cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-33363
2021-09-13T20:15:08.567
Memory leak in the infe_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ec64c7b8966d7e4642d12debb888be5acf18efb9" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/1786
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box infe_box_read
https://api.github.com/repos/gpac/gpac/issues/1786/comments
0
2021-05-08T05:17:05Z
2023-09-22T06:13:34Z
https://github.com/gpac/gpac/issues/1786
880,299,345
1,786
2,475
CVE-2021-33365
2021-09-13T20:15:08.627
Memory leak in the gf_isom_get_root_od function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/984787de3d414a5f7d43d0b4584d9469dff2a5a5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "401" ]
401
https://github.com/gpac/gpac/issues/1784
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[security]memory leak in MP4Box gf_isom_get_root_od
https://api.github.com/repos/gpac/gpac/issues/1784/comments
0
2021-05-08T05:14:42Z
2023-09-22T06:08:59Z
https://github.com/gpac/gpac/issues/1784
880,296,904
1,784
2,476
CVE-2020-20670
2021-09-13T22:15:07.437
An arbitrary file upload vulnerability in /admin/media/upload of ZKEACMS V3.2.0 allows attackers to execute arbitrary code via a crafted HTML file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yilezhu/Czar.Cms/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zkea:zkeacms:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BE5639E-3AAD-49E8-B7F9-855537544440", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "434" ]
434
https://github.com/yilezhu/Czar.Cms/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yilezhu", "Czar.Cms" ]
Can upload Html Cause fishing attacks , JavaScript Code execution ![图片](https://user-images.githubusercontent.com/42528382/66637068-f098fc80-ec44-11e9-93f9-d389a08425b8.png) url :http://demo.zkea.net/admin/media/upload poc : -----------------------------189153225812082 Content-Disposition: form-data; name="file";...
Arbitrary file upload vulnerability exists in the background
https://api.github.com/repos/yilezhu/Czar.Cms/issues/6/comments
0
2019-10-11T08:36:25Z
2019-10-11T08:36:25Z
https://github.com/yilezhu/Czar.Cms/issues/6
505,716,018
6
2,477
CVE-2020-20671
2021-09-13T22:15:10.077
A cross-site request forgery (CSRF) in KiteCMS V1.1 allows attackers to arbitrarily add an administrator account.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Kitesky/KiteCMS/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kitesky:kitecms:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "206854A6-CDE7-4607-B768-79570E16AE42", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "352" ]
352
https://github.com/Kitesky/KiteCMS/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Kitesky", "KiteCMS" ]
SCRF : add administrator user Edit Upload options Upload php file getshell CSRF POC: ![图片](https://user-images.githubusercontent.com/42528382/66693655-af086000-ecdd-11e9-9046-ee1fd33fb884.png) Edit Upload options ![图片](https://user-images.githubusercontent.com/42528382/66693880-4ec6ed80-ece0-11e9-9797-ccf5b96ac4...
There is CSRF and Arbitrary file upload vulnerability getshell
https://api.github.com/repos/kitesky/KiteCMS/issues/3/comments
0
2019-10-12T03:14:35Z
2019-10-12T03:14:35Z
https://github.com/kitesky/KiteCMS/issues/3
506,123,131
3
2,478
CVE-2020-21049
2021-09-14T16:15:08.773
An invalid read in the stb_image.h component of libsixel prior to v1.8.5 allows attackers to cause a denial of service (DOS) via a crafted PSD file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://bitbucket.org/netbsd/pkgsrc/commits/970a81d31ec7498e04d09b6b7771cef35f63cd28" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C9591E2-D3E9-40F7-82E8-EAA2FB78FD4D", "versionEndExcluding": "1.8.5", "versionEndIncluding": null, "versionSt...
[ "125" ]
125
https://github.com/saitoha/libsixel/issues/74
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Our fuzzer detected several crashes when converting PSD file against 2df6437 (compiled with Address Sanitizer). The command to trigger that is `img2sixel $POC -o /tmp/test.six` where $POC is: https://github.com/ntu-sec/pocs/blob/master/libsixel-2df6437/crashes/read_stb_image.h%3A5669_1.psd gdb output: ``` Read...
Address Sanitizer: invalid read at stb_image.h:5669
https://api.github.com/repos/saitoha/libsixel/issues/74/comments
3
2018-07-28T12:00:04Z
2020-01-03T01:34:42Z
https://github.com/saitoha/libsixel/issues/74
345,443,147
74
2,480
CVE-2020-21050
2021-09-14T16:15:08.987
Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://bitbucket.org/netbsd/pkgsrc/commits/a27113e21179cbfbfae0c35f6a9edd6aa498faae" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/12...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5CB650-56E4-4DF9-9310-080C174E1528", "versionEndExcluding": "1.8.3", "versionEndIncluding": null, "versionSt...
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/75
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Our fuzzer detected several crashes when converting gif file against 2df6437 (compiled with Address Sanitizer). The command to trigger that is `img2sixel $POC -o /tmp/test.six` where $POC can be: https://github.com/ntu-sec/pocs/blob/master/libsixel-2df6437/crashes/so_fromgif.c%3A310_1.gif https://github.com/ntu-sec/...
AddressSanitizer: stack-buffer-overflow at fromgif.c:310
https://api.github.com/repos/saitoha/libsixel/issues/75/comments
2
2018-07-28T12:04:34Z
2019-12-15T08:31:39Z
https://github.com/saitoha/libsixel/issues/75
345,443,459
75
2,481
CVE-2020-21081
2021-09-14T16:15:09.197
A cross-site request forgery (CSRF) in Maccms 8.0 causes administrators to add and modify articles without their knowledge via clicking on a crafted URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms8/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93D75918-25B5-4D87-8C9E-112C215DDEE6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "352" ]
352
https://github.com/magicblack/maccms8/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms8" ]
# xss XSS vulnerability exists in the background administrator article management office when adding and modifying Where Chinese and English names are entered, enter `" onmousemove=alert(document.cookie) src=x`,Following chart ![1](https://user-images.githubusercontent.com/32705816/67657905-11768700-f993-11e9-96a5-...
There are CSRF and XSS vulnerabilities in the background, which can be combined to steal user cookies and administrator cookies
https://api.github.com/repos/magicblack/maccms8/issues/2/comments
1
2019-10-28T08:33:24Z
2019-12-02T15:56:38Z
https://github.com/magicblack/maccms8/issues/2
513,164,143
2
2,482
CVE-2021-39391
2021-09-14T18:15:08.900
Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the "Request Statistics" page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/beego/beego" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/beego/beego/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beego:beego:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3B58EC25-E45E-4F44-9EAC-CE89FFE0D709", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "79" ]
79
https://github.com/beego/beego/issues/4727
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "beego", "beego" ]
When navigating to a page, the path is not sanitized in the "Request statistics" in the admin panel, leading to an XSS. For example, navigating to ```http://beego-site/<script>alert(1)</script>``` leads to an alert when viewed on the admin panel: ![MicrosoftTeams-image (21)](https://user-images.githubusercontent.co...
XSS in Admin Panel
https://api.github.com/repos/beego/beego/issues/4727/comments
1
2021-08-15T12:28:51Z
2021-08-16T16:40:01Z
https://github.com/beego/beego/issues/4727
971,122,817
4,727
2,483
CVE-2021-41061
2021-09-15T12:15:16.753
In RIOT-OS 2021.01, nonce reuse in 802.15.4 encryption in the ieee820154_security component allows attackers to break encryption by triggering reboots.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:riot-os:riot:2021.01:*:*:*:*:*:*:*", "matchCriteriaId": "8F041205-8394-4EA3-BC9A-CFA9690634F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "330" ]
330
https://github.com/RIOT-OS/RIOT/issues/16844
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "RIOT-OS", "RIOT" ]
#### Description The frame counter used with ieee802154_security is initialized with 0 at startup. While it is protected against overflow, it is not protected against being reset, and that reset happens whenever the device restarts. As the key is flashed into the device in ieee802154_security's normal operation, ...
ieee802154_security: Nonce is reused after reboot
https://api.github.com/repos/RIOT-OS/RIOT/issues/16844/comments
10
2021-09-14T07:24:59Z
2023-04-19T22:54:35Z
https://github.com/RIOT-OS/RIOT/issues/16844
995,683,197
16,844
2,484
CVE-2020-21121
2021-09-15T17:15:08.207
Pligg CMS 2.0.2 contains a time-based SQL injection vulnerability via the $recordIDValue parameter in the admin_update_module_widgets.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kliqqi:kliqqi_cms:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FA8A074-F9FF-4CE1-9E47-D9DB7D776D68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/259
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Kliqqi-CMS", "Kliqqi-CMS" ]
This is a SQL Injection vulerable in "admin_update_module_widgets.php" file. At line 47, "$recordIDValue" Parameters are not wrapped in single quotes. And the parameters also are not safely processed. ![image](https://user-images.githubusercontent.com/17540142/67925859-7c23fe80-fbef-11e9-9c02-3c88a5ef8c2a.png) ...
SQL Injection Vulerable.
https://api.github.com/repos/Kliqqi-CMS/Kliqqi-CMS/issues/259/comments
0
2019-10-31T09:41:21Z
2019-10-31T09:41:21Z
https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/259
515,291,262
259
2,485
CVE-2020-21122
2021-09-15T17:15:08.607
UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/youseries/ureport/issues/483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ureport_project:ureport:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "10CADB94-5E0B-48FD-8430-516DAF5FD34C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "918" ]
918
https://github.com/youseries/ureport/issues/483
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "youseries", "ureport" ]
In this part of source code, we find that users can make connection requests to any IP address. ![image](https://user-images.githubusercontent.com/17540142/69843324-e5a43500-12a1-11ea-83aa-ae122e51413c.png) Then we found that the designer page did not verify the access user's permission. So we can directly implement...
An unauthorized SSRF vulnerability in the designer page.
https://api.github.com/repos/youseries/ureport/issues/483/comments
0
2019-11-29T04:20:17Z
2019-11-29T04:20:17Z
https://github.com/youseries/ureport/issues/483
530,148,729
483
2,486
CVE-2020-21124
2021-09-15T17:15:08.730
UReport 2.2.9 allows attackers to execute arbitrary code due to a lack of access control to the designer page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/youseries/ureport/issues/484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ureport_project:ureport:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "10CADB94-5E0B-48FD-8430-516DAF5FD34C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "863" ]
863
https://github.com/youseries/ureport/issues/484
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "youseries", "ureport" ]
With the following source code, we can easily find that the 'class. Forname' method can load malicious classes. ![image](https://user-images.githubusercontent.com/17540142/69845356-60be1900-12ab-11ea-8e5f-2add90c11d26.png) 'Class.forname' is a method for JVM to retrieve and load into memory. In this process, the ...
Local malicious class loading and code execution vulnerability due to unauthorized access to designer page.
https://api.github.com/repos/youseries/ureport/issues/484/comments
0
2019-11-29T05:25:46Z
2019-11-29T05:25:46Z
https://github.com/youseries/ureport/issues/484
530,161,732
484
2,487
CVE-2020-21126
2021-09-15T17:15:08.957
MetInfo 7.0.0 contains a Cross-Site Request Forgery (CSRF) via admin/?n=admin&c=index&a=doSaveInfo.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Echox1/metinfo_csrf/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "65A2CB16-CC11-4C8B-9CCC-7241BDD92E0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "352" ]
352
https://github.com/Echox1/metinfo_csrf/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Echox1", "metinfo_csrf" ]
There is a csrf via admin/?n=admin&c=index&a=doSaveInfo to update the admin user account request: ```POST /MetInfo7.0.0/admin/?n=admin&c=index&a=doSaveInfo HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: application/json, text/javascript, ...
There is a csrf in MetInfo 7.0.0 via admin/?n=admin&c=index&a=doSaveInfo to update the admin user
https://api.github.com/repos/Echox1/metinfo_csrf/issues/1/comments
0
2019-12-02T08:00:27Z
2019-12-02T08:01:46Z
https://github.com/Echox1/metinfo_csrf/issues/1
530,957,069
1
2,488
CVE-2020-21127
2021-09-15T17:15:09.037
MetInfo 7.0.0 contains a SQL injection vulnerability via admin/?n=logs&c=index&a=dodel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/T3qui1a/metinfo_sqlinjection/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "65A2CB16-CC11-4C8B-9CCC-7241BDD92E0C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/T3qui1a/metinfo_sqlinjection/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "T3qui1a", "metinfo_sqlinjection" ]
Vulnerability Name: Metinfo7.0 CMS Background SQL Blind Injection Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta Version: V7.0.0 ## Vulnerability code logs/index.class.php line32-line45 ![image](https://user-images.githubusercontent.com/17540142/69960...
Metinfo7.0 SQL Blind Injection
https://api.github.com/repos/T3qui1a/metinfo_sqlinjection/issues/1/comments
0
2019-12-02T12:43:03Z
2019-12-04T08:37:57Z
https://github.com/T3qui1a/metinfo_sqlinjection/issues/1
531,103,630
1
2,489
CVE-2020-21322
2021-09-15T22:15:09.030
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:feehi:feehicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6A5F1DC-0513-4727-A616-CA59B96FCD2B", "versionEndExcluding": null, "versionEndIncluding": "2.0.8", "versionStartExcludin...
[ "434" ]
434
https://github.com/liufee/cms/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liufee", "cms" ]
In the background, you can upload the PHP file by changing the image suffix to PHP, resulting in command execution. url:http://192.168.18.143/admin/index.php?r=admin-user%2Fupdate-self ![image](https://user-images.githubusercontent.com/50048558/68270629-dfeb7300-0098-11ea-9e5b-0e43c178498d.png) ![image](https://...
File upload command execution
https://api.github.com/repos/liufee/cms/issues/44/comments
1
2019-11-06T05:26:30Z
2019-12-24T15:55:04Z
https://github.com/liufee/cms/issues/44
518,246,630
44
2,490
CVE-2021-27340
2021-09-16T14:15:07.410
OpenSIS Community Edition version <= 7.6 is affected by a reflected XSS vulnerability in EmailCheck.php via the "opt" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/commit/f78407d5291c686c3f416073dcb9143f3a3d5489#diff-24b751f2072f058259d033016938101f9fa29884ebcc09ce7eb88def3421e5ba" }, { "source": "cve@mitre.org", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:*:*:*:*:community:*:*:*", "matchCriteriaId": "98FDC0EF-5711-4412-BF52-3A1D17AA8067", "versionEndExcluding": null, "versionEndIncluding": "7.6", "versionStartExc...
[ "79" ]
79
https://github.com/OS4ED/openSIS-Classic/issues/158
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
Hi OS4ED Team! I believe I've discovered a reflected XSS and a local file inclusion vulnerability in openSIS V7.6. I don't think they have been reported yet. Since I feel like the 2 vulnerabilities are relatively impactful, I've sent the detail and the POC in an email to info@os4ed.com last week. Is that the corr...
Possible new vulnerabilities in V7.6
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/158/comments
3
2021-02-22T16:47:11Z
2021-07-25T01:39:18Z
https://github.com/OS4ED/openSIS-Classic/issues/158
813,672,744
158
2,492
CVE-2021-40669
2021-09-16T19:15:07.870
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords parameter under the coreframe/app/promote/admin/index.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/wuzhicms/wuzhicms/issues/196
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
## Vulnerability file: `/coreframe/app/promote/admin/index.php:42-60` ```php public function search() { $siteid = get_cookie('siteid'); $page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1; $page = max($page,1); $fieldtype = $GLOBALS['fieldtype']; $keywords = $GLOBALS['key...
Wuzhicms v4.1.0 /coreframe/app/promote/admin/index.php hava a SQL Injection Vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/196/comments
0
2021-09-05T14:05:26Z
2021-09-05T14:05:26Z
https://github.com/wuzhicms/wuzhicms/issues/196
988,517,784
196
2,493
CVE-2021-40670
2021-09-16T19:15:07.977
SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords iparameter under the /coreframe/app/order/admin/card.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/wuzhicms/wuzhicms/issues/197
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
## Vulnerability file: `/coreframe/app/order/admin/card.php:21-45` ```php public function listing() { $page = isset($GLOBALS['page']) ? intval($GLOBALS['page']) : 1; $page = max($page,1); $batchid = isset($GLOBALS['batchid']) ? $GLOBALS['batchid'] : 0; $keytype = isse...
Wuzhicms v4.1.0 /coreframe/app/order/admin/card.php hava a SQL Injection Vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/197/comments
0
2021-09-06T02:43:30Z
2021-09-06T02:59:23Z
https://github.com/wuzhicms/wuzhicms/issues/197
988,686,922
197
2,494
CVE-2020-21594
2021-09-16T22:15:07.587
libde265 v1.0.4 contains a heap buffer overflow in the put_epel_hv_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/233" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-212...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/233
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_epel_hv_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16....
heap-buffer-overflow in put_epel_hv_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/233/comments
4
2019-12-24T08:25:45Z
2023-01-24T17:42:58Z
https://github.com/strukturag/libde265/issues/233
542,042,456
233
2,495
CVE-2020-21595
2021-09-16T22:15:07.697
libde265 v1.0.4 contains a heap buffer overflow in the mc_luma function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/239" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/239
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in mc_luma when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Rel...
heap-buffer-overflow in mc_luma when decoding file
https://api.github.com/repos/strukturag/libde265/issues/239/comments
2
2019-12-24T11:28:20Z
2023-01-24T18:06:05Z
https://github.com/strukturag/libde265/issues/239
542,098,946
239
2,496
CVE-2020-21596
2021-09-16T22:15:07.743
libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/236" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "120" ]
120
https://github.com/strukturag/libde265/issues/236
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# global buffer overflow in decode_CABAC_bit when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04...
global buffer overflow in decode_CABAC_bit when decoding file
https://api.github.com/repos/strukturag/libde265/issues/236/comments
2
2019-12-24T11:22:38Z
2023-01-24T18:01:46Z
https://github.com/strukturag/libde265/issues/236
542,097,369
236
2,497
CVE-2020-21597
2021-09-16T22:15:07.793
libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/238" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/238
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in mc_chroma when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS R...
heap-buffer-overflow in mc_chroma when decoding file
https://api.github.com/repos/strukturag/libde265/issues/238/comments
4
2019-12-24T11:26:58Z
2023-01-24T18:04:53Z
https://github.com/strukturag/libde265/issues/238
542,098,570
238
2,498
CVE-2020-21598
2021-09-16T22:15:07.837
libde265 v1.0.4 contains a heap buffer overflow in the ff_hevc_put_unweighted_pred_8_sse function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/237
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: ...
heap-buffer-overflow in ff_hevc_put_unweighted_pred_8_sse when decoding file
https://api.github.com/repos/strukturag/libde265/issues/237/comments
3
2019-12-24T11:25:26Z
2023-01-24T18:03:54Z
https://github.com/strukturag/libde265/issues/237
542,098,137
237
2,499
CVE-2020-21599
2021-09-16T22:15:07.880
libde265 v1.0.4 contains a heap buffer overflow in the de265_image::available_zscan function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/235" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-annou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/235
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
# heap overflow in de265_image::available_zscan when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16...
heap overflow in de265_image::available_zscan when decoding file
https://api.github.com/repos/strukturag/libde265/issues/235/comments
4
2019-12-24T11:18:40Z
2023-01-24T17:46:14Z
https://github.com/strukturag/libde265/issues/235
542,096,202
235
2,500
CVE-2020-21600
2021-09-16T22:15:07.920
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_pred_avg_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/struktura...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/243
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_weighted_pred_avg_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: ...
heap-buffer-overflow in put_weighted_pred_avg_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/243/comments
4
2019-12-24T11:35:38Z
2023-01-24T18:10:24Z
https://github.com/strukturag/libde265/issues/243
542,100,957
243
2,501
CVE-2020-21601
2021-09-16T22:15:07.963
libde265 v1.0.4 contains a stack buffer overflow in the put_qpel_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/241" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/241
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# stack-buffer-overflow in put_qpel_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04...
stack-buffer-overflow in put_qpel_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/241/comments
3
2019-12-24T11:32:05Z
2023-01-24T18:08:34Z
https://github.com/strukturag/libde265/issues/241
542,100,005
241
2,502
CVE-2020-21602
2021-09-16T22:15:08.007
libde265 v1.0.4 contains a heap buffer overflow in the put_weighted_bipred_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/struktura...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/242
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_weighted_bipred_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: ...
heap-buffer-overflow in put_weighted_bipred_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/242/comments
2
2019-12-24T11:33:52Z
2023-01-24T18:09:22Z
https://github.com/strukturag/libde265/issues/242
542,100,475
242
2,503
CVE-2020-21603
2021-09-16T22:15:08.050
libde265 v1.0.4 contains a heap buffer overflow in the put_qpel_0_0_fallback_16 function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/240" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/240
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_qpel_0_0_fallback_16 when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu...
heap-buffer-overflow in put_qpel_0_0_fallback_16 when decoding file
https://api.github.com/repos/strukturag/libde265/issues/240/comments
3
2019-12-24T11:29:40Z
2023-01-24T18:07:17Z
https://github.com/strukturag/libde265/issues/240
542,099,323
240
2,504
CVE-2020-21604
2021-09-16T22:15:08.093
libde265 v1.0.4 contains a heap buffer overflow fault in the _mm_loadl_epi64 function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/231" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/231
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in decode file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16.04.6 LTS Release: 16...
heap-buffer-overflow in decode file
https://api.github.com/repos/strukturag/libde265/issues/231/comments
3
2019-12-24T03:25:24Z
2023-01-24T17:40:29Z
https://github.com/strukturag/libde265/issues/231
541,973,882
231
2,505
CVE-2020-21606
2021-09-16T22:15:08.177
libde265 v1.0.4 contains a heap buffer overflow fault in the put_epel_16_fallback function, which can be exploited via a crafted a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/strukturag/libde265/issues/232" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5346" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "4F5331C0-3C70-42CB-AC2C-4E8B7FA1328F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "787" ]
787
https://github.com/strukturag/libde265/issues/232
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "strukturag", "libde265" ]
# heap-buffer-overflow in put_epel_16_fallback when decoding file I found some problems during fuzzing ## Test Version dev version, git clone https://github.com/strukturag/libde265 ## Test Environment root@ubuntu:~# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 16....
heap-buffer-overflow in put_epel_16_fallback when decoding file
https://api.github.com/repos/strukturag/libde265/issues/232/comments
5
2019-12-24T08:22:59Z
2023-01-24T17:39:38Z
https://github.com/strukturag/libde265/issues/232
542,041,601
232
2,506
CVE-2021-23442
2021-09-17T10:15:07.437
This affects all versions of package @cookiex/deep. The global proto object can be polluted using the __proto__ object.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cookiex-deep_project:cookiex-deep:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "F007AA1F-4D44-4CAE-8BF5-CA7707EDB1B1", "versionEndExcluding": "0.0.6", "versionEndIncluding": null, ...
[ "1321" ]
1321
https://github.com/tony-tsx/cookiex-deep/issues/1
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "tony-tsx", "cookiex-deep" ]
[@cookiex/deep](https://www.npmjs.com/package/@cookiex/deep) npm package is vulnerable to **prototype pollution** vulnerability prior to version 0.0.6.
@cookiex/deep npm package is vulnerable to prototype pollution vulnerability prior to version 0.0.6.
https://api.github.com/repos/tony-tsx/cookiex-deep/issues/1/comments
0
2021-09-06T06:29:37Z
2021-09-14T12:21:35Z
https://github.com/tony-tsx/cookiex-deep/issues/1
988,815,265
1
2,507
CVE-2020-21547
2021-09-17T21:15:07.313
Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/114
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.2 There is a heap-buffer-overflow in dither_func_fs at tosixel.c:861 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com/file/d/1Zbn3EFlTBY7dBozOSegrchWQ0F8MEO7I/view?usp=sharing) ASAN LOG ``` ==39700==ERROR: AddressSanitizer: h...
heap-buffer-overflow in dither_func_fs at tosixel.c:861
https://api.github.com/repos/saitoha/libsixel/issues/114/comments
1
2019-12-13T13:53:59Z
2019-12-16T14:40:25Z
https://github.com/saitoha/libsixel/issues/114
537,562,433
114
2,508
CVE-2020-21548
2021-09-17T21:15:07.360
Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking",...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "75488CEA-3C52-4C9C-97F2-83B652FD701D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "787" ]
787
https://github.com/saitoha/libsixel/issues/116
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
img2sixel 1.8.3 There is a heap-buffer-overflow in sixel_encode_highcolor at tosixel.c:1361 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com/file/d/1Hdpq1fEL_DgGeEqXyKD0YIcTOICjoGgS/view?usp=sharing) ASAN LOG ``` ==28051==ERROR: AddressSanitizer: he...
heap-buffer-overflow in sixel_encode_highcolor at tosixel.c:1361
https://api.github.com/repos/saitoha/libsixel/issues/116/comments
1
2019-12-16T04:32:36Z
2019-12-18T20:32:53Z
https://github.com/saitoha/libsixel/issues/116
538,179,086
116
2,509
CVE-2021-41392
2021-09-17T22:15:08.163
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BoostIO/BoostNote-App/issues/856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:boostnote:boostnote:*:*:*:*:*:*:*:*", "matchCriteriaId": "608C136E-55B4-49D2-A188-3A98619F4DCA", "versionEndExcluding": null, "versionEndIncluding": "0.22.0", "versionStartEx...
[ "74" ]
74
https://github.com/BoostIO/BoostNote-App/issues/856
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BoostIO", "BoostNote-App" ]
Hi, We found that `static/main-preload.js` introduces dangerous API openShellExternal for arbitrary access on unsafe renderer process. This may lead to remote command execution. We suggest that a URL check should be enforced at L15, which enforces an allowlist on trusted URLs. https://github.com/BoostIO/BoostNo...
Potential Command Execution vulnerabilities introduced by main-preload.js
https://api.github.com/repos/BoostIO/BoostNote-App/issues/856/comments
2
2021-03-09T15:02:25Z
2022-06-04T18:54:59Z
https://github.com/BoostIO/BoostNote-App/issues/856
826,066,955
856
2,510
CVE-2021-40674
2021-09-20T15:15:08.990
An SQL injection vulnerability exists in Wuzhi CMS v4.1.0 via the KeyValue parameter in coreframe/app/order/admin/index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "89" ]
89
https://github.com/wuzhicms/wuzhicms/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
# There are 3 SQL injections in Wuzhicms v4.1.0 background # one ## Wuzhicms v4.1.0 /coreframe/app/pay/admin/index.php hava a SQL Injection Vulnerability ## Vulnerability file: `/coreframe/app/pay/admin/index.php 30-98` ```php public function listing(){ $fieldtypes = array('订单号', '手机号'...
There are 3 SQL injections in Wuzhicms v4.1.0 background
https://api.github.com/repos/wuzhicms/wuzhicms/issues/198/comments
0
2021-09-06T13:00:49Z
2021-09-21T06:49:49Z
https://github.com/wuzhicms/wuzhicms/issues/198
989,149,160
198
2,511
CVE-2021-32265
2021-09-20T16:15:09.913
An issue was discovered in Bento4 through v1.6.0-637. A global-buffer-overflow exists in the function AP4_MemoryByteStream::WritePartial() located in Ap4ByteStream.cpp. It allows an attacker to cause code execution or information disclosure.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "9684D8EA-E280-40A0-BB75-E7AFB950B234", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-637", "versionStartExcl...
[ "120" ]
120
https://github.com/axiomatic-systems/Bento4/issues/545
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
## System info Ubuntu x86_64, clang 6.0, mp42aac (latest master [174b94](https://github.com/axiomatic-systems/Bento4/commit/174b948be29b69009b235ae0aa92884d05bcea49)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=add...
A global-buffer-overflow in Ap4ByteStream.cpp:783:5
https://api.github.com/repos/axiomatic-systems/Bento4/issues/545/comments
1
2020-08-22T01:47:18Z
2022-05-01T20:31:46Z
https://github.com/axiomatic-systems/Bento4/issues/545
683,904,034
545
2,512
CVE-2021-32268
2021-09-20T16:15:09.960
Buffer overflow vulnerability in function gf_fprintf in os_file.c in gpac before 1.0.1 allows attackers to execute arbitrary code. The fixed version is 1.0.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1587
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A heap-buffer-overflow in box_dump.c:350
https://api.github.com/repos/gpac/gpac/issues/1587/comments
0
2020-09-04T15:05:21Z
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1587
693,270,293
1,587
2,513
CVE-2021-32269
2021-09-20T16:15:10.003
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump located in box_dump.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1574
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A Segmentation fault in box_dump.c:3641
https://api.github.com/repos/gpac/gpac/issues/1574/comments
0
2020-08-13T03:20:26Z
2020-09-01T16:00:16Z
https://github.com/gpac/gpac/issues/1574
678,118,496
1,574
2,514
CVE-2021-32270
2021-09-20T16:15:10.053
An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function vwid_box_del located in box_code_base.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
[ "476" ]
476
https://github.com/gpac/gpac/issues/1586
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [5a884e](https://github.com/gpac/gpac/commit/5a884e376e1f67b3d40ec91c0b70ab49219fe3cd)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A Segmentation fault in box_code_base.c:11579
https://api.github.com/repos/gpac/gpac/issues/1586/comments
0
2020-09-04T14:58:11Z
2020-09-07T07:20:45Z
https://github.com/gpac/gpac/issues/1586
693,262,344
1,586
2,515
CVE-2021-32271
2021-09-20T16:15:10.100
An issue was discovered in gpac through 20200801. A stack-buffer-overflow exists in the function DumpRawUIConfig located in odf_dump.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party A...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCA1FE1D-17AE-45F9-A7BD-A8316EE859D6", "versionEndExcluding": "1.0.1", "versionEndIncluding": null, "versionStartExcluding": n...
[ "787" ]
787
https://github.com/gpac/gpac/issues/1575
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), MP4Box (latest master [2aa266](https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --static-mp4box ## Command line ./bin/gcc/MP4Box -...
A stack-buffer-overflow in odf_dump.c:887
https://api.github.com/repos/gpac/gpac/issues/1575/comments
0
2020-08-15T01:36:37Z
2020-09-01T16:03:15Z
https://github.com/gpac/gpac/issues/1575
679,475,781
1,575
2,516
CVE-2021-32272
2021-09-20T16:15:10.143
An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow exists in the function stszin located in mp4read.c. It allows an attacker to cause Code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF3BA5A2-CCE7-471A-B083-FD9557B427A9", "versionEndExcluding": "2.10.0", "versionEndIncluding": null, "versionStartEx...
[ "787" ]
787
https://github.com/knik0/faad2/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## A...
A heap-buffer-overflow in mp4read.c:355:29
https://api.github.com/repos/knik0/faad2/issues/57/comments
0
2020-08-30T15:27:09Z
2020-08-31T08:55:06Z
https://github.com/knik0/faad2/issues/57
688,738,712
57
2,517
CVE-2021-32273
2021-09-20T16:15:10.187
An issue was discovered in faad2 through 2.10.0. A stack-buffer-overflow exists in the function ftypin located in mp4read.c. It allows an attacker to cause Code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/56" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartEx...
[ "787" ]
787
https://github.com/knik0/faad2/issues/56
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [eb19fa](https://github.com/knik0/faad2/commit/eb19fa58e08ffad79fe4af09abc0b5a584b4e6e6)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ##...
A stack-buffer-overflow in mp4read.c:141:9
https://api.github.com/repos/knik0/faad2/issues/56/comments
0
2020-08-16T07:27:58Z
2020-08-17T05:37:21Z
https://github.com/knik0/faad2/issues/56
679,706,876
56
2,518
CVE-2021-32274
2021-09-20T16:15:10.230
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_synthesis_64 located in sbr_qmf.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/60" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartEx...
[ "787" ]
787
https://github.com/knik0/faad2/issues/60
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## A...
A heap-buffer-overflow in sbr_qmf.c:614:27
https://api.github.com/repos/knik0/faad2/issues/60/comments
1
2020-08-30T15:53:54Z
2020-10-07T19:28:39Z
https://github.com/knik0/faad2/issues/60
688,743,058
60
2,519
CVE-2021-32275
2021-09-20T16:15:10.277
An issue was discovered in faust through v2.30.5. A NULL pointer dereference exists in the function CosPrim::computeSigOutput() located in cosprim.hh. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/grame-cncm/faust/issues/482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third P...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grame:faust:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DFD6F44-9ABE-4A8E-823E-7A45DE62126E", "versionEndExcluding": null, "versionEndIncluding": "2.30.5", "versionStartExcluding"...
[ "476" ]
476
https://github.com/grame-cncm/faust/issues/482
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "grame-cncm", "faust" ]
## System info Ubuntu x86_64, clang 6.0, faust (latest master [c236d2](https://github.com/grame-cncm/faust/commit/c236d23526de80c410f8014d36bb803af1da18b8)) ## Configure cmake . -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DINC...
A Segmentation fault in cosprim.hh:49:13
https://api.github.com/repos/grame-cncm/faust/issues/482/comments
7
2020-08-26T02:30:17Z
2021-10-18T17:33:05Z
https://github.com/grame-cncm/faust/issues/482
685,956,370
482
2,520
CVE-2021-32276
2021-09-20T16:15:10.317
An issue was discovered in faad2 through 2.10.0. A NULL pointer dereference exists in the function get_sample() located in output.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/58" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartEx...
[ "476" ]
476
https://github.com/knik0/faad2/issues/58
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## A...
A Segmentation fault in output.c:49:16
https://api.github.com/repos/knik0/faad2/issues/58/comments
0
2020-08-30T15:29:51Z
2020-10-09T15:48:34Z
https://github.com/knik0/faad2/issues/58
688,739,153
58
2,521
CVE-2021-32277
2021-09-20T16:15:10.363
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_analysis_32 located in sbr_qmf.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/59" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartEx...
[ "787" ]
787
https://github.com/knik0/faad2/issues/59
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## A...
A heap-buffer-overflow in sbr_qmf.c:96:77
https://api.github.com/repos/knik0/faad2/issues/59/comments
0
2020-08-30T15:32:46Z
2020-10-06T04:45:45Z
https://github.com/knik0/faad2/issues/59
688,739,598
59
2,522
CVE-2021-32278
2021-09-20T16:15:10.413
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function lt_prediction located in lt_predict.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/knik0/faad2/issues/62" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faad2_project:faad2:*:*:*:*:*:*:*:*", "matchCriteriaId": "473E94D7-49A2-4FA4-82CD-726B2B84FF95", "versionEndExcluding": null, "versionEndIncluding": "2.10.0", "versionStartEx...
[ "787" ]
787
https://github.com/knik0/faad2/issues/62
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "knik0", "faad2" ]
## System info Ubuntu x86_64, clang 6.0, faad (latest master [f71b5e](https://github.com/knik0/faad2/commit/f71b5e81f563d94fa284977a326520d269d8353e)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure --enable-shared=no ## Command line ./frontend/faad -w -b 5 @@ ## A...
A heap-buffer-overflow in lt_predict.c:108:36
https://api.github.com/repos/knik0/faad2/issues/62/comments
0
2020-09-04T14:47:28Z
2020-10-06T04:45:45Z
https://github.com/knik0/faad2/issues/62
693,250,265
62
2,523
CVE-2021-32281
2021-09-20T16:15:10.517
An issue was discovered in gravity through 0.8.1. A heap-buffer-overflow exists in the function gnode_function_add_upvalue located in gravity_ast.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExclud...
[ "787" ]
787
https://github.com/marcobambini/gravity/issues/313
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [ecbee9f](https://github.com/marcobambini/gravity/commit/ecbee9f06e0168b17ddb953fb08adb4b9bb19fca)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=addres...
A heap-buffer-overflow in gravity_ast.c:90:41 can cause abort
https://api.github.com/repos/marcobambini/gravity/issues/313/comments
1
2020-08-07T04:58:06Z
2020-08-31T08:19:43Z
https://github.com/marcobambini/gravity/issues/313
674,757,661
313
2,524
CVE-2021-32282
2021-09-20T16:15:10.563
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function ircode_add_check() located in gravity_ircode.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExclud...
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/315
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [ecbee9f](https://github.com/marcobambini/gravity/commit/ecbee9f06e0168b17ddb953fb08adb4b9bb19fca)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=addres...
A Segmentation fault in gravity_ircode.c:428:20
https://api.github.com/repos/marcobambini/gravity/issues/315/comments
1
2020-08-07T14:09:43Z
2020-08-31T08:20:03Z
https://github.com/marcobambini/gravity/issues/315
675,041,848
315
2,525
CVE-2021-32283
2021-09-20T16:15:10.607
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function gravity_string_to_value() located in gravity_value.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExclud...
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/314
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [ecbee9f](https://github.com/marcobambini/gravity/commit/ecbee9f06e0168b17ddb953fb08adb4b9bb19fca)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=addres...
A Segmentation fault in gravity_value.c:2382:44
https://api.github.com/repos/marcobambini/gravity/issues/314/comments
1
2020-08-07T14:07:36Z
2020-08-31T08:19:54Z
https://github.com/marcobambini/gravity/issues/314
675,040,528
314
2,526
CVE-2021-32284
2021-09-20T16:15:10.647
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function ircode_register_pop_context_protect() located in gravity_ircode.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExclud...
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/321
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [c79e18](https://github.com/marcobambini/gravity/commit/c79e185158a2b5d8f94eec599459d9a5355993c5)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address...
A Segmentation fault in gravity_ircode.c
https://api.github.com/repos/marcobambini/gravity/issues/321/comments
1
2020-08-30T16:46:44Z
2020-08-31T08:20:39Z
https://github.com/marcobambini/gravity/issues/321
688,751,618
321
2,527
CVE-2021-32285
2021-09-20T16:15:10.690
An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function list_iterator_next() located in gravity_core.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/marcobambini/gravity/issues/319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:creolabs:gravity:*:*:*:*:*:*:*:*", "matchCriteriaId": "B07F7D2C-1B83-4D51-89BE-CDDCD836BA20", "versionEndExcluding": null, "versionEndIncluding": "0.8.1", "versionStartExclud...
[ "476" ]
476
https://github.com/marcobambini/gravity/issues/319
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "marcobambini", "gravity" ]
## System info Ubuntu x86_64, clang 6.0, gravity (latest master [c79e18](https://github.com/marcobambini/gravity/commit/c79e185158a2b5d8f94eec599459d9a5355993c5)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address...
A Segmentation fault in gravity_core.c:1100:5
https://api.github.com/repos/marcobambini/gravity/issues/319/comments
1
2020-08-30T16:37:45Z
2020-08-31T08:20:23Z
https://github.com/marcobambini/gravity/issues/319
688,750,158
319
2,528
CVE-2021-32286
2021-09-20T16:15:10.737
An issue was discovered in hcxtools through 6.1.6. A global-buffer-overflow exists in the function pcapngoptionwalk located in hcxpcapngtool.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ZerBea/hcxtools/issues/155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hcxtools_project:hcxtoold:*:*:*:*:*:*:*:*", "matchCriteriaId": "2464705C-CFC5-4E7E-AC0C-9402A0838E32", "versionEndExcluding": null, "versionEndIncluding": "6.1.6", "versionSt...
[ "787" ]
787
https://github.com/ZerBea/hcxtools/issues/155
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ZerBea", "hcxtools" ]
## System info Ubuntu x86_64, clang 6.0, hcxpcapngtool (latest master [e6b738](https://github.com/ZerBea/hcxtools/commit/e6b738c0fb905c40fae14c03b64fccf69919356e)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" make ## Command line ./hcxpcapngtool --all -o /dev/null @@ ## Add...
A global-buffer-overflow in hcxpcapngtool.c:3789:4
https://api.github.com/repos/ZerBea/hcxtools/issues/155/comments
7
2020-08-12T03:09:27Z
2021-09-21T15:30:32Z
https://github.com/ZerBea/hcxtools/issues/155
677,347,117
155
2,529
CVE-2021-32287
2021-09-20T16:15:10.783
An issue was discovered in heif through v3.6.2. A global-buffer-overflow exists in the function HevcDecoderConfigurationRecord::getPicWidth() located in hevcdecoderconfigrecord.cpp. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokia:heif:*:*:*:*:*:*:*:*", "matchCriteriaId": "665D3535-EF3B-45AF-9DE9-8A7AF5A34D4F", "versionEndExcluding": null, "versionEndIncluding": "3.6.2", "versionStartExcluding": ...
[ "787" ]
787
https://github.com/nokiatech/heif/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nokiatech", "heif" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), heif (latest master [2fc78e](https://github.com/nokiatech/heif/commit/2fc78e4c80e9dbd22b5b0e09c137985d21d75512)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsani...
A global-buffer-overflow in hevcdecoderconfigrecord.cpp:311:37
https://api.github.com/repos/nokiatech/heif/issues/86/comments
1
2020-08-04T07:58:10Z
2020-08-12T09:12:35Z
https://github.com/nokiatech/heif/issues/86
672,589,184
86
2,530
CVE-2021-32288
2021-09-20T16:15:10.827
An issue was discovered in heif through v3.6.2. A global-buffer-overflow exists in the function HevcDecoderConfigurationRecord::getPicHeight() located in hevcdecoderconfigrecord.cpp. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokia:heif:*:*:*:*:*:*:*:*", "matchCriteriaId": "665D3535-EF3B-45AF-9DE9-8A7AF5A34D4F", "versionEndExcluding": null, "versionEndIncluding": "3.6.2", "versionStartExcluding": ...
[ "787" ]
787
https://github.com/nokiatech/heif/issues/87
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nokiatech", "heif" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), heif (latest master [2fc78e](https://github.com/nokiatech/heif/commit/2fc78e4c80e9dbd22b5b0e09c137985d21d75512)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsani...
A global-buffer-overflow in hevcdecoderconfigrecord.cpp:317:38
https://api.github.com/repos/nokiatech/heif/issues/87/comments
1
2020-08-04T14:03:20Z
2020-08-12T09:13:08Z
https://github.com/nokiatech/heif/issues/87
672,818,230
87
2,531
CVE-2021-32289
2021-09-20T16:15:10.870
An issue was discovered in heif through through v3.6.2. A NULL pointer dereference exists in the function convertByteStreamToRBSP() located in nalutil.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nokiatech/heif/issues/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nokia:heif:*:*:*:*:*:*:*:*", "matchCriteriaId": "665D3535-EF3B-45AF-9DE9-8A7AF5A34D4F", "versionEndExcluding": null, "versionEndIncluding": "3.6.2", "versionStartExcluding": ...
[ "476" ]
476
https://github.com/nokiatech/heif/issues/85
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nokiatech", "heif" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), heif (latest master [2fc78e](https://github.com/nokiatech/heif/commit/2fc78e4c80e9dbd22b5b0e09c137985d21d75512)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsani...
A Segmentation fault in nalutil.cpp:49:10
https://api.github.com/repos/nokiatech/heif/issues/85/comments
1
2020-08-04T07:55:57Z
2020-08-12T09:10:38Z
https://github.com/nokiatech/heif/issues/85
672,587,806
85
2,532
CVE-2021-32294
2021-09-20T16:15:10.917
An issue was discovered in libgig through 20200507. A heap-buffer-overflow exists in the function RIFF::List::GetSubList located in RIFF.cpp. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/drbye78/libgig/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxsampler:libgig:*:*:*:*:*:*:*:*", "matchCriteriaId": "292FD88A-E0C8-4C09-AE90-24952EC922FE", "versionEndExcluding": null, "versionEndIncluding": "20200507", "versionStart...
[ "787" ]
787
https://github.com/drbye78/libgig/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "drbye78", "libgig" ]
The User account creation has been disabled in Bugzilla, so I have to report it here. ## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), gigextract (latest master [237fd8](https://github.com/drbye78/libgig/commit/237fd8a12825717eaa648fb12e6b8bddd93032e6)) ## Command line ./src/tools/gigextract @@ /...
A heap-buffer-overflow in RIFF.cpp:1151
https://api.github.com/repos/drbye78/libgig/issues/1/comments
0
2020-08-15T14:27:18Z
2020-08-15T14:27:18Z
https://github.com/drbye78/libgig/issues/1
679,583,552
1
2,533
CVE-2021-32297
2021-09-20T16:15:10.963
An issue was discovered in LIEF through 0.11.4. A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/lief-project/LIEF/issues/449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE7CEECE-1180-4112-B47D-5DDC6362F33E", "versionEndExcluding": null, "versionEndIncluding": "0.11.4", "versionStartExcl...
[ "787" ]
787
https://github.com/lief-project/LIEF/issues/449
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "lief-project", "LIEF" ]
## System info Ubuntu x86_64, gcc, pe_reader (latest master [4bbe410](https://github.com/lief-project/LIEF/commit/4bbe410333c0d727df6bc1f3bc92d4d5adc4726e)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" #...
A heap overflow in pe_reader.c:133 (not issue in the library)
https://api.github.com/repos/lief-project/LIEF/issues/449/comments
1
2020-08-07T13:04:22Z
2020-08-27T09:19:16Z
https://github.com/lief-project/LIEF/issues/449
675,002,426
449
2,534
CVE-2021-32298
2021-09-20T16:15:11.007
An issue was discovered in libiff through 20190123. A global-buffer-overflow exists in the function IFF_errorId located in error.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/svanderburg/libiff/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libiff_project:libiff:*:*:*:*:*:*:*:*", "matchCriteriaId": "60CE841D-B2B4-44B1-BF11-6C326887388D", "versionEndExcluding": null, "versionEndIncluding": "20190123", "versionSta...
[ "787" ]
787
https://github.com/svanderburg/libiff/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "svanderburg", "libiff" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), iffpp (latest master [0290be4](https://github.com/svanderburg/libiff/commit/0290be4ed3df0c1b8e8f5c24012cc75ba8870570)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./src/iffpp/.libs/lt-iffpp @...
A global-buffer-overflow in error.c:46:18
https://api.github.com/repos/svanderburg/libiff/issues/10/comments
0
2020-08-04T06:53:28Z
2020-08-04T06:53:28Z
https://github.com/svanderburg/libiff/issues/10
672,552,072
10
2,535
CVE-2021-32299
2021-09-20T16:15:11.050
An issue was discovered in pbrt through 20200627. A stack-buffer-overflow exists in the function pbrt::ParamSet::ParamSet() located in paramset.h. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mmp/pbrt-v3/issues/296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pbrt_project:pbrt:*:*:*:*:*:*:*:*", "matchCriteriaId": "5593DE2A-56F7-46F9-8A52-64281B9F2CD5", "versionEndExcluding": null, "versionEndIncluding": "20200627", "versionStartEx...
[ "787" ]
787
https://github.com/mmp/pbrt-v3/issues/296
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mmp", "pbrt-v3" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pbrt (latest master [aaa552](https://github.com/mmp/pbrt-v3/commit/aaa552a4b9cbf9dccb71450f47b268e0ed6370e2)) ## Configure cmake ../srcs -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitiz...
A stack-buffer-overflow in paramset.h:56 with default test case
https://api.github.com/repos/mmp/pbrt-v3/issues/296/comments
0
2020-08-04T08:57:10Z
2020-08-04T08:57:10Z
https://github.com/mmp/pbrt-v3/issues/296
672,626,915
296
2,536
CVE-2021-39514
2021-09-20T16:15:11.557
An issue was discovered in libjpeg through 2020021. An uncaught floating point exception in the function ACLosslessScan::ParseMCU() located in aclosslessscan.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcludin...
[ "697" ]
697
https://github.com/thorfdbg/libjpeg/issues/36
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Frame::ParseTrailer, line 1083, file ...
A heap overflow in aclosslessscan.cpp:349 causes segment fault
https://api.github.com/repos/thorfdbg/libjpeg/issues/36/comments
2
2020-08-04T02:48:57Z
2021-10-08T06:24:14Z
https://github.com/thorfdbg/libjpeg/issues/36
672,464,794
36
2,537
CVE-2021-39515
2021-09-20T16:15:11.597
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function SampleInterleavedLSScan::ParseMCU() located in sampleinterleavedlsscan.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcludin...
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/37
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` Segmentation fault ``` ## AddressSanitizer output `...
Segmentation fault in sampleinterleavedlsscan.cpp:133
https://api.github.com/repos/thorfdbg/libjpeg/issues/37/comments
3
2020-08-04T12:51:56Z
2020-09-25T07:07:23Z
https://github.com/thorfdbg/libjpeg/issues/37
672,768,766
37
2,538
CVE-2021-39516
2021-09-20T16:15:11.640
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function HuffmanDecoder::Get() located in huffmandecoder.hpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcludin...
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## AddressSanitizer output ``` ASAN:SIGSEGV ======================...
Segmentation fault in refinementscan.cpp:644
https://api.github.com/repos/thorfdbg/libjpeg/issues/42/comments
1
2020-08-13T04:27:58Z
2020-08-28T18:07:17Z
https://github.com/thorfdbg/libjpeg/issues/42
678,140,262
42
2,539
CVE-2021-39517
2021-09-20T16:15:11.683
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::ReconstructUnsampled() located in blockbitmaprequester.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcludin...
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/33
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Tables::ParseTables, line 1384, file ...
Segmentation fault in blockbitmaprequester.cpp:1047
https://api.github.com/repos/thorfdbg/libjpeg/issues/33/comments
1
2020-08-04T01:54:43Z
2020-08-29T07:47:06Z
https://github.com/thorfdbg/libjpeg/issues/33
672,446,762
33
2,540
CVE-2021-39518
2021-09-20T16:15:11.730
An issue was discovered in libjpeg through 2020021. LineBuffer::FetchRegion() in linebuffer.cpp has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcludin...
[ "787" ]
787
https://github.com/thorfdbg/libjpeg/issues/35
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Tables::ParseTables, line 1384, file ta...
A heap overflow in linebuffer.cpp:322 causes segment fault
https://api.github.com/repos/thorfdbg/libjpeg/issues/35/comments
1
2020-08-04T02:45:44Z
2020-08-29T07:30:07Z
https://github.com/thorfdbg/libjpeg/issues/35
672,463,749
35
2,541
CVE-2021-39519
2021-09-20T16:15:11.773
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PullQData() located in blockbitmaprequester.cpp It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcludin...
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/28
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` For license conditions, see README.license for details. *...
Segmentation fault in blockbitmaprequester.cpp:1100
https://api.github.com/repos/thorfdbg/libjpeg/issues/28/comments
1
2020-08-01T14:34:03Z
2020-08-29T08:26:13Z
https://github.com/thorfdbg/libjpeg/issues/28
670,921,724
28
2,542
CVE-2021-39520
2021-09-20T16:15:11.813
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PushReconstructedData() located in blockbitmaprequester.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/thorfdbg/libjpeg/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A34FCBC-1BCC-4595-9283-0986879CDFDD", "versionEndExcluding": null, "versionEndIncluding": "2020021", "versionStartExcludin...
[ "476" ]
476
https://github.com/thorfdbg/libjpeg/issues/34
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "thorfdbg", "libjpeg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), jpeg (latest master [e52406](https://github.com/thorfdbg/libjpeg/commit/e524066cc8f532e37cf2360c9c33852b8b64f1da)) ## Command line ./jpeg -oz -h -s 1x1,2x2,2x2 @@ /dev/null ## Output ``` *** Warning -1038 in Frame::ParseTrailer, line 1088, file ...
Segmentation fault in blockbitmaprequester.cpp:1182
https://api.github.com/repos/thorfdbg/libjpeg/issues/34/comments
1
2020-08-04T02:30:41Z
2020-08-29T07:31:47Z
https://github.com/thorfdbg/libjpeg/issues/34
672,458,755
34
2,543
CVE-2021-39521
2021-09-20T16:15:11.857
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function bit_read_BB() located in bits.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/262
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [bacd017](https://github.com/LibreDWG/libredwg/commit/bacd01778d20b7b79f28541ea7a60cafe25175aa)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./SE...
A Segmentation fault in bits.c:186
https://api.github.com/repos/LibreDWG/libredwg/issues/262/comments
2
2020-08-03T14:19:33Z
2020-08-04T09:51:29Z
https://github.com/LibreDWG/libredwg/issues/262
672,111,174
262
2,544
CVE-2021-39522
2021-09-20T16:15:11.900
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2len() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/255
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./h...
A heap buffer overflow in bit_wcs2len at bits.c:1634
https://api.github.com/repos/LibreDWG/libredwg/issues/255/comments
1
2020-07-31T12:13:06Z
2020-08-01T09:34:29Z
https://github.com/LibreDWG/libredwg/issues/255
669,753,229
255
2,545
CVE-2021-39523
2021-09-20T16:15:11.947
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function check_POLYLINE_handles() located in decode.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/251
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info: Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Command line ./programs/dwg2dxf -b -m ./SEGV-check_POLYLINE_handles-decode-5110 -o /dev/null ## Output ``` Reading DWG file ./...
A Segmentation fault error in check_POLYLINE_handles at decode.c:5110
https://api.github.com/repos/LibreDWG/libredwg/issues/251/comments
0
2020-07-31T08:53:01Z
2020-08-01T09:34:28Z
https://github.com/LibreDWG/libredwg/issues/251
669,581,382
251
2,546
CVE-2021-39525
2021-09-20T16:15:11.990
An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/261
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [39ef943](https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwg2dxf -b -m ./...
A heap overflow in bits.c:1424
https://api.github.com/repos/LibreDWG/libredwg/issues/261/comments
1
2020-08-02T04:51:37Z
2020-08-02T12:15:30Z
https://github.com/LibreDWG/libredwg/issues/261
671,508,299
261
2,547
CVE-2021-39527
2021-09-20T16:15:12.037
An issue was discovered in libredwg through v0.10.1.3751. appinfo_private() in decode.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/252" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/252
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info: Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [aee0ea](https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199)) ## Command line ./programs/dwg2dxf -b -m ./heap-buffer-overflow-appinfo_private-decode-2993 -o /dev/null ## AddressSanitizer output ...
A heap buffer overflow in appinfo_private at decode.c:2993
https://api.github.com/repos/LibreDWG/libredwg/issues/252/comments
0
2020-07-31T08:58:03Z
2020-08-01T09:34:29Z
https://github.com/LibreDWG/libredwg/issues/252
669,586,008
252
2,548
CVE-2021-39528
2021-09-20T16:15:12.077
An issue was discovered in libredwg through v0.10.1.3751. dwg_free_MATERIAL_private() in dwg.spec has a double free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
[ "415" ]
415
https://github.com/LibreDWG/libredwg/issues/256
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwgbmp (latest master [4b99ed](https://github.com/LibreDWG/libredwg/commit/4b99edb0ea26e99ef65c5fe68670e6b1f9382d44)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwgbmp ./double-fr...
A double free in dwg.spec:7662
https://api.github.com/repos/LibreDWG/libredwg/issues/256/comments
1
2020-08-01T12:56:26Z
2020-08-01T21:07:33Z
https://github.com/LibreDWG/libredwg/issues/256
670,848,928
256
2,549
CVE-2021-39530
2021-09-20T16:15:12.163
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2nlen() in bits.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "937A8147-F4AB-4717-9E3F-4CFDF8194421", "versionEndExcluding": null, "versionEndIncluding": "0.10.1.3751", "versionStartExcl...
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/258
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwgbmp (latest master [39ef943](https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./programs/dwgbmp ./heap-ove...
Heap overflow due to incomplete fix for issues #255
https://api.github.com/repos/LibreDWG/libredwg/issues/258/comments
0
2020-08-02T02:25:59Z
2020-08-02T12:15:29Z
https://github.com/LibreDWG/libredwg/issues/258
671,412,127
258
2,550
CVE-2021-39531
2021-09-20T16:15:12.210
An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a stack-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExclud...
[ "787" ]
787
https://github.com/Juniper/libslax/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o ...
A dynamic-stack-buffer-overflow in slaxlexer.c:955:4
https://api.github.com/repos/Juniper/libslax/issues/53/comments
1
2020-08-03T16:29:31Z
2025-01-02T05:23:03Z
https://github.com/Juniper/libslax/issues/53
672,196,824
53
2,551
CVE-2021-39532
2021-09-20T16:15:12.253
An issue was discovered in libslax through v0.22.1. A NULL pointer dereference exists in the function slaxLexer() located in slaxlexer.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExclud...
[ "476" ]
476
https://github.com/Juniper/libslax/issues/50
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o ...
A Segmentation fault in slaxlexer.c:1107:13
https://api.github.com/repos/Juniper/libslax/issues/50/comments
2
2020-08-02T14:01:43Z
2025-01-02T05:26:14Z
https://github.com/Juniper/libslax/issues/50
671,621,842
50
2,552
CVE-2021-39533
2021-09-20T16:15:12.300
An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExclud...
[ "787" ]
787
https://github.com/Juniper/libslax/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o ...
A heap-buffer-overflow in slaxlexer.c:986:11
https://api.github.com/repos/Juniper/libslax/issues/51/comments
1
2020-08-02T14:04:56Z
2025-01-02T05:25:35Z
https://github.com/Juniper/libslax/issues/51
671,622,400
51
2,553
CVE-2021-39534
2021-09-20T16:15:12.347
An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndExcluding": null, "versionEndIncluding": "0.22.1", "versionStartExclud...
[ "787" ]
787
https://github.com/Juniper/libslax/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Juniper", "libslax" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), slaxproc (latest master [45d88a](https://github.com/Juniper/libslax/commit/45d88a103c315519cd7e3566eec10dceb4ce9bdc)) ## Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure ## Command line ./build/slaxproc/slaxproc -o ...
A heap-buffer-overflow in slaxlexer.c:751:13
https://api.github.com/repos/Juniper/libslax/issues/52/comments
1
2020-08-02T14:07:30Z
2025-01-02T05:24:31Z
https://github.com/Juniper/libslax/issues/52
671,622,806
52
2,554
CVE-2021-39544
2021-09-20T16:15:12.787
An issue was discovered in sela through 20200412. file::WavFile::writeToFile() in wav_file.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/25
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
A heap-buffer-overflow in wav_file.cpp:262:32
https://api.github.com/repos/sahaRatul/sela/issues/25/comments
0
2020-08-14T04:52:18Z
2020-08-14T04:52:18Z
https://github.com/sahaRatul/sela/issues/25
678,895,603
25
2,555
CVE-2021-39545
2021-09-20T16:15:12.827
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function rice::RiceDecoder::process() located in rice_decoder.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/31
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
Segmentation fault in rice_decoder.cpp:58:5
https://api.github.com/repos/sahaRatul/sela/issues/31/comments
0
2020-08-14T05:04:52Z
2020-08-14T05:04:52Z
https://github.com/sahaRatul/sela/issues/31
678,900,221
31
2,556
CVE-2021-39546
2021-09-20T16:15:12.873
An issue was discovered in sela through 20200412. rice::RiceDecoder::process() in rice_decoder.cpp has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
A heap-buffer-overflow in rice_decoder.cpp:39
https://api.github.com/repos/sahaRatul/sela/issues/29/comments
0
2020-08-14T05:00:32Z
2020-08-14T05:00:32Z
https://github.com/sahaRatul/sela/issues/29
678,898,461
29
2,557
CVE-2021-39547
2021-09-20T16:15:12.917
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function lpc::SampleGenerator::process() located in sample_generator.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/32
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
Segmentation fault in sample_generator.cpp:15:18
https://api.github.com/repos/sahaRatul/sela/issues/32/comments
0
2020-08-14T05:06:36Z
2020-08-14T05:06:36Z
https://github.com/sahaRatul/sela/issues/32
678,900,888
32
2,558
CVE-2021-39548
2021-09-20T16:15:12.963
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function frame::FrameDecoder::process() located in frame_decoder.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
Segmentation fault in frame_decoder.cpp:65:35
https://api.github.com/repos/sahaRatul/sela/issues/28/comments
0
2020-08-14T04:58:45Z
2020-08-14T04:58:45Z
https://github.com/sahaRatul/sela/issues/28
678,897,858
28
2,559
CVE-2021-39549
2021-09-20T16:15:13.007
An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function file::WavFile::WavFile() located in wav_file.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "476" ]
476
https://github.com/sahaRatul/sela/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
Segmentation fault in wav_file.cpp:13:46
https://api.github.com/repos/sahaRatul/sela/issues/27/comments
0
2020-08-14T04:56:57Z
2020-08-14T04:56:57Z
https://github.com/sahaRatul/sela/issues/27
678,897,262
27
2,560
CVE-2021-39550
2021-09-20T16:15:13.057
An issue was discovered in sela through 20200412. file::SelaFile::readFromFile() in sela_file.cpp has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/30
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
A heap-buffer-overflow in sela_file.cpp:90:53
https://api.github.com/repos/sahaRatul/sela/issues/30/comments
0
2020-08-14T05:02:24Z
2020-08-14T05:02:24Z
https://github.com/sahaRatul/sela/issues/30
678,899,213
30
2,561
CVE-2021-39551
2021-09-20T16:15:13.103
An issue was discovered in sela through 20200412. file::SelaFile::readFromFile() in sela_file.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
A heap-buffer-overflow in sela_file.cpp:78:67
https://api.github.com/repos/sahaRatul/sela/issues/26/comments
0
2020-08-14T04:54:33Z
2020-08-14T04:54:33Z
https://github.com/sahaRatul/sela/issues/26
678,896,429
26
2,562
CVE-2021-39552
2021-09-20T16:15:13.143
An issue was discovered in sela through 20200412. file::WavFile::readFromFile() in wav_file.c has a heap-based buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sahaRatul/sela/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sela_project:sela:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EFCB451-9AB9-4111-B4C8-3F9283520F9C", "versionEndExcluding": null, "versionEndIncluding": "2020-04-12", "versionStart...
[ "787" ]
787
https://github.com/sahaRatul/sela/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sahaRatul", "sela" ]
## System info Ubuntu x86_64, clang 6.0, sela (latest master [ca09cb](https://github.com/sahaRatul/sela/commit/ca09cbd80bd6084bca08288d980c7f6928571bbb)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE...
A heap-buffer-overflow in wav_file.cpp:160:40
https://api.github.com/repos/sahaRatul/sela/issues/23/comments
0
2020-08-14T02:49:47Z
2020-08-14T04:50:32Z
https://github.com/sahaRatul/sela/issues/23
678,857,762
23
2,563
CVE-2021-39553
2021-09-20T16:15:13.187
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function grealloc() located in gmem.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Technical Description" ], "url": "https://github.com/matthiaskramm/swftools/issues/103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/103
[ "Exploit", "Issue Tracking", "Technical Description" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-grealloc-gmem-156 ## Output ``` Error: PDF file is damaged -...
A Segmentation fault in xpdf/gmem.cc:156
https://api.github.com/repos/swftools/swftools/issues/103/comments
0
2020-08-01T06:55:27Z
2020-08-01T06:55:27Z
https://github.com/swftools/swftools/issues/103
670,596,306
103
2,564
CVE-2021-39554
2021-09-20T16:15:13.227
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function Lexer::Lexer() located in Lexer.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/100
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-Lexer-Lexer-53 ## Output ``` Segmentation fault (core dumped...
A Segmentation fault in xpdf/Lexer.cc:53
https://api.github.com/repos/swftools/swftools/issues/100/comments
0
2020-08-01T02:16:31Z
2020-08-01T02:16:31Z
https://github.com/swftools/swftools/issues/100
670,435,303
100
2,565
CVE-2021-39555
2021-09-20T16:15:13.270
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D0() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/99" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/99
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-type3D0-InfoOutputDev-880 ## Output ``` Segmentation fault (core dumpe...
A Segmentation fault in InfoOutputDev.cc:880
https://api.github.com/repos/swftools/swftools/issues/99/comments
0
2020-08-01T02:10:19Z
2020-08-01T02:10:19Z
https://github.com/swftools/swftools/issues/99
670,432,001
99
2,566
CVE-2021-39556
2021-09-20T16:15:13.313
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D1() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/105
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-type3D1-InfoOutputDev-887 ## Output ``` Segmentation fault (core dumpe...
A Segmentation fault in InfoOutputDev.cc:887
https://api.github.com/repos/swftools/swftools/issues/105/comments
0
2020-08-01T07:01:24Z
2020-08-01T07:01:24Z
https://github.com/swftools/swftools/issues/105
670,599,501
105
2,567
CVE-2021-39557
2021-09-20T16:15:13.357
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function copyString() located in gmem.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/97
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-gmalloc-gmem-101 ## Output ``` Segmentation fault (core dump...
Segmentation fault error in xpdf/gmem.cc:101
https://api.github.com/repos/swftools/swftools/issues/97/comments
0
2020-07-31T14:00:06Z
2020-08-01T02:37:17Z
https://github.com/swftools/swftools/issues/97
669,847,515
97
2,568
CVE-2021-39558
2021-09-20T16:15:13.397
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function VectorGraphicOutputDev::drawGeneralImage() located in VectorGraphicOutputDev.cc. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/106
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-drawGeneralImage-VectorGraphicOutputDev-1158 ## AddressSanitizer...
A stack-buffer-overflow in VectorGraphicOutputDev.cc:1158
https://api.github.com/repos/swftools/swftools/issues/106/comments
0
2020-08-02T03:17:40Z
2020-08-02T03:17:40Z
https://github.com/swftools/swftools/issues/106
671,446,394
106
2,569
CVE-2021-39559
2021-09-20T16:15:13.440
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function GString::~GString() located in GString.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/101
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./SEGV-GString-GString-173 ## AddressSanitizer output ``` Error: Type 4 funct...
A SEGV in xpdf/GString.cc:173
https://api.github.com/repos/swftools/swftools/issues/101/comments
0
2020-08-01T02:18:46Z
2020-08-01T02:18:46Z
https://github.com/swftools/swftools/issues/101
670,436,539
101
2,570
CVE-2021-39561
2021-09-20T16:15:13.480
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/102
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ## AddressSanitizer output ``` Error (492): Unknown operator 'P0' ==========...
A stack overflow in xpdf/Gfx.cc:1258
https://api.github.com/repos/swftools/swftools/issues/102/comments
0
2020-08-01T02:31:55Z
2020-08-01T02:31:55Z
https://github.com/swftools/swftools/issues/102
670,444,172
102
2,571
CVE-2021-39562
2021-09-20T16:15:13.527
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function FileStream::makeSubStream() located in Stream.cc. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/98" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Th...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/98
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), pdf2swf (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./pdf2swf -qq -z -o /dev/null ./stack-overflow-Stream-598 ## Output ``` Segmentation fault (core dumped) `...
A Segmentation fault in xpdf/Stream.cc:598
https://api.github.com/repos/swftools/swftools/issues/98/comments
0
2020-08-01T02:04:36Z
2020-08-01T02:06:51Z
https://github.com/swftools/swftools/issues/98
670,428,844
98
2,572
CVE-2021-39563
2021-09-20T16:15:13.567
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/115
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ...
A Segmentation fault in swfaction.c:483
https://api.github.com/repos/swftools/swftools/issues/115/comments
0
2020-08-05T07:02:23Z
2020-08-05T07:09:34Z
https://github.com/swftools/swftools/issues/115
673,305,336
115
2,573
CVE-2021-39564
2021-09-20T16:15:13.607
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/116
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==114...
A heap-buffer-overflow in swfaction.c:398
https://api.github.com/repos/swftools/swftools/issues/116/comments
0
2020-08-05T07:06:56Z
2020-08-05T07:09:11Z
https://github.com/swftools/swftools/issues/116
673,307,783
116
2,574
CVE-2021-39569
2021-09-20T16:15:13.650
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function OpAdvance() located in swfaction.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/114
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==201...
A heap-buffer-overflow in swfaction.c:254
https://api.github.com/repos/swftools/swftools/issues/114/comments
0
2020-08-05T06:59:30Z
2020-08-05T07:09:59Z
https://github.com/swftools/swftools/issues/114
673,303,749
114
2,575
CVE-2021-39574
2021-09-20T16:15:13.693
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function pool_read() located in pool.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "T...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStart...
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/124
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` /home/seviezhou/swftools/lib/rfxswf.c:520 #1 0x55e4357ac829 in pool...
A heap-buffer-overflow in rfxswf.c:520
https://api.github.com/repos/swftools/swftools/issues/124/comments
0
2020-08-05T07:40:08Z
2020-08-05T07:40:08Z
https://github.com/swftools/swftools/issues/124
673,326,905
124
2,576