ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
NuGet | GHSA-2qgv-2cv4-g4cg | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0832'} | 2022-03-03T05:12:32.601494Z | 2021-07-28T18:57:27Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0832', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0832'} | null |
NuGet | GHSA-62gw-3rmj-wmp2 | High severity vulnerability that affects System.Management.Automation | ## Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in .NET Core
# Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in PowerShell Core
## Executive Summary
A denial of service vulnerability exists when PowerShell Core or .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a PowerShell Core scripts.
The update addresses the vulnerability by correcting how the .NET Core handles web requests.
System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).)
## Discussion
Please [open a support question](https://github.com/PowerShell/PowerShell/issues/new?assignees=&labels=Issue-Question&template=Support_Question.md&title=Support+Question) to discussion the PowerShell aspects of this advisory.
Please use dotnet/announcements#121 for discussion of the .NET aspects this advisory.
## <a name="affected-software">Affected Software</a>
The vulnerability affects PowerShell Core prior to the following versions:
| PowerShell Core Version | Fixed in |
|-------------------------|-------------------|
| 6.1 | 6.1.6 |
| 6.2 | 6.2.3 |
| 7.0 | unaffected |
## Advisory FAQ
### How do I know if I am affected?
If all of the following are true:
1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected.
1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`.
### How do I update to an unaffected version?
Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in PowerShell Core,
please email details to secure@microsoft.com.
### Support
You can ask questions about this issue on GitHub in the PowerShell organization.
This is located at https://github.com/PowerShell/.
The Announcements repo (https://github.com/PowerShell/Announcements)
will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions.
### What if the update breaks my script or module?
You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core.
This should be treated as a temporary measure.
Therefore, the script or module should be updated to work with the patched version of PowerShell Core.
### Acknowledgments
Paul Ryman of VMware Sydney Engineering Team
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information.
### External Links
[CVE-2019-1301](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301)
### Revisions
V1.0 (September 12, 2019): Advisory published.
*Version 1.0*
*Last Updated 2019-09-12* | {'CVE-2019-1301'} | 2022-03-03T05:14:10.104246Z | 2019-09-13T13:25:47Z | HIGH | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1301', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-62gw-3rmj-wmp2', 'https://github.com/advisories/GHSA-62gw-3rmj-wmp2', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301'} | null |
NuGet | GHSA-8pp6-8x4q-c5mx | Server side request forgery in C1 CMS | C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary files to zero size (effectively delete them) leading to denial of service (DoS) or altering application logic. The authenticated user may unknowingly perform the actions by visiting a specially crafted site. Patched in C1 CMS v6.12, no known workarounds exist. | {'CVE-2022-24789'} | 2022-04-07T15:46:50.839867Z | 2022-03-30T00:00:31Z | HIGH | null | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24789', 'https://github.com/Orckestra/C1-CMS-Foundation', 'https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45', 'https://github.com/Orckestra/C1-CMS-Foundation/releases/tag/v6.12'} | null |
NuGet | GHSA-8m73-w2r2-6xxj | Insecure defaults in UmbracoForms | This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types, depending on their security needs and policies. | {'CVE-2020-7685'} | 2022-03-03T05:13:10.518744Z | 2020-07-29T17:29:51Z | HIGH | null | {'CWE-1188'} | {'https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7685'} | null |
NuGet | GHSA-958r-g534-ccmr | Moderate severity vulnerability that affects MadsKristensen.AspNetCore.Miniblog | madskristensen Miniblog.Core through 2019-01-16 allows remote attackers to execute arbitrary ASPX code via an IMG element with a data: URL, because SaveFilesToDisk in Controllers/BlogController.cs writes a decoded base64 string to a file without validating the extension. | {'CVE-2019-9845'} | 2022-03-03T05:13:47.353764Z | 2019-07-05T21:11:13Z | CRITICAL | null | {'CWE-20'} | {'https://github.com/madskristensen/Miniblog.Core/blob/master/src/Controllers/BlogController.cs#L142', 'https://github.com/madskristensen/Miniblog.Core', 'https://rastating.github.io/miniblog-remote-code-execution/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9845', 'https://github.com/advisories/GHSA-958r-g534-ccmr'} | null |
NuGet | GHSA-6xh7-4v2w-36q6 | ASP.NET Core fails to properly validate web requests | A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range. | {'CVE-2017-0247'} | 2022-04-26T19:15:30.589738Z | 2018-10-16T19:58:05Z | HIGH | null | {'CWE-20'} | {'https://technet.microsoft.com/en-us/library/security/4021279.aspx', 'https://github.com/aspnet/Announcements/issues/239', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0247', 'https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS', 'https://github.com/advisories/GHSA-6xh7-4v2w-36q6'} | null |
NuGet | GHSA-5frh-8cmj-gc59 | High severity vulnerability that affects System.Management.Automation | ## Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability
# Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability
## Executive Summary
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement.
An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine.
To exploit the vulnerability,
an attacker would first have access to the local machine where PowerShell is running in Constrained Language mode.
By doing that an attacker could leverage script debugging to abuse signed modules in an unintended way.
The update addresses the vulnerability by correcting how PowerShell functions in Constrained Language Mode.
System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).)
## Discussion
Please use PowerShell/PowerShell#TBD for discussion of this advisory.
## <a name="affected-software">Affected Software</a>
The vulnerability affects PowerShell Core prior to the following versions:
| PowerShell Core Version | Fixed in |
|-------------------------|-------------------|
| 6.1 | 6.1.5 |
| 6.2 | 6.2.2 |
## Advisory FAQ
### How do I know if I am affected?
If all of the following are true:
1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected.
1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`.
### How do I update to an unaffected version?
Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in PowerShell Core,
please email details to secure@microsoft.com.
### Support
You can ask questions about this issue on GitHub in the PowerShell organization.
This is located at https://github.com/PowerShell/.
The Announcements repo (https://github.com/PowerShell/Announcements)
will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions.
### What if the update breaks my script or module?
You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core.
This should be treated as a temporary measure.
Therefore, the script or module should be updated to work with the patched version of PowerShell Core.
### Acknowledgments
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information.
### External Links
[CVE-2019-1167](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167)
### Revisions
V1.0 (July 16, 2019): Advisory published.
*Version 1.0*
*Last Updated 2019-07-16* | {'CVE-2019-1167'} | 2022-03-03T05:13:03.806720Z | 2019-07-17T19:14:18Z | MODERATE | null | null | {'https://github.com/advisories/GHSA-5frh-8cmj-gc59', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1167', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-5frh-8cmj-gc59'} | null |
NuGet | GHSA-vw2g-5827-m9fp | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366. | {'CVE-2019-1308'} | 2022-03-03T05:12:56.773266Z | 2021-03-29T20:55:52Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1308', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'} | null |
NuGet | GHSA-qwwr-qc2p-6283 | Out-of-bounds write in libpng | An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png. | {'CVE-2018-14550'} | 2022-03-03T05:13:30.858298Z | 2021-03-22T16:57:07Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-14550', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612', 'https://github.com/glennrp/libpng', 'https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/glennrp/libpng/issues/246', 'https://security.gentoo.org/glsa/201908-02'} | null |
NuGet | GHSA-9824-rp6m-xx9w | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0989'} | 2022-03-03T05:13:01.401560Z | 2021-03-29T20:59:04Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'} | null |
NuGet | GHSA-x7fx-mcc9-27j7 | Inappropriate implementation in V8 in CefSharp | High CVE-2020-16013: Inappropriate implementation in V8.
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
There is currently little to no public information on the issue other than it has been flagged as `High` severity. | {'CVE-2020-16013'} | 2022-03-03T05:13:49.080541Z | 2020-11-27T20:12:55Z | HIGH | null | {'CWE-787', 'CWE-119'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-16013', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-x7fx-mcc9-27j7', 'https://crbug.com/1147206', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'} | null |
NuGet | GHSA-qxx8-292g-2w66 | Improper Authentication | ### Impact
A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an an attacker to have internal knowledge of the bot.
### Patches
The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case.
### Workarounds
Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator which throws an exception if the Claims are Skill Claims.
For detailed instructions, see the link in the References section.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet)
* Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com) | null | 2022-03-03T05:14:01.958202Z | 2021-03-08T15:50:01Z | HIGH | null | {'CWE-287'} | {'https://aka.ms/SkillClaimsValidationDotnet', 'https://github.com/microsoft/botbuilder-dotnet/security/advisories/GHSA-qxx8-292g-2w66', 'https://www.nuget.org/packages/Microsoft.Bot.Connector/'} | null |
NuGet | GHSA-2cwj-8chv-9pp9 | XML External Entity attack in log4net | Apache log4net before 2.0.10 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users. | {'CVE-2018-1285'} | 2022-04-25T23:16:56.185266Z | 2021-01-29T19:47:23Z | CRITICAL | null | {'CWE-611'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKL2LPINAI6BCMXOH4V4HVHGLUXIWOFO/', 'https://lists.apache.org/thread.html/reab1c277c95310bad1038255e0757857b2fbe291411b4fa84552028a%40%3Cdev.logging.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2U233HVAQDSZ2PRG4XSGDASLY3J6ALH/', 'https://lists.apache.org/thread.html/r525cbbd7db0aef4a114cf60de8439aa285decc34904d42a7f14f39c3@%3Cdev.logging.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-LOG4NET-568897', 'https://lists.apache.org/thread.html/r7ab6b6e702f11a6f77b0db2af2d5e5532f56ae4b99b5fe73c5200b6a@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r00b16ac5e0bbf7009a0d167ed58f3f94d0033b0f4b3e3d5025cc4872@%3Cdev.logging.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r33564de316d4e4ba0fea1d4d079e62cde1ffe64369c1157243d840d9@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/r9de86a185575e6c5f92e2a70a1d2e2e9514dc4341251577aac8e3866@%3Cdev.logging.apache.org%3E', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2018-1285', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd2d72a017e238d1f345f9d14e075c81be16fc68a41c9e9ad9e29a732@%3Cdev.logging.apache.org%3E', 'https://issues.apache.org/jira/browse/LOG4NET-575', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1285', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.nuget.org/packages/log4net/', 'https://github.com/apache/logging-log4net', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT2DNNSW7C7FNK3MA3SLEUHGW5USYZKE/', 'https://lists.apache.org/thread.html/r6543acafca3e2d24ff4b0c364a91540cb9378977ffa8d37a03ab4b0f@%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/rdbac24c945ca5c69cd5348b5ac023bc625768f653335de146e09ae2d@%3Cdev.logging.apache.org%3E'} | null |
NuGet | GHSA-c77f-4rgj-jfr4 | Cross-site Scripting in Beego | Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page. | {'CVE-2021-39391'} | 2021-09-27T18:58:23Z | 2021-09-15T20:23:28Z | HIGH | null | {'CWE-79', 'CWE-64'} | {'https://github.com/beego/beego/issues/4727', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39391', 'https://github.com/beego/beego'} | null |
NuGet | GHSA-9475-xg6m-j7pw | Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET | ### Impact
Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved.
The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session.
### Patches
Version 1.0.2 and 2.7.0 are patched.
### Workarounds
Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP.
### For more information
If you have any questions or comments about this advisory:
* Comment on #103
* Email us at security@sustainsys.com if you think that there are further security issues. | {'CVE-2020-5268'} | 2022-03-03T05:12:52.477872Z | 2020-04-22T20:59:37Z | MODERATE | null | {'CWE-303'} | {'https://github.com/Sustainsys/Saml2/issues/712', 'https://www.nuget.org/packages/Sustainsys.Saml2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} | null |
NuGet | GHSA-jv2c-mhcq-6wp4 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0829'} | 2022-03-03T05:13:54.641761Z | 2021-07-28T18:57:39Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0829', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0829'} | null |
NuGet | GHSA-874w-m2v2-mj64 | Double Free in Adplug | AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h. | {'CVE-2019-15151'} | 2022-03-03T05:13:08.121515Z | 2021-03-29T20:48:45Z | CRITICAL | null | {'CWE-415'} | {'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151', 'https://github.com/adplug/adplug/issues/91'} | null |
NuGet | GHSA-m22m-h4rf-pwq3 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3. | {'CVE-2021-32840'} | 2022-03-03T05:13:40.088268Z | 2022-02-01T16:22:50Z | HIGH | null | {'CWE-22'} | {'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32840', 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc', 'https://github.com/icsharpcode/SharpZipLib', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'} | null |
NuGet | GHSA-jrmq-rv9w-63rv | Umbraco ApplicationURL Overwrite | Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites users to the site. For Umbraco versions less than 9.2.0, if the Application URL is not specifically configured, the attacker can manipulate this value and store it persistently affecting all users for components where the "UmbracoApplicationUrl" is used. For example, the attacker is able to change the URL users receive when resetting their password so that it points to the attackers server, when the user follows this link the reset token can be intercepted by the attacker resulting in account takeover. | {'CVE-2022-22690'} | 2022-03-03T05:13:47.635567Z | 2022-01-21T23:34:24Z | HIGH | null | {'CWE-444'} | {'https://github.com/umbraco/Umbraco-CMS', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22690'} | null |
NuGet | GHSA-xpwp-rq3x-x6v7 | Critical severity vulnerability that affects recurly-api-client | The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources. | {'CVE-2017-0907'} | 2022-03-03T05:12:43.938941Z | 2018-10-16T17:35:04Z | CRITICAL | null | {'CWE-918'} | {'https://dev.recurly.com/page/net-updates', 'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7', 'https://hackerone.com/reports/288635', 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907'} | null |
NuGet | GHSA-wmpm-fq7r-jq56 | Imporoper path validation in elFinder.NetCore | This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation. | {'CVE-2021-23427'} | 2022-03-03T05:12:57.836160Z | 2021-09-02T22:05:17Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23427', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L226', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L226', 'https://github.com/gordon-matt/elFinder.NetCore'} | null |
NuGet | GHSA-365p-96qv-xr7g | ASP.NET Core allow an elevation of privilege | ASP.NET Core 1.0. 1.1, and 2.0 allow an elevation of privilege vulnerability due to how web applications that are created from templates validate web requests, aka "ASP.NET Core Elevation Of Privilege Vulnerability". | {'CVE-2018-0787'} | 2022-04-26T19:15:43.889740Z | 2018-10-16T19:56:59Z | HIGH | null | {'CWE-640'} | {'https://github.com/aspnet/Announcements/issues/295', 'http://www.securitytracker.com/id/1040525', 'https://github.com/advisories/GHSA-365p-96qv-xr7g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0787', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0787', 'http://www.securityfocus.com/bid/103282'} | null |
NuGet | GHSA-cmhx-cq75-c4mj | Regular Expression Denial of Service (ReDoS) | A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981. | {'CVE-2019-0820'} | 2022-03-03T05:12:47.255590Z | 2021-08-04T21:03:46Z | MODERATE | null | {'CWE-400'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820', 'https://access.redhat.com/errata/RHSA-2019:1259', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0820'} | null |
NuGet | GHSA-9cxh-gqpx-qc5m | Credential Disclosure in System.DirectoryServices.Protocols | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux.
### Patches
Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux.
Package name | Vulnerable versions | Secure versions
------------ | ---------------- | -------------------------
System.DirectoryServices.Protocols | 5.0.0 | 5.0.1
### Other Details
- Announcement for this issue can be found at dotnet/announcements#202
- An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355 | {'CVE-2021-41355'} | 2022-03-03T05:14:16.252121Z | 2021-10-12T17:49:25Z | MODERATE | null | {'CWE-200'} | {'https://github.com/dotnet/runtime/issues/60301', 'https://github.com/dotnet/runtime', 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355'} | null |
NuGet | GHSA-fvpg-qx3g-7mp7 | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0773, CVE-2019-0783. | {'CVE-2019-0771'} | 2022-03-03T05:13:51.799924Z | 2019-04-09T19:43:29Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771', 'https://github.com/advisories/GHSA-fvpg-qx3g-7mp7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0771'} | null |
NuGet | GHSA-grvw-q343-58wh | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298. | {'CVE-2019-1300'} | 2022-03-03T05:13:58.668379Z | 2021-03-29T20:55:57Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300'} | null |
NuGet | GHSA-4vp3-vfww-8648 | Incorrect permission enforcement in UmbracoCms | Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access. | {'CVE-2020-29454'} | 2022-03-03T05:13:08.289579Z | 2021-04-13T15:48:05Z | MODERATE | null | {'CWE-732'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-29454', 'https://github.com/umbraco/Umbraco-CMS/pull/9361'} | null |
NuGet | GHSA-xxfr-jrgh-x392 | Remote code execution in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1180. | {'CVE-2020-1172'} | 2022-03-03T05:14:04.519376Z | 2021-08-02T17:29:01Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/pull/6500', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1172', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1172'} | null |
NuGet | GHSA-v5rv-hpxg-8x49 | Signature validation bypass in ServiceStack | ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature. | {'CVE-2020-28042'} | 2022-03-03T05:13:06.294605Z | 2021-01-13T19:13:11Z | MODERATE | null | {'CWE-347'} | {'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519', 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.nuget.org/packages/ServiceStack/'} | null |
NuGet | GHSA-5rcr-q3rx-j7vr | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106. | {'CVE-2019-1107'} | 2022-03-03T05:13:46.158859Z | 2021-03-29T20:57:35Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} | null |
NuGet | GHSA-3w9q-c44j-37jj | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783. | {'CVE-2019-0773'} | 2022-03-03T05:13:59.087096Z | 2019-04-09T19:43:32Z | HIGH | null | {'CWE-787'} | {'https://github.com/advisories/GHSA-3w9q-c44j-37jj', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0773'} | null |
NuGet | GHSA-gvqv-779r-4jgp | Use after free in CefSharp | CVE-2020-16017: Use after free in site isolation
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
There is currently little to no public information on the issue other than it has been flagged as `High` severity. | {'CVE-2020-16017'} | 2022-03-03T05:12:54.570961Z | 2020-11-27T20:13:05Z | HIGH | null | {'CWE-416'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-16017', 'https://crbug.com/1146709', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'} | null |
NuGet | GHSA-hrmm-f4j8-8vxc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0922'} | 2022-03-03T05:14:02.985181Z | 2021-03-29T21:00:11Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-ghhp-997w-qr28 | .NET Core Remote Code Execution Vulnerability | .NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.
### Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed.
### Discussion
Discussion for this issue can be found at dotnet/runtime#49377
### Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
### Affected software
The vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability.
Vulnerable package versions:
Any .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below.
Package Name | Vulnerable Versions | Secure Versions
-|-|-
System.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1
System.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2
System.Text.Encodings.Web | 5.0.0 | 5.0.1
Please validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.
| {'CVE-2021-26701'} | 2022-03-03T05:13:15.944964Z | 2021-04-21T19:38:01Z | CRITICAL | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/', 'https://github.com/dotnet/announcements/issues/178'} | null |
NuGet | GHSA-7rq6-7gv8-c37h | Missing Authorization with Default Settings in Dashboard UI | Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings.
However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed.
### Impact
Missing authorization when default options are used for the Dashboard UI, e.g. when no custom authorization rules are used as recommended in the [Using Dashboard](https://docs.hangfire.io/en/latest/configuration/using-dashboard.html#configuring-authorization) documentation article.
#### Impacted
If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted:
```csharp
app.UseHangfireDashboard(); // Impacted
app.UseHangfireDashboard("/hangfire", new DashboardOptions()); // Impacted
```
#### Not Impacted
If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted:
```csharp
app.UseHangfireDashboard("/hangfire", new DashboardOptions
{
Authorization = new []{ new SomeAuthorizationFilter(); } // Not impacted
});
```
### Patches
Patch is already available in version [1.7.26](https://github.com/HangfireIO/Hangfire/releases/tag/v1.7.26) and already available on NuGet.org, please see [Hangfire.Core 1.7.26](https://www.nuget.org/packages/Hangfire.Core/1.7.26). Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue.
### Workarounds
It is possible to fix the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. In this case upgrade is not required.
```csharp
// using Hangfire.Dashboard;
app.UseHangfireDashboard("/hangfire", new DashboardOptions
{
Authorization = new []{ new LocalRequestsOnlyAuthorizationFilter(); }
});
```
### References
Original GitHub Issue: https://github.com/HangfireIO/Hangfire/issues/1958 | {'CVE-2021-41238'} | 2021-11-03T14:35:35Z | 2021-11-03T17:30:59Z | HIGH | null | {'CWE-862'} | {'https://github.com/HangfireIO/Hangfire', 'https://github.com/HangfireIO/Hangfire/issues/1958', 'https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h', 'https://www.nuget.org/packages/Hangfire.Core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41238'} | null |
NuGet | GHSA-6j89-jhpr-849f | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366. | {'CVE-2019-1307'} | 2022-03-03T05:13:12.777814Z | 2021-03-29T20:55:46Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307'} | null |
NuGet | GHSA-7jgj-8wvc-jh57 | .NET Core Information Disclosure | An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0. | {'CVE-2018-8292'} | 2022-03-03T05:14:01.988987Z | 2021-04-21T19:16:06Z | HIGH | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8292', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292', 'http://www.securityfocus.com/bid/105548', 'https://github.com/dotnet/announcements/issues/88', 'https://access.redhat.com/errata/RHSA-2018:2902'} | null |
NuGet | GHSA-9rjp-r58j-fxgq | Path traversal in elFinder.NetCore | This affects all versions of package elFinder.NetCore. The Path.Combine(...) method is used to create an absolute file path. Due to missing sanitation of the user input and a missing check of the generated path its possible to escape the Files directory via path traversal | {'CVE-2021-23428'} | 2022-03-03T05:13:31.269942Z | 2021-09-02T22:05:26Z | HIGH | null | {'CWE-20', 'CWE-22'} | {'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23428', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L387', 'https://github.com/gordon-matt/elFinder.NetCore', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1313838'} | null |
NuGet | GHSA-ppxc-pmx9-qjv9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1195'} | 2022-03-03T05:12:39.713478Z | 2021-03-29T20:57:59Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
NuGet | GHSA-cwqq-w8c3-r2jw | Uncontrolled Resource Consumption in MetadataExtractor | MetadataExtractor 2.1.0 allows stack consumption. | {'CVE-2019-14262'} | 2022-03-03T05:14:05.345035Z | 2019-08-23T00:04:56Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-14262', 'https://github.com/drewnoakes/metadata-extractor-dotnet/pull/190', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'} | null |
NuGet | GHSA-7q36-4xx7-xcxf | Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack | ### Impact
When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors:
1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized.
1. stack overflow - leading to the deserializing process crashing.
### Patches
The following steps are required to mitigate this risk.
1. Upgrade to a version of the library where a fix is available
1. Add code to your application to put MessagePack into the defensive `UntrustedData` mode.
1. Identify all MessagePack extensions that implement `IMessagePackFormatter<T>` implementations that do not ship with the MessagePack library to include the security mitigations. This includes those acquired from 3rd party packages and classes included directly into your project. Any AOT formatters generated with the MPC tool must be regenerated with the patched version of mpc.
1. Review your messagepack-serializable data structures for hash-based collections that use custom or unusual types for the hashed key. See below for details on handling such situations.
Review the `MessagePackSecurity` class to tweak any settings as necessary to strike the right balance between performance, functionality, and security.
Specialized `IEqualityComparer<T>` implementations provide the hash collision resistance.
Each type of hashed key may require a specialized implementation of its own.
The patched MessagePack library includes many such implementations for primitive types commonly used as keys in hash-based collections.
If your data structures use custom types as keys in these hash-based collections,
putting MessagePack in `UntrustedData` mode may lead the deserializer to throw an exception
because no safe `IEqualityComparer<T>` is available for your custom `T` type.
You can provide your own safe implementation by deriving from the `MessagePackSecurity` class
and overriding the `GetHashCollisionResistantEqualityComparer<T>()` method to return your own
custom implementation when `T` matches your type, and fallback to `return base.GetHashCollisionResistantEqualityComparer<T>();` for types you do not have custom implementations for.
Unrelated to this advisory, but as general security guidance, you should also avoid the Typeless serializer/formatters/resolvers for untrusted data as that opens the door for the untrusted data to potentially deserialize unanticipated types that can compromise security.
#### MessagePack 1.x users
1. Upgrade to any 1.9.x version.
1. When deserializing untrusted data, put MessagePack into a more secure mode with:
```cs
MessagePackSecurity.Active = MessagePackSecurity.UntrustedData;
```
In MessagePack v1.x this is a static property and thus the security level is shared by the entire process or AppDomain.
Use MessagePack v2.1 or later for better control over the security level for your particular use.
1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `MessagePackSecurity` class.
Review any custom-written `IMessagePackFormatter<T>` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required.
In particular, a formatter that deserializes an object (as opposed to a primitive value) should wrap the deserialization in a `using (MessagePackSecurity.DepthStep())` block. For example:
```cs
public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options)
{
if (reader.TryReadNil())
{
return default;
}
else
{
using (MessagePackSecurity.DepthStep()) // STACK OVERFLOW MITIGATION
{
MyObject o = new MyObject();
// deserialize members of the object here.
return o;
}
}
}
```
If your custom formatter creates hash-based collections (e.g. `Dictionary<K, V>` or `HashSet<T>`) where the hashed key comes from the messagepack data, always instantiate your collection using `MessagePackSecurity.Active.GetEqualityComparer<T>()` as the equality comparer:
```cs
var collection = new HashSet<T>(MessagePackSecurity.Active.GetEqualityComparer<T>());
```
This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm.
Learn more about [best security practices when reading untrusted data with MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security).
#### MessagePack 2.x users
1. Upgrade to any 2.1.x or later version.
1. When deserializing untrusted data, put MessagePack into a more secure mode by configuring your `MessagePackSerializerOptions.Security` property:
```cs
var options = MessagePackSerializerOptions.Standard
.WithSecurity(MessagePackSecurity.UntrustedData);
// Pass the options explicitly for the greatest control.
T object = MessagePackSerializer.Deserialize<T>(data, options);
// Or set the security level as the default.
MessagePackSerializer.DefaultOptions = options;
```
1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `Security` member on the `MessagePackSerializerOptions` parameter.
Review any custom-written `IMessagePackFormatter<T>` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required.
In particular, a formatter that deserializes an object (as opposed to a primitive value) should call `options.Security.DepthStep(ref reader);` before deserializing the object's members, and be sure to revert the depth step with `reader.Depth--;` before exiting the method. For example:
```cs
public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options)
{
if (reader.TryReadNil())
{
return default;
}
else
{
options.Security.DepthStep(ref reader); // STACK OVERFLOW MITIGATION, line 1
try
{
MyObject o = new MyObject();
// deserialize members of the object here.
return o;
}
finally
{
reader.Depth--; // STACK OVERFLOW MITIGATION, line 2
}
}
}
```
If your custom formatter creates hash-based collections (e.g. `Dictionary<K, V>` or `HashSet<T>`) where the hashed key comes from the messagepack data, always instantiate your collection using `options.Security.GetEqualityComparer<TKey>()` as the equality comparer:
```cs
var collection = new HashSet<T>(options.Security.GetEqualityComparer<T>());
```
This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm.
Learn more about [best security practices when reading untrusted data with MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security).
### Workarounds
The security vulnerabilities are in the formatters.
Avoiding the built-in formatters entirely in favor of reading messagepack primitive data directly
or relying on carefully written custom formatters can provide a workaround.
MessagePack v1.x users may utilize the `MessagePackBinary` static class directly to read the data they expect.
MessagePack v2.x users may utilize the `MessagePackReader` struct directly to read the data they expect.
### References
Learn more about best security practices when reading untrusted data with [MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security) or [MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [MessagePack-CSharp](https://github.com/neuecc/MessagePack-CSharp/issues/new/choose)
* [Email us](mailto:andrewarnott@gmail.com) | {'CVE-2020-5234'} | 2022-03-03T05:13:22.194363Z | 2020-01-31T17:59:20Z | MODERATE | null | {'CWE-121'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5234', 'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/issues/810', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'} | null |
NuGet | GHSA-qwwg-gc55-qqrv | Out-of-bounds Write in Chakra | Chakra Scripting Engine Memory Corruption Vulnerability | {'CVE-2020-17131'} | 2022-03-03T05:13:32.773319Z | 2021-04-13T15:54:40Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-17131', 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v11124', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17131', 'https://github.com/chakra-core/ChakraCore/pull/6531'} | null |
NuGet | GHSA-7423-5qfm-g648 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0916'} | 2022-03-03T05:13:45.933184Z | 2021-03-29T21:00:09Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-2x7h-96h5-rq84 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability. | {'CVE-2021-32841'} | 2022-03-03T05:13:28.356898Z | 2022-02-01T16:22:57Z | MODERATE | null | {'CWE-22'} | {'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'} | null |
NuGet | GHSA-qpvx-gpqm-g98j | Critical severity vulnerability that affects Auth0-WCF-Service-JWT | Auth0 Auth0-WCF-Service-JWT before 1.0.4 leaks the expected JWT signature in an error message when it cannot successfully validate the JWT signature. If this error message is presented to an attacker, they can forge an arbitrary JWT token that will be accepted by the vulnerable application. | {'CVE-2019-7644'} | 2022-03-03T05:14:11.380083Z | 2019-04-18T14:28:03Z | CRITICAL | null | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-7644', 'https://github.com/advisories/GHSA-qpvx-gpqm-g98j', 'https://auth0.com/docs/security/bulletins/cve-2019-7644'} | null |
NuGet | GHSA-jhx3-2w5x-x39x | High severity vulnerability that affects Microsoft.ChakraCore | An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'. | {'CVE-2019-0746'} | 2022-03-03T05:13:20.300080Z | 2019-04-09T19:43:38Z | MODERATE | null | null | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0746', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0746', 'https://github.com/advisories/GHSA-jhx3-2w5x-x39x'} | null |
NuGet | GHSA-cgpw-2gph-2r9g | Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.App, and Microsoft.AspNetCore.Server.Kestrel.Core | Microsoft is aware of a denial of service vulnerability in ASP.NET Core when a malformed request is terminated. An attacker who successfully exploited this vulnerability could cause a denial of service attack.
The update addresses the vulnerability by correcting how ASP.NET Core handles such requests.
| null | 2022-03-03T05:14:10.817951Z | 2018-10-16T19:59:59Z | MODERATE | null | null | {'https://github.com/aspnet/Announcements/issues/311', 'https://github.com/advisories/GHSA-cgpw-2gph-2r9g'} | null |
NuGet | GHSA-g8j6-m4p7-5rfq | High severity vulnerability that affects DotNetNuke.Core | DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources. | {'CVE-2017-0929'} | 2022-03-03T05:13:02.306663Z | 2018-10-16T17:18:12Z | HIGH | null | {'CWE-918'} | {'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq', 'https://github.com/dnnsoftware/Dnn.Platform', 'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0929'} | null |
NuGet | GHSA-rh4p-g7x6-8pqg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1062'} | 2022-03-03T05:13:18.764715Z | 2021-03-29T20:59:09Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1062', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} | null |
NuGet | GHSA-9qw8-ccq9-ffj9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1139'} | 2022-03-03T05:14:02.943957Z | 2021-03-29T20:57:53Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
NuGet | GHSA-mv2r-q4g5-j8q5 | Microsoft.Data.OData Library improperly handles web requests | A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData. | {'CVE-2018-8269'} | 2022-04-26T19:15:33.814215Z | 2018-10-16T19:58:31Z | HIGH | null | null | {'http://www.securityfocus.com/bid/105322', 'https://github.com/advisories/GHSA-mv2r-q4g5-j8q5', 'https://www.exploit-db.com/exploits/46101/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8269', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8269'} | null |
NuGet | GHSA-868x-rg4c-cjqg | Allocation of Resources Without Limits or Throttling in Apache Avro | A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue. | {'CVE-2021-43045'} | 2022-03-03T05:12:44.845846Z | 2022-01-08T00:39:20Z | HIGH | null | {'CWE-770'} | {'http://www.openwall.com/lists/oss-security/2022/01/06/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43045', 'https://lists.apache.org/thread/5fttw9vk6gd2p3b846nox7hcj5469xfd'} | null |
NuGet | GHSA-v76m-f5cx-8rg4 | Moderate severity vulnerability that affects DotNetNuke.Core | Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 7.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'CVE-2015-1566'} | 2022-03-03T05:12:55.069394Z | 2018-10-16T19:33:25Z | MODERATE | null | {'CWE-79'} | {'http://www.dnnsoftware.com/platform/manage/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1566', 'http://secunia.com/advisories/62832', 'https://github.com/advisories/GHSA-v76m-f5cx-8rg4'} | null |
NuGet | GHSA-w89r-qch4-8jv5 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0912'} | 2022-03-03T05:13:37.247605Z | 2021-03-29T20:59:59Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-2x75-mf24-588m | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1092'} | 2022-03-03T05:14:00.642186Z | 2021-03-29T20:59:11Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1092'} | null |
NuGet | GHSA-6cc6-66f5-mxjj | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0826'} | 2022-03-03T05:12:54.986188Z | 2021-07-28T18:58:03Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0826', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0826'} | null |
NuGet | GHSA-j3jw-j2j8-2wv9 | Improper Verification of Cryptographic Signature in starkbank-ecdsa | The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | {'CVE-2021-43569'} | 2022-03-03T05:13:27.411400Z | 2021-11-10T20:58:03Z | CRITICAL | null | {'CWE-347'} | {'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-dotnet', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43569', 'https://github.com/starkbank/ecdsa-dotnet/releases/tag/v1.3.2'} | null |
NuGet | GHSA-86gw-g9jv-8vfg | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0848. | {'CVE-2020-0833'} | 2022-03-03T05:12:52.517561Z | 2021-07-28T18:57:55Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0833', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0833'} | null |
NuGet | GHSA-m7mf-48hp-5qmr | Inappropriate implementation in V8 | CVE-2020-16009: Inappropriate implementation in V8
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
Google is aware of reports that exploits for CVE-2020-16009 exist in the wild.
Allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
There is currently little to no public information on the issue other than it has been flagged as `High` severity. | {'CVE-2020-16009'} | 2022-03-03T05:12:45.422502Z | 2020-12-02T18:28:47Z | HIGH | null | {'CWE-787'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4XYJ7B6OXHZNYSA5J3DBUOFEC6WCAGW/', 'https://security.gentoo.org/glsa/202011-12', 'http://packetstormsecurity.com/files/159974/Chrome-V8-Turbofan-Type-Confusion.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SC3U3H6AISVZB5PLZLLNF4HMQ4UFFL7M/', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00017.html', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-m7mf-48hp-5qmr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16009', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html', 'https://www.debian.org/security/2021/dsa-4824', 'https://crbug.com/1143772', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html'} | null |
NuGet | GHSA-2452-3rwv-x89c | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300. | {'CVE-2019-1298'} | 2022-03-03T05:13:43.259043Z | 2021-03-29T20:56:01Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298'} | null |
NuGet | GHSA-hfvc-g252-rp4g | Denial of Service in i18n | This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | {'CVE-2020-7791'} | 2022-03-03T05:14:11.849809Z | 2020-12-14T19:50:22Z | MODERATE | null | {'CWE-400', 'CWE-20'} | {'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E'} | null |
NuGet | GHSA-6w5m-jgc5-8cgc | orchardcore is vulnerable to Cross-site Scripting | orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0159'} | 2022-03-03T05:14:13.613996Z | 2022-01-21T23:57:49Z | MODERATE | null | {'CWE-79'} | {'https://github.com/orchardcms/orchardcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} | null |
NuGet | GHSA-ch6p-4jcm-h8vh | Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc and Microsoft.AspNetCore.Mvc.Core | Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability." | {'CVE-2017-0248'} | 2022-03-03T05:09:36.735815Z | 2018-10-16T19:58:52Z | MODERATE | null | {'CWE-295'} | {'https://github.com/advisories/GHSA-ch6p-4jcm-h8vh', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248', 'http://www.securitytracker.com/id/1038458', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0248', 'http://www.securityfocus.com/bid/98117'} | null |
NuGet | GHSA-x2rg-fmcv-crq5 | DNN (aka DotNetNuke) has Remote Code Execution via a cookie | DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites." | {'CVE-2017-9822'} | 2022-04-26T19:00:09.603785Z | 2018-10-16T19:34:22Z | HIGH | null | {'CWE-20'} | {'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'http://www.dnnsoftware.com/community/security/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9822', 'http://www.securityfocus.com/bid/102213', 'https://github.com/advisories/GHSA-x2rg-fmcv-crq5'} | null |
NuGet | GHSA-2wwc-w2gw-4329 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335. | {'CVE-2019-1366'} | 2022-03-03T05:13:27.978381Z | 2021-03-29T20:55:36Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'} | null |
NuGet | GHSA-rqrc-8q8f-cp9c | Infinite loop in .Net Bond | A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads. | {'CVE-2020-1469'} | 2022-04-08T18:34:02.348210Z | 2022-04-08T18:11:51Z | HIGH | null | {'CWE-434', 'CWE-835'} | {'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://github.com/microsoft/bond/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469'} | null |
NuGet | GHSA-7378-6268-4278 | High severity vulnerability that affects DotNetZip | DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | {'CVE-2018-1002205'} | 2022-03-03T05:13:57.586333Z | 2018-10-16T17:16:40Z | HIGH | null | {'CWE-22'} | {'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366', 'https://github.com/haf/DotNetZip.Semverd/pull/121', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://github.com/snyk/zip-slip-vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/research/zip-slip-vulnerability', 'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245'} | null |
NuGet | GHSA-pv36-h7jh-qm62 | Heap buffer overflow in CefSharp | ### Impact
A memory corruption bug(Heap overflow) in the FreeType font rendering library.
> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .
As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.
### Patches
Upgrade to 85.3.130 or higher
### References
- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942
To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d | {'CVE-2020-15999'} | 2022-03-03T05:13:02.892365Z | 2020-10-27T19:47:38Z | MODERATE | null | {'CWE-787', 'CWE-119'} | {'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62', 'https://security.gentoo.org/glsa/202011-12', 'https://www.nuget.org/packages/CefSharp.Wpf.HwndHost', 'https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html', 'https://www.nuget.org/packages/CefSharp.Common/', 'https://www.nuget.org/packages/CefSharp.WinForms', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15999', 'https://github.com/cefsharp/CefSharp', 'https://crbug.com/1139963', 'http://seclists.org/fulldisclosure/2020/Nov/33', 'https://www.debian.org/security/2021/dsa-4824', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/', 'https://security.gentoo.org/glsa/202012-04', 'https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html', 'https://www.nuget.org/packages/CefSharp.Wpf'} | null |
NuGet | GHSA-pjxv-w3qj-j8m3 | Directory Traversal in elFinder.AspNet | This affects the package elFinder.AspNet before 1.1.1.
The user-controlled file name is not properly sanitized before it is used to create a file system path.
| {'CVE-2021-23415'} | 2022-03-03T05:13:27.755638Z | 2021-08-09T20:42:13Z | HIGH | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'} | null |
NuGet | GHSA-r8pr-83cc-ccv7 | Umbraco Persistent Password Reset Poison | The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats. | {'CVE-2022-22691'} | 2022-03-03T05:13:40.735801Z | 2022-01-21T23:34:27Z | HIGH | null | {'CWE-444', 'CWE-640'} | {'https://github.com/umbraco/Umbraco-CMS', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22691'} | null |
NuGet | GHSA-mjww-934m-h4jw | Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua | A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates. | {'CVE-2020-29457'} | 2022-03-03T05:13:00.413150Z | 2021-11-19T20:19:53Z | MODERATE | null | {'CWE-295'} | {'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29457', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/', 'https://github.com/OPCFoundation/UA-.NETStandard/'} | null |
NuGet | GHSA-ph3v-2hq5-5qfq | Code injection in RazorEngine | In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | {'CVE-2021-46703'} | 2022-03-11T20:46:55.151952Z | 2022-03-07T00:00:41Z | MODERATE | null | null | {'https://github.com/Antaris/RazorEngine/issues/585', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'} | null |
NuGet | GHSA-53r4-h27g-rg3x | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0992'} | 2022-03-03T05:12:36.945087Z | 2021-03-29T20:59:07Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'} | null |
NuGet | GHSA-h2xm-2p6w-mj2v | Out-of-bounds Write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0831'} | 2022-03-03T05:12:51.698467Z | 2021-07-28T18:58:14Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0831', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0831'} | null |
NuGet | GHSA-fxh6-w476-hgr4 | Directory Traversal in SharpCompress | SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction. | {'CVE-2018-1002206'} | 2022-03-03T05:13:37.184703Z | 2019-09-11T22:59:57Z | MODERATE | null | {'CWE-22'} | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'} | null |
NuGet | GHSA-mvvp-gwgc-5hrp | Path Traversal in elFinder.Net.Core | This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path. | {'CVE-2021-23407'} | 2022-03-03T05:13:33.232451Z | 2021-08-02T17:30:27Z | HIGH | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://github.com/trannamtrung1st/elFinder.Net.Core', 'https://github.com/trannamtrung1st/elFinder.Net.Core/releases/tag/all-1.2.4'} | null |
NuGet | GHSA-6jf5-rmhv-38cw | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. | {'CVE-2019-0639'} | 2022-03-03T05:13:47.983339Z | 2019-04-09T19:44:03Z | HIGH | null | {'CWE-190'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0639', 'https://www.zerodayinitiative.com/advisories/ZDI-20-122/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0639', 'https://github.com/advisories/GHSA-6jf5-rmhv-38cw'} | null |
OSS-Fuzz | OSV-2021-1168 | Heap-buffer-overflow in exif_get_slong | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
exif_get_slong
exif_get_long
exif_get_rational
```
| null | 2022-04-13T03:04:40.883862Z | 2021-08-25T00:01:25.325827Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570', 'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'} | {'https://github.com/libexif/libexif/commit/ce946b93dfd34b2187d9f9fb01603943fbb32137'} |
OSS-Fuzz | OSV-2021-386 | Stack-buffer-overflow in ot::Coap::Message::AppendUintOption | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831
```
Crash type: Stack-buffer-overflow READ 1
Crash state:
ot::Coap::Message::AppendUintOption
ot::Coap::Message::AppendBlockOption
otCoapMessageAppendBlock2Option
```
| null | 2022-04-13T03:04:38.946438Z | 2021-02-13T00:00:59.547439Z | MEDIUM | null | null | {'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831'} | {'https://github.com/openthread/openthread/commit/2cd36266abaaf8b79ebb0441e6ed2ec3847cf3ca'} |
OSS-Fuzz | OSV-2020-386 | Heap-buffer-overflow in OPENSSL_strlcpy | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
OPENSSL_strlcpy
OPENSSL_strlcat
ERR_add_error_vdata
```
| null | 2022-04-13T03:04:38.742191Z | 2020-07-01T00:00:06.528477Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107', 'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'} | {'https://github.com/openssl/openssl/commit/10f8b36874fca928c3f41834babac8ee94dd3f09'} |
OSS-Fuzz | OSV-2017-39 | Use-of-uninitialized-value in IsRelativeSymlinkSafe | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308
```
Crash type: Use-of-uninitialized-value
Crash state:
IsRelativeSymlinkSafe
ExtractUnixLink30
ExtractSymlink
```
| null | 2022-04-13T03:04:35.323958Z | 2021-01-13T21:56:03.501889Z | MEDIUM | null | null | {'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308'} | {'https://github.com/aawc/unrar/commit/d2e5341ebf6f34c9bd5939c3ac812cb2cd983081'} |
OSS-Fuzz | OSV-2020-2076 | Use-of-uninitialized-value in UpdateDecStatNoFreezingInfo | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346
```
Crash type: Use-of-uninitialized-value
Crash state:
UpdateDecStatNoFreezingInfo
UpdateDecStat
WelsDec::DecodeFrameConstruction
```
| null | 2022-04-13T03:04:37.372384Z | 2020-10-16T00:00:42.366443Z | MEDIUM | null | null | {'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346'} | {'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} |
OSS-Fuzz | OSV-2020-369 | UNKNOWN READ in ot::TimerScheduler::Remove | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383
```
Crash type: UNKNOWN READ
Crash state:
ot::TimerScheduler::Remove
ot::Mle::Mle::Stop
otThreadSetEnabled
```
| null | 2022-04-13T03:04:38.951596Z | 2020-07-01T00:00:05.571696Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383', 'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'} | {'https://github.com/openthread/openthread/commit/3eb5a106ffa6678e23c6bc244e843e264cae9b31'} |
OSS-Fuzz | OSV-2020-693 | Heap-buffer-overflow in parse_sec_attr_44 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
parse_sec_attr_44
setcos_select_file
sc_select_file
```
| null | 2022-04-13T03:04:41.597761Z | 2020-07-01T00:00:25.178023Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798', 'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'} | {'https://github.com/OpenSC/OpenSC/commit/7a1e42e1352201127d1a97b6cb5f41e48cace0f5'} |
OSS-Fuzz | OSV-2020-2099 | Heap-buffer-overflow in decode_chars | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
decode_chars
decode_font
process_text
```
| null | 2022-04-13T03:04:30.610125Z | 2020-10-28T00:00:05.887987Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674', 'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'} | {'https://github.com/libass/libass/commit/910211f1c0078e37546f73e95306724358b89be2'} |
OSS-Fuzz | OSV-2020-2133 | Heap-buffer-overflow in tdefl_compress_lz_codes | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263
```
Crash type: Heap-buffer-overflow WRITE 8
Crash state:
tdefl_compress_lz_codes
tdefl_compress_block
tdefl_flush_block
```
| null | 2022-04-13T03:29:21.391124Z | 2020-11-08T00:00:05.283717Z | HIGH | null | null | {'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263'} | {'https://github.com/fluent/fluent-bit//commit/03ff96d82f5f51a8bea6981fc9d7e8c3429c50b1', 'https://github.com/fluent/fluent-bit//commit/7a588237fdb744e5825fb119753dcad2e8878866'} |
OSS-Fuzz | OSV-2020-739 | UNKNOWN READ in str_decref | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756
```
Crash type: UNKNOWN READ
Crash state:
str_decref
obj_free
mrb_gc_destroy
```
| null | 2022-04-13T03:04:39.688080Z | 2020-07-01T00:00:27.971876Z | MEDIUM | null | null | {'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756'} | {'https://github.com/mruby/mruby/commit/caba5fef274ab7df91b7247182ecbf2483b853b8'} |
OSS-Fuzz | OSV-2021-369 | Segv on unknown address in blosc_read_header | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761
```
Crash type: Segv on unknown address
Crash state:
blosc_read_header
blosc2_getitem_ctx
blosc_getitem
```
| null | 2022-04-13T03:04:40.205415Z | 2021-02-11T00:01:00.831869Z | null | null | null | {'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761'} | {'https://github.com/Blosc/c-blosc2/commit/57fca38a4f51687d71e451ae29df6b353764fb72'} |
OSS-Fuzz | OSV-2021-739 | Stack-buffer-overflow in flb_sds_cat | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025
```
Crash type: Stack-buffer-overflow READ {*}
Crash state:
flb_sds_cat
flb_ra_translate
record_ac_fuzzer.c
```
| null | 2022-04-13T03:04:38.249988Z | 2021-05-08T00:01:15.452663Z | MEDIUM | null | null | {'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025', 'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c'} | {'https://github.com/fluent/fluent-bit//commit/68746b76af8b143daf477033a6799902be2f3cad'} |
OSS-Fuzz | OSV-2020-410 | Global-buffer-overflow in lex_multiline_string | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455
Crash type: Global-buffer-overflow READ 1
Crash state:
lex_multiline_string
lex_next
parse_config
| null | 2021-03-09T04:49:05.872972Z | 2020-07-01T00:00:07.995615Z | null | null | null | {'git://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455'} | {'git://github.com/lpereira/lwan/commit/c9ac13203b6685d3bf89ab6d257b37dd6b0d5833'} |
OSS-Fuzz | OSV-2020-1965 | UNKNOWN READ in asn1_item_print_ctx | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920
```
Crash type: UNKNOWN READ
Crash state:
asn1_item_print_ctx
asn1_template_print_ctx
asn1_item_print_ctx
```
| null | 2022-04-13T03:04:38.790305Z | 2020-10-03T00:00:22.855250Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920', 'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'} | {'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'} |
OSS-Fuzz | OSV-2021-1754 | UNKNOWN READ in insert_free_size | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42917
```
Crash type: UNKNOWN READ
Crash state:
insert_free_size
chunk_free_object
pdfi_pscript_stack_finit
```
| null | 2022-04-13T03:04:34.631378Z | 2021-12-25T00:01:31.295369Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=42917', 'git://git.ghostscript.com/ghostpdl/commit/2c954310adc5753565a30dfe1b080f6a97ed4b4c'} | {'git://git.ghostscript.com/ghostpdl/commit/75fbddf52051987287e62d13c659eb73ba16982f'} |
OSS-Fuzz | OSV-2020-943 | Heap-buffer-overflow in pcpp::HeaderField::HeaderField | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
pcpp::HeaderField::HeaderField
pcpp::TextBasedProtocolMessage::parseFields
pcpp::SipResponseLayer::SipResponseLayer
```
| null | 2022-04-13T03:04:38.590838Z | 2020-07-22T00:00:21.373584Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528', 'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'} | {'https://github.com/seladb/PcapPlusPlus/commit/4366d2f86bf105025765a0ce3db6e647ba0f3508'} |
OSS-Fuzz | OSV-2020-1066 | Heap-buffer-overflow in dav1dFeedData | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
dav1dFeedData
dav1dCodecGetNextImage
avifDecoderNextImage
```
| null | 2022-04-13T03:34:31.037013Z | 2020-07-22T21:49:44.588962Z | MEDIUM | null | null | {'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947'} | {'https://github.com/AOMediaCodec/libavif/commit/4be7ce1dd3f0a45cd2555c94bd76a8f40baabcc4'} |
OSS-Fuzz | OSV-2018-143 | Global-buffer-overflow in CFF::BlendArg::set_blends | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714
```
Crash type: Global-buffer-overflow READ 8
Crash state:
CFF::BlendArg::set_blends
CFF::CFF2CSOpSet<CFF2CSOpSet_SubrSubset, CFF::SubrSubsetParam, CFF::PathProcsNul
CFF2CSOpSet_SubrSubset::process_op
```
| null | 2022-04-13T03:35:31.377146Z | 2021-01-13T00:01:01.540340Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714', 'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'} | {'https://github.com/harfbuzz/harfbuzz/commit/0996c0ff6279f377e2b14f08663df2ce82de2b14'} |
OSS-Fuzz | OSV-2021-555 | Uncaught exception in java.base/java.util.concurrent.ConcurrentHashMap.putVal | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395
```
Crash type: Uncaught exception
Crash state:
java.base/java.util.concurrent.ConcurrentHashMap.putVal
java.base/java.util.concurrent.ConcurrentHashMap.put
com.fasterxml.jackson.core.util.InternCache.intern
```
| null | 2022-04-13T03:04:31.802020Z | 2021-03-25T00:00:09.158172Z | LOW | null | null | {'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501', 'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395'} | {'https://github.com/FasterXML/jackson-core/commit/2bd85ebcdd94233d9e59a0833f29e06ce4281f3b'} |
OSS-Fuzz | OSV-2020-1573 | Use-of-uninitialized-value in void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633
```
Crash type: Use-of-uninitialized-value
Crash state:
void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop
ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig
ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig
```
| null | 2022-04-13T03:04:39.357700Z | 2020-08-04T00:00:11.334079Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633', 'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'} | {'https://github.com/bblanchon/ArduinoJson/commit/298864bafe080e6a0a42185445b278be92820110'} |
OSS-Fuzz | OSV-2021-1241 | Heap-buffer-overflow in wabt::string_view::compare | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38404
```
Crash type: Heap-buffer-overflow READ 6
Crash state:
wabt::string_view::compare
wabt::ReadBinary
wabt::ReadBinaryIr
```
| null | 2022-05-05T00:04:25.136985Z | 2021-09-12T00:01:27.535685Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38404'} | {'https://github.com/WebAssembly/wabt/commit/5b6070d749a005ad755610c341de813618cc3077'} |
OSS-Fuzz | OSV-2020-806 | Segv on unknown address in process_ndpi_collected_info | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122
```
Crash type: Segv on unknown address
Crash state:
process_ndpi_collected_info
packet_processing
ndpi_workflow_process_packet
```
| null | 2022-04-13T03:04:35.988021Z | 2020-07-14T05:37:42.995133Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122', 'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'} | {'https://github.com/ntop/nDPI/commit/4a09b4efa053a26e187119a540da4b41dd8a24d8'} |
OSS-Fuzz | OSV-2020-1123 | Index-out-of-bounds in store_reg_arm | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026
```
Crash type: Index-out-of-bounds
Crash state:
store_reg_arm
gen_load_exclusive_arm
disas_arm_insn_arm
```
| null | 2022-04-13T03:04:39.220642Z | 2020-07-22T21:49:48.909471Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026', 'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'} | {'https://github.com/unicorn-engine/unicorn/commit/46999575fb9e82ccd925e835d0d7db47200e010d'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.