T05:12:52.517561Z
2021-07-28T18:57:55Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0833', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0833'}
null
NuGet
GHSA-m7mf-48hp-5qmr
Inappropriate implementation in V8
CVE-2020-16009: Inappropriate implementation in V8 - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009 Google is aware of reports that exploits for CVE-2020-16009 exist in the wild. Allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. There is currently little to no public information on the issue other than it has been flagged as `High` severity.
{'CVE-2020-16009'}
2022-03-03T05:12:45.422502Z
2020-12-02T18:28:47Z
HIGH
null
{'CWE-787'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/', 'https://security.gentoo.org/glsa/202011-12', 'http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-m7mf-48hp-5qmr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16009', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html', 'https://www.debian.org/security/2021/dsa-4824', 'https://crbug.com/1143772', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html'}
null
NuGet
GHSA-2452-3rwv-x89c
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300.
{'CVE-2019-1298'}
2022-03-03T05:13:43.259043Z
2021-03-29T20:56:01Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298'}
null
NuGet
GHSA-hfvc-g252-rp4g
Denial of Service in i18n
This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.
{'CVE-2020-7791'}
2022-03-03T05:14:11.849809Z
2020-12-14T19:50:22Z
MODERATE
null
{'CWE-400', 'CWE-20'}
{'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E'}
null
NuGet
GHSA-6w5m-jgc5-8cgc
orchardcore is vulnerable to Cross-site Scripting
orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0159'}
2022-03-03T05:14:13.613996Z
2022-01-21T23:57:49Z
MODERATE
null
{'CWE-79'}
{'https://github.com/orchardcms/orchardcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}
null
NuGet
GHSA-ch6p-4jcm-h8vh
Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc and Microsoft.AspNetCore.Mvc.Core
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
{'CVE-2017-0248'}
2022-03-03T05:09:36.735815Z
2018-10-16T19:58:52Z
MODERATE
null
{'CWE-295'}
{'https://github.com/advisories/GHSA-ch6p-4jcm-h8vh', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248', 'http://www.securitytracker.com/id/1038458', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0248', 'http://www.securityfocus.com/bid/98117'}
null
NuGet
GHSA-x2rg-fmcv-crq5
DNN (aka DotNetNuke) has Remote Code Execution via a cookie
DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites."
{'CVE-2017-9822'}
2022-04-26T19:00:09.603785Z
2018-10-16T19:34:22Z
HIGH
null
{'CWE-20'}
{'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'http://www.dnnsoftware.com/community/security/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9822', 'http://www.securityfocus.com/bid/102213', 'https://github.com/advisories/GHSA-x2rg-fmcv-crq5'}
null
NuGet
GHSA-2wwc-w2gw-4329
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.
{'CVE-2019-1366'}
2022-03-03T05:13:27.978381Z
2021-03-29T20:55:36Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'}
null
NuGet
GHSA-rqrc-8q8f-cp9c
Infinite loop in .Net Bond
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads.
{'CVE-2020-1469'}
2022-04-08T18:34:02.348210Z
2022-04-08T18:11:51Z
HIGH
null
{'CWE-434', 'CWE-835'}
{'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://github.com/microsoft/bond/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469'}
null
NuGet
GHSA-7378-6268-4278
High severity vulnerability that affects DotNetZip
DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
{'CVE-2018-1002205'}
2022-03-03T05:13:57.586333Z
2018-10-16T17:16:40Z
HIGH
null
{'CWE-22'}
{'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366', 'https://github.com/haf/DotNetZip.Semverd/pull/121', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://github.com/snyk/zip-slip-vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/research/zip-slip-vulnerability', 'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245'}
null
NuGet
GHSA-pv36-h7jh-qm62
Heap buffer overflow in CefSharp
### Impact A memory corruption bug(Heap overflow) in the FreeType font rendering library. > This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images . As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild. ### Patches Upgrade to 85.3.130 or higher ### References - https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ - https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999 - https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942 To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
{'CVE-2020-15999'}
2022-03-03T05:13:02.892365Z
2020-10-27T19:47:38Z
MODERATE
null
{'CWE-787', 'CWE-119'}
{'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62', 'https://security.gentoo.org/glsa/202011-12', 'https://www.nuget.org/packages/CefSharp.Wpf.HwndHost', 'https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html', 'https://www.nuget.org/packages/CefSharp.Common/', 'https://www.nuget.org/packages/CefSharp.WinForms', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15999', 'https://github.com/cefsharp/CefSharp', 'https://crbug.com/1139963', 'http://seclists.org/fulldisclosure/2020/Nov/33', 'https://www.debian.org/security/2021/dsa-4824', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/', 'https://security.gentoo.org/glsa/202012-04', 'https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html', 'https://www.nuget.org/packages/CefSharp.Wpf'}
null
NuGet
GHSA-pjxv-w3qj-j8m3
Directory Traversal in elFinder.AspNet
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23415'}
2022-03-03T05:13:27.755638Z
2021-08-09T20:42:13Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'}
null
NuGet
GHSA-r8pr-83cc-ccv7
Umbraco Persistent Password Reset Poison
The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.
{'CVE-2022-22691'}
2022-03-03T05:13:40.735801Z
2022-01-21T23:34:27Z
HIGH
null
{'CWE-444', 'CWE-640'}
{'https://github.com/umbraco/Umbraco-CMS', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22691'}
null
NuGet
GHSA-mjww-934m-h4jw
Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates.
{'CVE-2020-29457'}
2022-03-03T05:13:00.413150Z
2021-11-19T20:19:53Z
MODERATE
null
{'CWE-295'}
{'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29457', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/', 'https://github.com/OPCFoundation/UA-.NETStandard/'}
null
NuGet
GHSA-ph3v-2hq5-5qfq
Code injection in RazorEngine
In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{'CVE-2021-46703'}
2022-03-11T20:46:55.151952Z
2022-03-07T00:00:41Z
MODERATE
null
null
{'https://github.com/Antaris/RazorEngine/issues/585', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'}
null
NuGet
GHSA-53r4-h27g-rg3x
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0992'}
2022-03-03T05:12:36.945087Z
2021-03-29T20:59:07Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}
null
NuGet
GHSA-h2xm-2p6w-mj2v
Out-of-bounds Write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0831'}
2022-03-03T05:12:51.698467Z
2021-07-28T18:58:14Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0831', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0831'}
null
NuGet
GHSA-fxh6-w476-hgr4
Directory Traversal in SharpCompress
SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction.
{'CVE-2018-1002206'}
2022-03-03T05:13:37.184703Z
2019-09-11T22:59:57Z
MODERATE
null
{'CWE-22'}
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}
null
NuGet
GHSA-mvvp-gwgc-5hrp
Path Traversal in elFinder.Net.Core
This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23407'}
2022-03-03T05:13:33.232451Z
2021-08-02T17:30:27Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://github.com/trannamtrung1st/elFinder.Net.Core', 'https://github.com/trannamtrung1st/elFinder.Net.Core/releases/tag/all-1.2.4'}
null
NuGet
GHSA-6jf5-rmhv-38cw
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0639'}
2022-03-03T05:13:47.983339Z
2019-04-09T19:44:03Z
HIGH
null
{'CWE-190'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0639', 'https://www.zerodayinitiative.com/advisories/ZDI-20-122/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0639', 'https://github.com/advisories/GHSA-6jf5-rmhv-38cw'}
null
OSS-Fuzz
OSV-2021-1168
Heap-buffer-overflow in exif_get_slong
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: exif_get_slong exif_get_long exif_get_rational ```
null
2022-04-13T03:04:40.883862Z
2021-08-25T00:01:25.325827Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570', 'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'}
{'https://github.com/libexif/libexif/commit/ce946b93dfd34b2187d9f9fb01603943fbb32137'}
OSS-Fuzz
OSV-2021-386
Stack-buffer-overflow in ot::Coap::Message::AppendUintOption
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831 ``` Crash type: Stack-buffer-overflow READ 1 Crash state: ot::Coap::Message::AppendUintOption ot::Coap::Message::AppendBlockOption otCoapMessageAppendBlock2Option ```
null
2022-04-13T03:04:38.946438Z
2021-02-13T00:00:59.547439Z
MEDIUM
null
null
{'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831'}
{'https://github.com/openthread/openthread/commit/2cd36266abaaf8b79ebb0441e6ed2ec3847cf3ca'}
OSS-Fuzz
OSV-2020-386
Heap-buffer-overflow in OPENSSL_strlcpy
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107 ``` Crash type: Heap-buffer-overflow WRITE 1 Crash state: OPENSSL_strlcpy OPENSSL_strlcat ERR_add_error_vdata ```
null
2022-04-13T03:04:38.742191Z
2020-07-01T00:00:06.528477Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107', 'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'}
{'https://github.com/openssl/openssl/commit/10f8b36874fca928c3f41834babac8ee94dd3f09'}
OSS-Fuzz
OSV-2017-39
Use-of-uninitialized-value in IsRelativeSymlinkSafe
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308 ``` Crash type: Use-of-uninitialized-value Crash state: IsRelativeSymlinkSafe ExtractUnixLink30 ExtractSymlink ```
null
2022-04-13T03:04:35.323958Z
2021-01-13T21:56:03.501889Z
MEDIUM
null
null
{'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308'}
{'https://github.com/aawc/unrar/commit/d2e5341ebf6f34c9bd5939c3ac812cb2cd983081'}
OSS-Fuzz
OSV-2020-2076
Use-of-uninitialized-value in UpdateDecStatNoFreezingInfo
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346 ``` Crash type: Use-of-uninitialized-value Crash state: UpdateDecStatNoFreezingInfo UpdateDecStat WelsDec::DecodeFrameConstruction ```
null
2022-04-13T03:04:37.372384Z
2020-10-16T00:00:42.366443Z
MEDIUM
null
null
{'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346'}
{'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'}
OSS-Fuzz
OSV-2020-369
UNKNOWN READ in ot::TimerScheduler::Remove
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383 ``` Crash type: UNKNOWN READ Crash state: ot::TimerScheduler::Remove ot::Mle::Mle::Stop otThreadSetEnabled ```
null
2022-04-13T03:04:38.951596Z
2020-07-01T00:00:05.571696Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383', 'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'}
{'https://github.com/openthread/openthread/commit/3eb5a106ffa6678e23c6bc244e843e264cae9b31'}
OSS-Fuzz
OSV-2020-693
Heap-buffer-overflow in parse_sec_attr_44
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: parse_sec_attr_44 setcos_select_file sc_select_file ```
null
2022-04-13T03:04:41.597761Z
2020-07-01T00:00:25.178023Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798', 'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'}
{'https://github.com/OpenSC/OpenSC/commit/7a1e42e1352201127d1a97b6cb5f41e48cace0f5'}
OSS-Fuzz
OSV-2020-2099
Heap-buffer-overflow in decode_chars
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674 ``` Crash type: Heap-buffer-overflow WRITE 1 Crash state: decode_chars decode_font process_text ```
null
2022-04-13T03:04:30.610125Z
2020-10-28T00:00:05.887987Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674', 'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'}
{'https://github.com/libass/libass/commit/910211f1c0078e37546f73e95306724358b89be2'}
OSS-Fuzz
OSV-2020-2133
Heap-buffer-overflow in tdefl_compress_lz_codes
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263 ``` Crash type: Heap-buffer-overflow WRITE 8 Crash state: tdefl_compress_lz_codes tdefl_compress_block tdefl_flush_block ```
null
2022-04-13T03:29:21.391124Z
2020-11-08T00:00:05.283717Z
HIGH
null
null
{'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263'}
{'https://github.com/fluent/fluent-bit//commit/03ff96d82f5f51a8bea6981fc9d7e8c3429c50b1', 'https://github.com/fluent/fluent-bit//commit/7a588237fdb744e5825fb119753dcad2e8878866'}
OSS-Fuzz
OSV-2020-739
UNKNOWN READ in str_decref
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756 ``` Crash type: UNKNOWN READ Crash state: str_decref obj_free mrb_gc_destroy ```
null
2022-04-13T03:04:39.688080Z
2020-07-01T00:00:27.971876Z
MEDIUM
null
null
{'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756'}
{'https://github.com/mruby/mruby/commit/caba5fef274ab7df91b7247182ecbf2483b853b8'}
OSS-Fuzz
OSV-2021-369
Segv on unknown address in blosc_read_header
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761 ``` Crash type: Segv on unknown address Crash state: blosc_read_header blosc2_getitem_ctx blosc_getitem ```
null
2022-04-13T03:04:40.205415Z
2021-02-11T00:01:00.831869Z
null
null
null
{'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761'}
{'https://github.com/Blosc/c-blosc2/commit/57fca38a4f51687d71e451ae29df6b353764fb72'}
OSS-Fuzz
OSV-2021-739
Stack-buffer-overflow in flb_sds_cat
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025 ``` Crash type: Stack-buffer-overflow READ {*} Crash state: flb_sds_cat flb_ra_translate record_ac_fuzzer.c ```
null
2022-04-13T03:04:38.249988Z
2021-05-08T00:01:15.452663Z
MEDIUM
null
null
{'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025', 'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c'}
{'https://github.com/fluent/fluent-bit//commit/68746b76af8b143daf477033a6799902be2f3cad'}
OSS-Fuzz
OSV-2020-410
Global-buffer-overflow in lex_multiline_string
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455 Crash type: Global-buffer-overflow READ 1 Crash state: lex_multiline_string lex_next parse_config
null
2021-03-09T04:49:05.872972Z
2020-07-01T00:00:07.995615Z
null
null
null
{'git://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455'}
{'git://github.com/lpereira/lwan/commit/c9ac13203b6685d3bf89ab6d257b37dd6b0d5833'}
OSS-Fuzz
OSV-2020-1965
UNKNOWN READ in asn1_item_print_ctx
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920 ``` Crash type: UNKNOWN READ Crash state: asn1_item_print_ctx asn1_template_print_ctx asn1_item_print_ctx ```
null
2022-04-13T03:04:38.790305Z
2020-10-03T00:00:22.855250Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920', 'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'}
{'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'}
OSS-Fuzz
OSV-2021-1754
UNKNOWN READ in insert_free_size
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42917 ``` Crash type: UNKNOWN READ Crash state: insert_free_size chunk_free_object pdfi_pscript_stack_finit ```
null
2022-04-13T03:04:34.631378Z
2021-12-25T00:01:31.295369Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42917', 'git://git.ghostscript.com/ghostpdl/commit/2c954310adc5753565a30dfe1b080f6a97ed4b4c'}
{'git://git.ghostscript.com/ghostpdl/commit/75fbddf52051987287e62d13c659eb73ba16982f'}
OSS-Fuzz
OSV-2020-943
Heap-buffer-overflow in pcpp::HeaderField::HeaderField
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: pcpp::HeaderField::HeaderField pcpp::TextBasedProtocolMessage::parseFields pcpp::SipResponseLayer::SipResponseLayer ```
null
2022-04-13T03:04:38.590838Z
2020-07-22T00:00:21.373584Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528', 'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'}
{'https://github.com/seladb/PcapPlusPlus/commit/4366d2f86bf105025765a0ce3db6e647ba0f3508'}
OSS-Fuzz
OSV-2020-1066
Heap-buffer-overflow in dav1dFeedData
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: dav1dFeedData dav1dCodecGetNextImage avifDecoderNextImage ```
null
2022-04-13T03:34:31.037013Z
2020-07-22T21:49:44.588962Z
MEDIUM
null
null
{'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947'}
{'https://github.com/AOMediaCodec/libavif/commit/4be7ce1dd3f0a45cd2555c94bd76a8f40baabcc4'}
OSS-Fuzz
OSV-2018-143
Global-buffer-overflow in CFF::BlendArg::set_blends
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714 ``` Crash type: Global-buffer-overflow READ 8 Crash state: CFF::BlendArg::set_blends CFF::CFF2CSOpSet<CFF2CSOpSet_SubrSubset, CFF::SubrSubsetParam, CFF::PathProcsNul CFF2CSOpSet_SubrSubset::process_op ```
null
2022-04-13T03:35:31.377146Z
2021-01-13T00:01:01.540340Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714', 'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'}
{'https://github.com/harfbuzz/harfbuzz/commit/0996c0ff6279f377e2b14f08663df2ce82de2b14'}
OSS-Fuzz
OSV-2021-555
Uncaught exception in java.base/java.util.concurrent.ConcurrentHashMap.putVal
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395 ``` Crash type: Uncaught exception Crash state: java.base/java.util.concurrent.ConcurrentHashMap.putVal java.base/java.util.concurrent.ConcurrentHashMap.put com.fasterxml.jackson.core.util.InternCache.intern ```
null
2022-04-13T03:04:31.802020Z
2021-03-25T00:00:09.158172Z
LOW
null
null
{'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501', 'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395'}
{'https://github.com/FasterXML/jackson-core/commit/2bd85ebcdd94233d9e59a0833f29e06ce4281f3b'}
OSS-Fuzz
OSV-2020-1573
Use-of-uninitialized-value in void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633 ``` Crash type: Use-of-uninitialized-value Crash state: void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig ```
null
2022-04-13T03:04:39.357700Z
2020-08-04T00:00:11.334079Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633', 'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'}
{'https://github.com/bblanchon/ArduinoJson/commit/298864bafe080e6a0a42185445b278be92820110'}
OSS-Fuzz
OSV-2021-1241
Heap-buffer-overflow in wabt::string_view::compare
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38404 ``` Crash type: Heap-buffer-overflow READ 6 Crash state: wabt::string_view::compare wabt::ReadBinary wabt::ReadBinaryIr ```
null
2022-05-05T00:04:25.136985Z
2021-09-12T00:01:27.535685Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38404'}
{'https://github.com/WebAssembly/wabt/commit/5b6070d749a005ad755610c341de813618cc3077'}
OSS-Fuzz
OSV-2020-806
Segv on unknown address in process_ndpi_collected_info
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122 ``` Crash type: Segv on unknown address Crash state: process_ndpi_collected_info packet_processing ndpi_workflow_process_packet ```
null
2022-04-13T03:04:35.988021Z
2020-07-14T05:37:42.995133Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122', 'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'}
{'https://github.com/ntop/nDPI/commit/4a09b4efa053a26e187119a540da4b41dd8a24d8'}
OSS-Fuzz
OSV-2020-1123
Index-out-of-bounds in store_reg_arm
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026 ``` Crash type: Index-out-of-bounds Crash state: store_reg_arm gen_load_exclusive_arm disas_arm_insn_arm ```
null
2022-04-13T03:04:39.220642Z
2020-07-22T21:49:48.909471Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026', 'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'}
{'https://github.com/unicorn-engine/unicorn/commit/46999575fb9e82ccd925e835d0d7db47200e010d'}