cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-33444 | 2022-07-26T13:15:08.887 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in getprop_builtin_foreign() in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7",
"versionEndExcluding": "2.20.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/cesanta/mjs/issues/166 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5)
I think it is probably a similar issue as [#114](https://github.com/cesanta/mjs/issues/114)
Compile Command:
```
$ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs
```
Run Command:
```
$ mjs -f $POC... | A NULL pointer dereference in the function getprop_builtin_foreign() mjs.c:9298 | https://api.github.com/repos/cesanta/mjs/issues/166/comments | 0 | 2021-05-19T08:43:21Z | 2021-05-19T08:43:21Z | https://github.com/cesanta/mjs/issues/166 | 895,164,624 | 166 | 3,883 |
CVE-2021-33445 | 2022-07-26T13:15:08.927 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_string_char_code_at() in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7",
"versionEndExcluding": "2.20.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/cesanta/mjs/issues/169 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5)
Compile Command:
```
$ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs
```
Run Command:
```
$ mjs -f $POC
```
POC file:
https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-13891-mjs_string_cha... | A NULL pointer dereference in the function mjs_string_char_code_at() mjs.c:14234 | https://api.github.com/repos/cesanta/mjs/issues/169/comments | 0 | 2021-05-19T08:45:40Z | 2021-05-19T08:45:40Z | https://github.com/cesanta/mjs/issues/169 | 895,166,975 | 169 | 3,884 |
CVE-2021-33446 | 2022-07-26T13:15:08.967 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_next() in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7",
"versionEndExcluding": "2.20.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/cesanta/mjs/issues/168 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5)
I think it is probably a similar issue as [#105](https://github.com/cesanta/mjs/issues/105)
Compile Command:
```
$ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs
```
Run Command:
```
$ mjs -f $POC... | A NULL pointer dereference in the function mjs_next() mjs.c:12512 | https://api.github.com/repos/cesanta/mjs/issues/168/comments | 0 | 2021-05-19T08:44:54Z | 2021-05-19T08:44:54Z | https://github.com/cesanta/mjs/issues/168 | 895,166,227 | 168 | 3,885 |
CVE-2021-33447 | 2022-07-26T13:15:09.003 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_print() in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7",
"versionEndExcluding": "2.20.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/cesanta/mjs/issues/164 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5)
Compile Command:
```
$ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs
```
Run Command:
```
$ mjs -f $POC
```
POC file:
https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-7992-mjs_print-null-... | A NULL pointer dereference in the function mjs_print() mjs.c:8085 | https://api.github.com/repos/cesanta/mjs/issues/164/comments | 0 | 2021-05-19T08:41:39Z | 2021-05-19T08:41:39Z | https://github.com/cesanta/mjs/issues/164 | 895,162,768 | 164 | 3,886 |
CVE-2021-33448 | 2022-07-26T13:15:09.043 | An issue was discovered in mjs(mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is stack buffer overflow at 0x7fffe9049390. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7",
"versionEndExcluding": "2.20.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/170 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5)
Compile Command:
```
$ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs
```
Run Command:
```
$ mjs -f $POC
```
POC file:
https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-module-stack-overflo... | AddressSanitizer: stack-buffer-overflow in <unknown module> | https://api.github.com/repos/cesanta/mjs/issues/170/comments | 0 | 2021-05-19T08:46:26Z | 2021-05-19T08:46:26Z | https://github.com/cesanta/mjs/issues/170 | 895,167,796 | 170 | 3,887 |
CVE-2021-33449 | 2022-07-26T13:15:09.083 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is NULL pointer dereference in mjs_bcode_part_get_by_offset() in mjs.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13B1A3EF-A920-4FB4-BD11-F97092B362F7",
"versionEndExcluding": "2.20.0",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/cesanta/mjs/issues/162 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, mjs (latest master 4c870e5)
Compile Command:
```
$ gcc -fsanitize=address -fno-omit-frame-pointer -DMJS_MAIN mjs.c -ldl -g -o mjs
```
Run Command:
```
$ mjs -f $POC
```
POC file:
https://github.com/Clingto/POC/blob/master/MSA/mjs/mjs-7945-mjs_bcode_part_... | A NULL pointer dereference in the function mjs_bcode_part_get_by_offset() mjs.c:8042 | https://api.github.com/repos/cesanta/mjs/issues/162/comments | 0 | 2021-05-19T08:40:02Z | 2021-05-19T08:40:02Z | https://github.com/cesanta/mjs/issues/162 | 895,161,153 | 162 | 3,888 |
CVE-2021-33451 | 2022-07-26T13:15:09.167 | An issue was discovered in lrzip version 0.641. There are memory leaks in fill_buffer() in stream.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"ur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:long_range_zip_project:long_range_zip:0.641:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB0A2CF-6A4B-4F54-B6D5-5D6AE7613B7D",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"401"
] | 401 | https://github.com/ckolivas/lrzip/issues/198 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ckolivas",
"lrzip"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, lrzip (latest master 465afe8)
Compile Command:
```
$ chmod a+x mkinstalldirs
make distclean
./autogen.sh
mkdir -p build/bin
CC="gcc -fsanitize=address -fno-omit-frame-pointer -g" CXX="g++ -fsanitize=address -fno-omit-frame-pointer -g" ./configure --enable-s... | AddressSanitizer: 1 memory leaks of fill_buffer() | https://api.github.com/repos/ckolivas/lrzip/issues/198/comments | 3 | 2021-05-19T08:34:12Z | 2022-10-15T22:19:50Z | https://github.com/ckolivas/lrzip/issues/198 | 895,154,491 | 198 | 3,889 |
CVE-2021-33453 | 2022-07-26T13:15:09.253 | An issue was discovered in lrzip version 0.641. There is a use-after-free in ucompthread() in stream.c:1538. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"ur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:long_range_zip_project:long_range_zip:0.641:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB0A2CF-6A4B-4F54-B6D5-5D6AE7613B7D",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"416"
] | 416 | https://github.com/ckolivas/lrzip/issues/199 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ckolivas",
"lrzip"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, lrzip (latest master 465afe8)
I think it is probably due to an imcomplete fix of [#164](https://github.com/ckolivas/lrzip/issues/164) (imcomplete patch)
Compile Command:
```
$ chmod a+x mkinstalldirs
make distclean
./autogen.sh
mkdir -p build/bin
CC="gcc... | AddressSanitizer: heap-use-after-free in ucompthread() stream.c:1538 | https://api.github.com/repos/ckolivas/lrzip/issues/199/comments | 3 | 2021-05-19T08:35:15Z | 2022-07-23T12:32:26Z | https://github.com/ckolivas/lrzip/issues/199 | 895,155,463 | 199 | 3,890 |
CVE-2021-33454 | 2022-07-26T13:15:09.297 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr_get_intnum() in libyasm/expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/166 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
I think it is probably a similar issue as [#83](https://github.com/yasm/yasm/issues/83)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsan... | A NULL pointer dereference in the function yasm_expr_get_intnum() libyasm/expr.c:1263 | https://api.github.com/repos/yasm/yasm/issues/166/comments | 4 | 2021-05-19T08:22:19Z | 2024-03-22T14:15:04Z | https://github.com/yasm/yasm/issues/166 | 895,143,168 | 166 | 3,891 |
CVE-2021-33455 | 2022-07-26T13:15:09.337 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in do_directive() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/169 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
I think it is probably a similar issue as [#142](https://github.com/yasm/yasm/issues/142)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsaniti... | A NULL pointer dereference in the function do_directive() modules/preprocs/nasm/nasm-pp.c:2355 | https://api.github.com/repos/yasm/yasm/issues/169/comments | 1 | 2021-05-19T08:25:00Z | 2024-03-21T11:40:51Z | https://github.com/yasm/yasm/issues/169 | 895,145,758 | 169 | 3,892 |
CVE-2021-33456 | 2022-07-26T13:15:09.377 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in hash() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/175 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | A NULL pointer dereference in the function hash() modules/preprocs/nasm/nasm-pp.c:1114 | https://api.github.com/repos/yasm/yasm/issues/175/comments | 1 | 2021-05-19T08:30:54Z | 2024-03-21T11:46:29Z | https://github.com/yasm/yasm/issues/175 | 895,151,364 | 175 | 3,893 |
CVE-2021-33457 | 2022-07-26T13:15:09.417 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmac_params() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/171 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
I think it is probably a similar issue as [#151](https://github.com/yasm/yasm/issues/151)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanit... | A NULL pointer dereference in the function expand_mmac_params() modules/preprocs/nasm/nasm-pp.c:3861 | https://api.github.com/repos/yasm/yasm/issues/171/comments | 2 | 2021-05-19T08:27:21Z | 2024-03-21T11:48:05Z | https://github.com/yasm/yasm/issues/171 | 895,147,985 | 171 | 3,894 |
CVE-2021-33458 | 2022-07-26T13:15:09.457 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in find_cc() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/170 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | A NULL pointer dereference in the function find_cc() modules/preprocs/nasm/nasm-pp.c:3815 | https://api.github.com/repos/yasm/yasm/issues/170/comments | 1 | 2021-05-19T08:26:28Z | 2024-03-21T12:44:18Z | https://github.com/yasm/yasm/issues/170 | 895,147,145 | 170 | 3,895 |
CVE-2021-33459 | 2022-07-26T13:15:09.500 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/167 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | A NULL pointer dereference in the function nasm_parser_directive() modules/parsers/nasm/nasm-parse.c:1596 | https://api.github.com/repos/yasm/yasm/issues/167/comments | 1 | 2021-05-19T08:23:17Z | 2024-03-21T11:50:13Z | https://github.com/yasm/yasm/issues/167 | 895,144,100 | 167 | 3,896 |
CVE-2021-33460 | 2022-07-26T13:15:09.547 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in if_condition() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/168 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | A NULL pointer dereference in the function if_condition() modules/preprocs/nasm/nasm-pp.c:2134 | https://api.github.com/repos/yasm/yasm/issues/168/comments | 1 | 2021-05-19T08:24:08Z | 2024-03-21T11:51:21Z | https://github.com/yasm/yasm/issues/168 | 895,144,888 | 168 | 3,897 |
CVE-2021-33461 | 2022-07-26T13:15:09.590 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in yasm_intnum_destroy() in libyasm/intnum.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/161 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
I think it is probably a similar issue as [#149](https://github.com/yasm/yasm/issues/149)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanit... | AddressSanitizer: heap-use-after-free in yasm_intnum_destroy() libyasm/intnum.c:415 | https://api.github.com/repos/yasm/yasm/issues/161/comments | 3 | 2021-05-19T08:15:14Z | 2024-03-21T11:56:29Z | https://github.com/yasm/yasm/issues/161 | 895,135,903 | 161 | 3,898 |
CVE-2021-33462 | 2022-07-26T13:15:09.647 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in expr_traverse_nodes_post() in libyasm/expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/165 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
I think it is probably a similar issue as [#126](https://github.com/yasm/yasm/issues/126
)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsa... | AddressSanitizer: heap-use-after-free in expr_traverse_nodes_post() libyasm/expr.c:1112 | https://api.github.com/repos/yasm/yasm/issues/165/comments | 1 | 2021-05-19T08:21:12Z | 2024-03-21T12:28:49Z | https://github.com/yasm/yasm/issues/165 | 895,142,015 | 165 | 3,899 |
CVE-2021-33463 | 2022-07-26T13:15:09.687 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr__copy_except() in libyasm/expr.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/174 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | A NULL pointer dereference in the function yasm_expr__copy_except() libyasm/expr.c:999 | https://api.github.com/repos/yasm/yasm/issues/174/comments | 2 | 2021-05-19T08:30:07Z | 2024-03-22T14:00:39Z | https://github.com/yasm/yasm/issues/174 | 895,150,639 | 174 | 3,900 |
CVE-2021-33464 | 2022-07-26T13:15:09.730 | An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow in inc_fopen() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"787"
] | 787 | https://github.com/yasm/yasm/issues/164 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | AddressSanitizer: heap-buffer-overflow in inc_fopen() modules/preprocs/nasm/nasm-pp.c:1835 | https://api.github.com/repos/yasm/yasm/issues/164/comments | 5 | 2021-05-19T08:20:09Z | 2025-04-30T05:16:14Z | https://github.com/yasm/yasm/issues/164 | 895,140,978 | 164 | 3,901 |
CVE-2021-33465 | 2022-07-26T13:15:09.773 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmacro() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/173 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | A NULL pointer dereference in the function expand_mmacro() modules/preprocs/nasm/nasm-pp.c:4764 | https://api.github.com/repos/yasm/yasm/issues/173/comments | 1 | 2021-05-19T08:29:17Z | 2024-03-21T12:35:36Z | https://github.com/yasm/yasm/issues/173 | 895,149,848 | 173 | 3,902 |
CVE-2021-33466 | 2022-07-26T13:15:09.817 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_smacro() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/yasm/yasm/issues/172 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
I think it is probably a similar issue as [#142](https://github.com/yasm/yasm/issues/142)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanit... | A NULL pointer dereference in the function expand_smacro() modules/preprocs/nasm/nasm-pp.c:4229 | https://api.github.com/repos/yasm/yasm/issues/172/comments | 1 | 2021-05-19T08:28:18Z | 2024-03-21T12:36:44Z | https://github.com/yasm/yasm/issues/172 | 895,148,925 | 172 | 3,903 |
CVE-2021-33467 | 2022-07-26T13:15:09.860 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in pp_getline() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/163 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | AddressSanitizer: heap-use-after-free in pp_getline() modules/preprocs/nasm/nasm-pp.c:5024 | https://api.github.com/repos/yasm/yasm/issues/163/comments | 1 | 2021-05-19T08:19:19Z | 2024-03-21T12:37:57Z | https://github.com/yasm/yasm/issues/163 | 895,140,170 | 163 | 3,904 |
CVE-2021-33468 | 2022-07-26T13:15:09.903 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in error() in modules/preprocs/nasm/nasm-pp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tortall:yasm:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1453CF78-5025-49BF-A1A6-C62F948B5735",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"416"
] | 416 | https://github.com/yasm/yasm/issues/162 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yasm",
"yasm"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, yasm (latest master 009450c)
Compile Command:
```
$ ./autogen.sh
make distclean
CC=gcc CXX=g++ CFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" CXXFLAGS="-fsanitize=address -fno-omit-frame-pointer -g" ./configure --prefix=$PWD/build --disable-shared
ma... | AddressSanitizer: heap-use-after-free in error() modules/preprocs/nasm/nasm-pp.c:4830 | https://api.github.com/repos/yasm/yasm/issues/162/comments | 1 | 2021-05-19T08:17:11Z | 2024-03-21T12:39:00Z | https://github.com/yasm/yasm/issues/162 | 895,137,925 | 162 | 3,905 |
CVE-2022-34612 | 2022-07-27T02:15:09.497 | Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2738"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E797DF4-7DCA-46AA-9A36-5C0064FE79CA",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExcluding":... | [
"190"
] | 190 | https://github.com/rizinorg/rizin/issues/2738 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rizinorg",
"rizin"
] | # Crash
In Rizin of the current version, an integer overflow is found in get_long_object(). It further leads to a heap buffer overflow. The attacker can launch the DoS attack with a malformed binary.
### Work environment
| Questions | Answers
|----------------------... | An integer overflow is found in get_long_object() | https://api.github.com/repos/rizinorg/rizin/issues/2738/comments | 0 | 2022-06-25T10:15:14Z | 2022-06-25T10:58:46Z | https://github.com/rizinorg/rizin/issues/2738 | 1,284,537,634 | 2,738 | 3,906 |
CVE-2022-34971 | 2022-07-27T02:15:09.543 | An arbitrary file upload vulnerability in the Advertising Management module of Feehi CMS v2.1.1 allows attackers to execute arbitrary code via a crafted PHP file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liufee/cms/issues/62"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehi_cms:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C27559F1-734D-4924-AD35-EDC2DD9EDF7C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"434"
] | 434 | https://github.com/liufee/cms/issues/62 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | This is the base information of the website. It is obviously the latest version of the feehi cms. And in the advertising management of feehi cms v2.1.1, you can upload PHP file by changing the image suffix to PHP, resulting in command execution.
 (func))
(func (;0;) (type 0)
f32.c... | [Segmentation fault] slot index overflow because of slot missing in some bytecode | https://api.github.com/repos/wasm3/wasm3/issues/337/comments | 3 | 2022-06-20T09:46:16Z | 2022-09-11T00:36:16Z | https://github.com/wasm3/wasm3/issues/337 | 1,276,658,597 | 337 | 3,908 |
CVE-2022-34549 | 2022-07-27T14:15:08.587 | Sims v1.0 was discovered to contain an arbitrary file upload vulnerability via the component /uploadServlet. This vulnerability allows attackers to escalate privileges and execute arbitrary commands via a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://cwe.mitre.org/data/definitions/434.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rawchen/sim... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sims_project:sims:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA6A643-917D-4C43-970E-13C7BBF2270B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"434"
] | 434 | https://github.com/rawchen/sims/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rawchen",
"sims"
] | #### **[Suggested description]**
Unrestricted Upload of File with Dangerous Type vulnerability exists in SIMS. This open source system is a student information management system. There is an insecure vulnerability when uploading attachments. An attacker could exploit this vulnerability to gain server privileges.
PO... | Unrestricted Upload of File with Dangerous Type | https://api.github.com/repos/rawchen/sims/issues/6/comments | 0 | 2022-06-21T07:21:58Z | 2022-06-21T07:21:58Z | https://github.com/rawchen/sims/issues/6 | 1,278,002,866 | 6 | 3,909 |
CVE-2022-34550 | 2022-07-27T14:15:08.630 | Sims v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /addNotifyServlet. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the notifyInfo parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://cwe.mitre.org/data/definitions/79.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rawchen/sims... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:student_information_management_system_project:student_information_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD1CDE0-7A1C-42BF-A057-4F2C5EFC989C",
"versionEndExcluding": null,
... | [
"79"
] | 79 | https://github.com/rawchen/sims/issues/8 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rawchen",
"sims"
] | #### **[Suggested description]**
This open source system is a student information management system. There was an insecurity vulnerability in the announcement. Attackers can use this vulnerability to implement cross-site scripting attacks on website visitors, such as "cookie theft" and "browser escape".
POST: http:... | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | https://api.github.com/repos/rawchen/sims/issues/8/comments | 0 | 2022-06-21T07:23:49Z | 2022-06-21T07:56:39Z | https://github.com/rawchen/sims/issues/8 | 1,278,004,718 | 8 | 3,910 |
CVE-2022-34551 | 2022-07-27T14:15:08.673 | Sims v1.0 was discovered to allow path traversal when downloading attachments. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://cwe.mitre.org/data/definitions/23.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rawchen/sims... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sims_project:sims:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA6A643-917D-4C43-970E-13C7BBF2270B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"22"
] | 22 | https://github.com/rawchen/sims/issues/7 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rawchen",
"sims"
] | #### **[Suggested description]**
Relative Path Traversal exists in sims. The front end of this open source system is an online examination system. This open source system is a student information management system. An insecurity vulnerability exists when downloading attachments. Attackers can exploit this vulnerabil... | Relative Path Traversal | https://api.github.com/repos/rawchen/sims/issues/7/comments | 0 | 2022-06-21T07:22:38Z | 2022-06-21T07:22:38Z | https://github.com/rawchen/sims/issues/7 | 1,278,003,537 | 7 | 3,911 |
CVE-2022-34121 | 2022-07-27T18:15:09.313 | Cuppa CMS v1.0 was discovered to contain a local file inclusion (LFI) vulnerability via the component /templates/default/html/windows/right.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/18"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hansmach1ne/MyExpl... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"829"
] | 829 | https://github.com/CuppaCMS/CuppaCMS/issues/18 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | Cuppa CMS suffers from local file inclusion vulnerability in '/templates/default/html/windows/right.php' script using $_POST['url'] parameter.
Using the following exploit it is possible to include arbitrary server file:
curl -X POST "http://IP/cuppa/templates/default/html/windows/right.php" -d "url=../../../../../.... | Non-authenticated Local File Inclusion vulnerability in CuppaCMS templates | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/18/comments | 2 | 2022-01-06T22:53:08Z | 2023-11-14T23:17:05Z | https://github.com/CuppaCMS/CuppaCMS/issues/18 | 1,095,777,063 | 18 | 3,912 |
CVE-2022-34140 | 2022-07-28T00:15:08.683 | A stored cross-site scripting (XSS) vulnerability in /index.php?r=site%2Fsignup of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:feehi:feehi_cms:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C27559F1-734D-4924-AD35-EDC2DD9EDF7C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/liufee/cms/issues/61 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liufee",
"cms"
] | Stored XSS, also known as persistent XSS, is more damaging than non-persistent XSS. It occurs when a malicious script is injected directly into a vulnerable web application.
Step To Reproduce:
**Vulnerable cms URL:** https://demo.cms.feehi.com/
**Vulnerable Parameter:** Comment_nickname:
1-Sing-up https://de... | Stored XSS Vulnerability feehicms | https://api.github.com/repos/liufee/cms/issues/61/comments | 6 | 2022-06-11T16:14:50Z | 2022-06-20T07:44:37Z | https://github.com/liufee/cms/issues/61 | 1,268,315,415 | 61 | 3,913 |
CVE-2016-2138 | 2022-07-28T15:15:07.007 | In kippo-graph before version 1.5.1, there is a cross-site scripting vulnerability in xss_clean() in class/KippoInput.class.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ikoniaris/kippo-graph/commit/e6587ec598902763110b70c8bd0a72f7951b4997"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kippo-graph_project:kippo-graph:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B085FABC-D5D5-423A-AF92-860DCD72171D",
"versionEndExcluding": "1.5.1",
"versionEndIncluding": null,
"ver... | [
"79"
] | 79 | https://github.com/ikoniaris/kippo-graph/issues/35 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ikoniaris",
"kippo-graph"
] | Injection possible by an attacker logged into the honeypot kippo.
Location:
1. `/kippo-graph/kippo-input.php` (The wget table at the bottom of the page.)
2. `/kippo-graph/kippo-playlog.php` (If cliking on the button "Play" to play the log)
An attacker can issue this command: `wget <script>alert()</script>` inside the... | XSS Injection | https://api.github.com/repos/ikoniaris/kippo-graph/issues/35/comments | 3 | 2015-03-16T09:40:16Z | 2015-06-18T01:16:28Z | https://github.com/ikoniaris/kippo-graph/issues/35 | 62,026,861 | 35 | 3,914 |
CVE-2022-34568 | 2022-07-28T22:15:08.420 | SDL v1.2 was discovered to contain a use-after-free via the XFree function at /src/video/x11/SDL_x11yuv.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libsdl-org/SDL-1.2/issues/863"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-17"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsdl:simple_directmedia_layer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9019A536-7F63-4690-BFE6-56BF07A3640E",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.15",
"ve... | [
"416"
] | 416 | https://github.com/libsdl-org/SDL-1.2/issues/863 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"libsdl-org",
"SDL-1.2"
] | Hi, I found a potential memory leak bug in the project source code of libsdl, I have shown the execution sequence of the program that may generate the bug on a diagram which is shown below.
The text in red illustrates the steps that generate the bug
The red arrows represent call relationships
The green text illustra... | A USE AFTER FREE BUG | https://api.github.com/repos/libsdl-org/SDL-1.2/issues/863/comments | 3 | 2022-06-18T03:21:57Z | 2022-08-01T09:26:34Z | https://github.com/libsdl-org/SDL-1.2/issues/863 | 1,275,649,845 | 863 | 3,915 |
CVE-2022-34556 | 2022-07-28T23:15:07.817 | PicoC v3.2.2 was discovered to contain a NULL pointer dereference at variable.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jpoirier/picoc/issues/34"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:picoc_project:picoc:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CE8B76ED-7C7C-41CE-9129-DA7B04DC5B55",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"476"
] | 476 | https://github.com/jpoirier/picoc/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jpoirier",
"picoc"
] | PICOC Suffers from a Denial of Service (CWE476) vulnerability as a result of a Null Pointer Dereference. Any project or library that uses Picoc also suffers from this issue. An example of this would be picoc-js (https://www.npmjs.com/package/picoc-js). As a result PICOC will immediately segfault.
## Reproduct... | PICOC Null Pointer Dereference Denial of Service | https://api.github.com/repos/jpoirier/picoc/issues/34/comments | 1 | 2022-06-21T19:13:24Z | 2022-07-06T13:04:51Z | https://github.com/jpoirier/picoc/issues/34 | 1,278,929,888 | 34 | 3,916 |
CVE-2022-36234 | 2022-07-28T23:15:07.943 | SimpleNetwork TCP Server commit 29bc615f0d9910eb2f59aa8dff1f54f0e3af4496 was discovered to contain a double free vulnerability which is exploited via crafted TCP packets. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kashimAstro/SimpleNetwork/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:simplenetwork_project:simplenetwork:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8CB35D-98AC-4626-9283-F4924AAFE1DF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | [
"415"
] | 415 | https://github.com/kashimAstro/SimpleNetwork/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kashimAstro",
"SimpleNetwork"
] | Hi there!
I was running my fuzzer in the background when I discovered a double free in the SimpleNetwork TCPServer.
## Impact
Triggering the double free will allow client to crash any SimpleNetwork TCP server remotely. In other situations, double free vulnerabilities can cause undefined behavior and potentially... | Double Free in TCPServer | https://api.github.com/repos/kashimAstro/SimpleNetwork/issues/22/comments | 2 | 2022-07-14T22:35:36Z | 2023-02-01T22:43:46Z | https://github.com/kashimAstro/SimpleNetwork/issues/22 | 1,305,353,996 | 22 | 3,917 |
CVE-2022-36752 | 2022-07-28T23:15:07.987 | png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/landfillbaby/png2webp/commit/8f21ad79b0cd98fc22d5b49734543101946abbff"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:png2webp_project:png2webp:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1089A890-5F12-4382-BB11-A23704D03131",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"787"
] | 787 | https://github.com/landfillbaby/png2webp/issues/3 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"landfillbaby",
"png2webp"
] | Hi!
While I was using the tool I had some fuzz tests running in the background and I think there might be an out of bounds write bug in the webp to png converter. I compiled the tool from source using the default instructions/Makefile. I can't exactly figure out from the backtrace where the out of bounds write is ... | Out of Bounds Write in v1.0.4 | https://api.github.com/repos/landfillbaby/png2webp/issues/3/comments | 10 | 2022-07-22T17:28:52Z | 2022-07-24T03:27:35Z | https://github.com/landfillbaby/png2webp/issues/3 | 1,315,255,119 | 3 | 3,918 |
CVE-2022-24912 | 2022-07-29T10:15:12.557 | The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge we... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d787fa820"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:runatlantis:atlantis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A014E6F-1372-471F-AF98-47142E0BA350",
"versionEndExcluding": "0.19.7",
"versionEndIncluding": null,
"versionStartE... | [
"203"
] | 203 | https://github.com/runatlantis/atlantis/issues/2391 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"runatlantis",
"atlantis"
] | <!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request. Searching for pre... | GitLab webhook event validator vulnerable to timing attacks | https://api.github.com/repos/runatlantis/atlantis/issues/2391/comments | 1 | 2022-07-14T16:36:07Z | 2024-06-20T17:51:14Z | https://github.com/runatlantis/atlantis/issues/2391 | 1,305,031,017 | 2,391 | 3,919 |
CVE-2022-34496 | 2022-07-29T23:15:08.033 | Hiby R3 PRO firmware v1.5 to v1.7 was discovered to contain a file upload vulnerability via the file upload feature. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hiby:hiby_r3_pro_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7F29335-E533-461D-8DD4-38187D9829DC",
"versionEndExcluding": null,
"versionEndIncluding": "1.7",
"versionStar... | [
"434"
] | 434 | https://github.com/vext01/hiby-issues/issues/52 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"vext01",
"hiby-issues"
] | Through the File upload feature, it is possible to replace .sh files in the device with malicious content, leading to execute os commands on the device as root user.
The vulnerability is described in the below URL:
https://github.com/feric/Findings/tree/main/Hiby/Web%20Server/File%20uploading
This finding was fo... | HTTP Server File upload leads to Code Execution | https://api.github.com/repos/vext01/hiby-issues/issues/52/comments | 2 | 2022-06-19T21:55:16Z | 2022-06-28T15:06:28Z | https://github.com/vext01/hiby-issues/issues/52 | 1,276,175,638 | 52 | 3,920 |
CVE-2022-31183 | 2022-08-01T20:15:08.410 | fs2 is a compositional, streaming I/O library for Scala. When establishing a server-mode `TLSSocket` using `fs2-io` on Node.js, the parameter `requestCert = true` is ignored, peer certificate verification is skipped, and the connection proceeds. The vulnerability is limited to: 1. `fs2-io` running on Node.js. The JVM T... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nodejs/node/issues/43994"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typelevel:fs2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "750D10F3-1FF8-4173-A44A-ACDE06641472",
"versionEndExcluding": "3.2.11",
"versionEndIncluding": null,
"versionStartExcludin... | [
"295"
] | 295 | https://github.com/nodejs/node/issues/43994 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nodejs",
"node"
] | ### Affected URL(s)
https://nodejs.org/docs/latest-v18.x/api/tls.html
### Description of the problem
What is the correct, non-deprecated way to use the `new tls.TLSSocket(...)` constructor to establish a secure connection? Context: https://github.com/typelevel/fs2/security/advisories/GHSA-2cpx-6pqp-wf35
According... | How to use `new tls.TLSSocket(...)` to establish a secure connection? | https://api.github.com/repos/nodejs/node/issues/43994/comments | 1 | 2022-07-26T04:15:58Z | 2022-07-26T19:51:57Z | https://github.com/nodejs/node/issues/43994 | 1,317,672,883 | 43,994 | 3,921 |
CVE-2022-35920 | 2022-08-01T22:15:10.347 | Sanic is an opensource python web server/framework. Affected versions of sanic allow access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted. Users are advised to upgrade. There is no known workaround for this issue. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sanic-org/sanic/issues/2478"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sanic_project:sanic:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6FE6CB-23D5-45E1-A733-9F5B5C5FB93A",
"versionEndExcluding": "20.12.7",
"versionEndIncluding": null,
"versionStartE... | [
"22"
] | 22 | https://github.com/sanic-org/sanic/issues/2478 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sanic-org",
"sanic"
] | **Describe the bug**
The sanic static directory code checks for `../` as a substring of paths, but it also unquotes the path, which allows a malicious user to escape outside the static folder by using `..%2F`, where `%2F` is the URL-escaped version of `/`.
**Code snippet**
First, a basic server called `main.py... | Sanic static handler allows parent ".." directory traversal | https://api.github.com/repos/sanic-org/sanic/issues/2478/comments | 4 | 2022-06-10T19:01:48Z | 2022-07-28T06:45:46Z | https://github.com/sanic-org/sanic/issues/2478 | 1,267,904,881 | 2,478 | 3,922 |
CVE-2022-37315 | 2022-08-01T22:15:10.563 | graphql-go (aka GraphQL for Go) through 0.8.0 has infinite recursion in the type definition parser. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/graphql-go/graphql/issues/637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:graphql-go_project:graphql-go:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A43A019-10F3-43A1-88D9-208262CDBEEB",
"versionEndExcluding": null,
"versionEndIncluding": "0.8.0",
"versi... | [
"674"
] | 674 | https://github.com/graphql-go/graphql/issues/637 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"graphql-go",
"graphql"
] | Simple input `String r` crashes the parser with infinite recursion.
```go
func TestInfiniteRecursion(t *testing.T) {
body := `String r`
source := source.NewSource(&source.Source{
Body: []byte(body),
})
_, err := Parse(
ParseParams{
Source: source,
Options: ParseOptions{
NoSource: true,
... | Infinite recursion on malformed input (parseTypeSystemDefinition) | https://api.github.com/repos/graphql-go/graphql/issues/637/comments | 6 | 2022-07-19T11:49:46Z | 2023-04-10T18:12:32Z | https://github.com/graphql-go/graphql/issues/637 | 1,309,402,405 | 637 | 3,923 |
CVE-2022-34955 | 2022-08-02T03:15:09.547 | Pligg CMS v2.0.2 was discovered to contain a time-based SQL injection vulnerability via the page_size parameter at load_data_for_topusers.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Th... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pligg:pligg_cms:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB663C9-949A-4E2F-9DD2-4597F1CF55CC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Kliqqi-CMS",
"Kliqqi-CMS"
] | There are 2 time-based SQL Injection Vulnerabilities, in /load_data_for_groups.php and /load_data_for_topusers.php respectively.
ENV:
ubuntu14.04
php 5.5.9
mysql 5.5.62
# SQL Injection in /load_data_for_groups.php
vulnerable code:
Line16: the $page_size is user controllable and directly used in sql state... | SQL Injection Vulnerabilities | https://api.github.com/repos/Kliqqi-CMS/Kliqqi-CMS/issues/261/comments | 2 | 2022-07-04T02:52:46Z | 2022-09-23T14:22:58Z | https://github.com/Kliqqi-CMS/Kliqqi-CMS/issues/261 | 1,292,546,568 | 261 | 3,924 |
CVE-2022-25867 | 2022-08-02T14:15:10.103 | The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:socket:socket.io-client_java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22689B5F-7F55-45F5-9D49-27D75E767750",
"versionEndExcluding": "2.0.1",
"versionEndIncluding": null,
"versio... | [
"476"
] | 476 | https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361 | [
"Third Party Advisory"
] | github.com | [
"socketio",
"socket.io-client-java"
] |
Crash when server emit event. Socket.io-client:0.9.0.
`03-12 13:21:42.944 6958-7039/org.smartplayer.client.develop E/EventThread: Task threw exception
java.lang.NullPointerException: Attempt to invoke virtual method 'java.lang.String java.... | Crash socket-io-client | https://api.github.com/repos/socketio/socket.io-client-java/issues/508/comments | 7 | 2018-03-12T10:26:44Z | 2022-07-10T23:03:44Z | https://github.com/socketio/socket.io-client-java/issues/508 | 304,314,729 | 508 | 3,925 |
CVE-2022-37035 | 2022-08-02T23:15:18.230 | An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed f... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://docs.google.com/document/d/1TqYEcZbFeDTMKe2N4XRFwyAjw_mynIHfvzwbx1fmJj8/edit?usp=sharing"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frrouting:frrouting:8.3:-:*:*:*:*:*:*",
"matchCriteriaId": "3480A36C-F0A3-4621-96C1-0000E66D8E1C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"362"
] | 362 | https://github.com/FRRouting/frr/issues/11698 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"FRRouting",
"frr"
] | <!--
*** ATTENTION ***
YOU MUST READ THIS TO HAVE YOUR ISSUE ADDRESSED
PLEASE READ AND FILL OUT THIS TEMPLATE
NEGLECTING TO PROVIDE INFORMATION REQUESTED HERE WILL RESULT IN
SIGNIFICANT DELAYS ADDRESSING YOUR ISSUE
ALWAYS PROVIDE:
- FRR VERSION
- OPERATING SYSTEM VERSION
- KERNEL VERSION
FAILURE T... | bgpd: A use-after-free bug due to race conditions in 2 threads. | https://api.github.com/repos/FRRouting/frr/issues/11698/comments | 17 | 2022-07-28T04:43:01Z | 2023-02-15T08:08:16Z | https://github.com/FRRouting/frr/issues/11698 | 1,320,384,819 | 11,698 | 3,926 |
CVE-2022-34927 | 2022-08-03T01:15:07.347 | MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/milkytracker/MilkyTracker/commit/3a5474f9102cbdc10fbd9e7b1b2c8d3f3f45d91b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:milkytracker_project:milkytracker:1.03.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E95369-872F-4ECF-A79E-961E2359F627",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"787"
] | 787 | https://github.com/milkytracker/MilkyTracker/issues/275 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"milkytracker",
"MilkyTracker"
] | ### Description
There is a bug in the instrument parsing code in `LoaderXM::load` that can cause a stack buffer overflow when the program is supplied with a malformed XM module file. This can be abused by an attacker to corrupt the stack, control program execution flow and gain code execution.
### Execution log
``... | LoaderXM::load instrument size int underflow causes stack buffer overflow | https://api.github.com/repos/milkytracker/MilkyTracker/issues/275/comments | 2 | 2022-06-19T00:31:07Z | 2022-08-04T12:29:29Z | https://github.com/milkytracker/MilkyTracker/issues/275 | 1,275,917,885 | 275 | 3,927 |
CVE-2022-34928 | 2022-08-03T01:15:07.397 | JFinal CMS v5.1.0 was discovered to contain a SQL injection vulnerability via /system/user. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"89"
] | 89 | https://github.com/jflyfox/jfinal_cms/issues/43 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | There is a SQLI vul in background mode.The route is as following
<img width="910" alt="1" src="https://user-images.githubusercontent.com/58795040/175862384-81e6d16e-8c57-493c-a73b-294ef4deb3d3.png">
vulnerable argument passing is as following
<img width="713" alt="2" src="https://user-images.githubusercontent.com/... | jfinal_ CMS 5.1.0 SQL injection | https://api.github.com/repos/jflyfox/jfinal_cms/issues/43/comments | 0 | 2022-06-27T04:58:14Z | 2022-06-27T04:58:14Z | https://github.com/jflyfox/jfinal_cms/issues/43 | 1,285,238,213 | 43 | 3,928 |
CVE-2022-34937 | 2022-08-03T01:15:07.457 | Yuba u5cms v8.3.5 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component savepage.php. This vulnerability allows attackers to execute arbitrary code. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/u5cms/u5cms/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yuba:u5cms:8.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE24631-9298-47C8-98FE-60BA7F45869B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | [
"352"
] | 352 | https://github.com/u5cms/u5cms/issues/51 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"u5cms",
"u5cms"
] | **Summary**
Vulnerability Type: Cross-Site Request Forgery
Severity: High
Estimated CVSS Score: 8.3 (https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
Vulnerable Page: u5admin/savepage.php
Impacted version: At least 8.3.5 (but I think <= 10.1.13 are vulnerable too because of... | CSRF can lead to RCE if admin is targeted | https://api.github.com/repos/u5cms/u5cms/issues/51/comments | 0 | 2022-06-27T22:33:19Z | 2023-11-24T09:12:41Z | https://github.com/u5cms/u5cms/issues/51 | 1,286,515,155 | 51 | 3,929 |
CVE-2022-36197 | 2022-08-03T01:15:07.500 | BigTree CMS 4.4.16 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted PDF file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bigtreecms/BigTree-CMS/issues/392"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bigtreecms:bigtree_cms:4.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB6ABFA-D209-4EEE-A95A-2D7215EF33AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"79"
] | 79 | https://github.com/bigtreecms/BigTree-CMS/issues/392 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bigtreecms",
"BigTree-CMS"
] | A stored cross-site scripting (XSS) vulnerability exists in BigTree-CMS 4.4.16 that allows an authenticated user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger a XSS attack.
1. Login as admin and access the file... | A stored cross-site scripting (XSS) vulnerability exists in BigTree CMS 4.4.16 | https://api.github.com/repos/bigtreecms/BigTree-CMS/issues/392/comments | 14 | 2022-07-13T08:52:31Z | 2024-05-05T08:19:20Z | https://github.com/bigtreecms/BigTree-CMS/issues/392 | 1,303,118,093 | 392 | 3,930 |
CVE-2022-34967 | 2022-08-03T02:15:07.783 | The assertion `stmt->Dbc->FirstStmt' failed in MonetDB Database Server v11.43.13. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MonetDB/MonetDB/issues/7306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monetdb:monetdb:11.43.13:*:*:*:*:*:*:*",
"matchCriteriaId": "4217E8A4-6972-44A1-B8B6-45F57F4C6486",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"617"
] | 617 | https://github.com/MonetDB/MonetDB/issues/7306 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"MonetDB",
"MonetDB"
] | **Describe the bug**
ODBC Driver assertion failed
**To Reproduce**
command to start odbc client:
```sh
apt install unixodbc
# config MonetDB in $HOME/.odbc.ini
...
isql monetdb -v
```
Input the following statements:
```sql
SELECT avg(42) over (order by row_number() over ());
SELECT 1;
```
It will e... | ODBC Driver Assertion `stmt->Dbc->FirstStmt' Failed | https://api.github.com/repos/MonetDB/MonetDB/issues/7306/comments | 8 | 2022-06-19T01:18:36Z | 2024-06-27T13:17:40Z | https://github.com/MonetDB/MonetDB/issues/7306 | 1,275,924,048 | 7,306 | 3,931 |
CVE-2022-34969 | 2022-08-03T02:15:07.877 | PingCAP TiDB v6.1.0 was discovered to contain a NULL pointer dereference. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pingcap/tidb/issues/35310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pingcap:tidb:6.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "134E1786-FCEA-430A-A2E8-D083B20CF09C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"476"
] | 476 | https://github.com/pingcap/tidb/issues/35310 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"pingcap",
"tidb"
] | ## Bug Report
Please answer these questions before submitting your issue. Thanks!
### 1. Minimal reproduce step (Required)
```sql
SET sql_mode="";
GRANT ALL PRIVILEGES ON *.* to '???';
```
### 2. What did you expect to see? (Required)
```
Query OK, 0 rows affected (0.00 sec)
ERROR 1410 (42000): You ... | runtime error: invalid memory address or nil pointer dereference (Maybe not a bug) | https://api.github.com/repos/pingcap/tidb/issues/35310/comments | 2 | 2022-06-12T13:45:43Z | 2022-06-14T08:52:34Z | https://github.com/pingcap/tidb/issues/35310 | 1,268,587,049 | 35,310 | 3,932 |
CVE-2022-34992 | 2022-08-03T18:15:12.017 | Luadec v0.9.9 was discovered to contain a heap-buffer overflow via the function UnsetPending. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/viruscamp/luadec/issues/84"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:luadec_project:luadec:0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "86013A43-567F-49FF-8CC6-4402E5AC3839",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/viruscamp/luadec/issues/84 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"viruscamp",
"luadec"
] | Hi :)
When I was decompiling the Lua script on openwrt, I found a `segmentation fault` error. I try to debug luadec to find the location of bug. Size of some array variables in function structure is 255. However, these variables were accessed out of bounds in decompiling.
```c
#define MAXARG_A ((1<<SIZE_A)... | Heap-buffer-overflow in UnsetPending | https://api.github.com/repos/viruscamp/luadec/issues/84/comments | 0 | 2022-06-25T08:51:44Z | 2022-06-27T12:02:14Z | https://github.com/viruscamp/luadec/issues/84 | 1,284,512,320 | 84 | 3,933 |
CVE-2022-35161 | 2022-08-03T21:15:08.260 | GVRET Stable Release as of Aug 15, 2015 was discovered to contain a buffer overflow via the handleConfigCmd function at SerialConsole.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/collin80/GVRET/issues/27"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:generalized_electric_vehicle_reverse_engineering_tool_project:generalized_electric_vehicle_reverse_engineering_tool:2015-08-15:*:*:*:*:*:*:*",
"matchCriteriaId": "B054027C-5AC7-405B-9469-40E5EC4C2A8E",
... | [
"120"
] | 120 | https://github.com/collin80/GVRET/issues/27 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"collin80",
"GVRET"
] | hi, great project!
There is a buffer overflow vulnerability in the handleConfigCmd function of the SerialConsole.cpp file. When cmdString == String("FILEEXT")), the newString is copied to fileNameExt without checking the length, and overflow may occur.
```c
void SerialConsole::handleConfigCmd()
{
int i;
... | buffer overflow in SerialConsole.cpp | https://api.github.com/repos/collin80/GVRET/issues/27/comments | 1 | 2022-07-02T08:16:49Z | 2023-10-20T10:13:20Z | https://github.com/collin80/GVRET/issues/27 | 1,292,000,397 | 27 | 3,934 |
CVE-2022-35505 | 2022-08-03T21:15:08.303 | A segmentation fault in TripleCross v0.1.0 occurs when sending a control command from the client to the server. This occurs because there is no limit to the length of the output of the executed command. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/h3xduck/TripleCross/issues/40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:triplecross_project:triplecross:0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD36F6DA-0079-479B-9760-FC5C4BDC3FA4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ve... | [
"770"
] | 770 | https://github.com/h3xduck/TripleCross/issues/40 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"h3xduck",
"TripleCross"
] | hi, great project!
I think it's better to limit the size of `res`, otherwise it may cause the program to crash, such as performing "cat /dev/random | od -x", which maybe unlikely in reality.
```
char *execute_command(char *command) {
FILE *fp;
char *res = calloc(4096, sizeof(char));
char buf[1024];
fp ... | segmentation fault when execute_command and the stack overflow caused by parameters | https://api.github.com/repos/h3xduck/TripleCross/issues/40/comments | 5 | 2022-07-05T17:03:53Z | 2023-10-20T10:13:44Z | https://github.com/h3xduck/TripleCross/issues/40 | 1,294,550,315 | 40 | 3,935 |
CVE-2022-31119 | 2022-08-04T18:15:09.557 | Nextcloud Mail is an email application for the nextcloud personal cloud product. Affected versions of Nextcloud mail would log user passwords to disk in the event of a misconfiguration. Should an attacker gain access to the logs complete access to affected accounts would be obtainable. It is recommended that the Nextcl... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integri... | [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/mail/issues/823"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nextcloud:mail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1105B681-6F8C-4A93-9095-A0E5E47FB63F",
"versionEndExcluding": "1.12.1",
"versionEndIncluding": null,
"versionStartExcludi... | [
"532"
] | 532 | https://github.com/nextcloud/mail/issues/823 | [
"Third Party Advisory"
] | github.com | [
"nextcloud",
"mail"
] | ### Steps to reproduce
1. Install mail app
2. configure Mail app, **but** make a fault (e.g. wrong IMAP Server Port) so that the setup is not completed
3. look at nextcloud.log and see: password in PLAINTEXT
### Expected behaviour
Do not log in any circumstances (at least not in Log-Level 2/3) ANY passwords to d... | password disclosure in initial setup | https://api.github.com/repos/nextcloud/mail/issues/823/comments | 6 | 2018-03-07T15:47:28Z | 2022-07-25T11:58:24Z | https://github.com/nextcloud/mail/issues/823 | 303,150,826 | 823 | 3,936 |
CVE-2022-35858 | 2022-08-04T20:15:20.013 | The TEE_PopulateTransientObject and __utee_from_attr functions in Samsung mTower 0.3.0 allow a trusted application to trigger a memory overwrite, denial of service, and information disclosure by invoking the function TEE_PopulateTransientObject with a large number in the parameter attrCount. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tee/lib/libutee/tee_api_objects.c#L283"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samsung:mtower:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BCFFBF4-D702-4AE7-9022-337184251075",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"401"
] | 401 | https://github.com/Samsung/mTower/issues/71 | [
"Third Party Advisory"
] | github.com | [
"Samsung",
"mTower"
] | **Affected components:**
affected source code file: /tee/lib/libutee/tee_api_objects.c, affected functions: TEE_PopulateTransientObject and __utee_from_attr
**Attack vector(s)**
To exploit the vulnerability, invoke the function TEE_PopulateTransientObject and pass a large number of the parameter "attrCount"
... | Security: Memory Leak in the function TEE_PopulateTransientObject | https://api.github.com/repos/Samsung/mTower/issues/71/comments | 1 | 2022-08-01T06:05:40Z | 2022-11-24T20:35:19Z | https://github.com/Samsung/mTower/issues/71 | 1,323,873,733 | 71 | 3,937 |
CVE-2022-37434 | 2022-08-05T07:15:07.240 | zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the n... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/37"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldis... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59A031AE-1A48-4E95-A632-B0CBD2A8048D",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.12",
"versionStartExcluding": ... | [
"787"
] | 787 | https://github.com/curl/curl/issues/9271 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"curl",
"curl"
] | ### I did this
Using zlib v1.2.12 [patched](https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1) for [CVE-2022-37434](https://nvd.nist.gov/vuln/detail/CVE-2022-37434):
```bash
make test
# or...
cd tests
./runtests.pl 224
test 0224...[HTTP GET gzip compressed content with huge com... | Test 224 fails with CVE-2022-37434 patched zlib | https://api.github.com/repos/curl/curl/issues/9271/comments | 12 | 2022-08-07T23:38:56Z | 2022-10-14T07:54:32Z | https://github.com/curl/curl/issues/9271 | 1,331,154,166 | 9,271 | 3,938 |
CVE-2022-35426 | 2022-08-10T20:15:54.043 | UCMS 1.6 is vulnerable to arbitrary file upload via ucms/sadmin/file PHP file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cc-225/ucms_v1.6/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ucms_project:ucms:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED914EC-C479-4D5F-8322-2241E409AECC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"434"
] | 434 | https://github.com/cc-225/ucms_v1.6/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cc-225",
"ucms_v1.6"
] | UCMS_v1.6.0 Arbitrary file upload vulnerability
Vulnerability type:
V 1.6.0
Recurrence environment:
Windows 10
phpstudy
Vulnerability description:
The vulnerability lies in /ucms-v1.6/ucms/sadmin/file PHP file, the file suffix on is not verified, so any file can be uploaded
Loophole recurrence:
... | UCMs v1.6.0 arbitrary file upload | https://api.github.com/repos/cc-225/ucms_v1.6/issues/1/comments | 0 | 2022-07-05T03:46:04Z | 2022-07-05T03:46:04Z | https://github.com/cc-225/ucms_v1.6/issues/1 | 1,293,747,958 | 1 | 3,939 |
CVE-2022-38155 | 2022-08-11T01:15:10.917 | TEE_Malloc in Samsung mTower through 0.3.0 allows a trusted application to achieve Excessive Memory Allocation via a large len value, as demonstrated by a Numaker-PFM-M2351 TEE kernel crash. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Samsung/mTower/blob/18f4b592a8a973ce5972f4e2658ea0f6e3686284/tee/lib/libutee/tee_api.c#L314"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:samsung:mtower:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C72C53B-9CF2-4F9A-90C1-3A1FE236BA5B",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.0",
"versionStartExcludin... | [
"770"
] | 770 | https://github.com/Samsung/mTower/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Samsung",
"mTower"
] | **Affected components:**
affected source code file: /tee/lib/libutee/tee_api.c, affected functions: TEE_Malloc
**Attack vector(s)**
To exploit the vulnerability, invoke the function TEE_Malloc and pass a large number to the parameter "len".
**Suggested description of the vulnerability for use in the CVE**
... | Security: Memory Allocation with Excessive Size Value in the function TEE_Malloc | https://api.github.com/repos/Samsung/mTower/issues/74/comments | 1 | 2022-08-01T06:09:46Z | 2022-11-18T16:06:57Z | https://github.com/Samsung/mTower/issues/74 | 1,323,878,550 | 74 | 3,940 |
CVE-2022-38223 | 2022-08-15T11:21:43.557 | There is an out-of-bounds write in checkType located in etc.c in w3m 0.5.3. It can be triggered by sending a crafted HTML file to the w3m binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tats/w3m/issues/242"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00030.html"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tats:w3m:0.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "06FBD8AD-A8A0-4E54-B2AE-3F6D9B008628",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"787"
] | 787 | https://github.com/tats/w3m/issues/242 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tats",
"w3m"
] | Hello, I found a out of bound write in w3m, function checkType, etc.c:441 while testing my new fuzzer.
## step to reproduce
`export CC="gcc -fsanitize=address -g" ./configure --disable-shared && make -j8`
`./w3m $POC`
## Environment
* Ubuntu 22.04 (docker image)
* w3m latest commit c515ea8a47b62408943390f579... | [BUG] out of bound write in checkType, etc.c:441 | https://api.github.com/repos/tats/w3m/issues/242/comments | 13 | 2022-08-07T11:27:28Z | 2022-12-21T11:16:01Z | https://github.com/tats/w3m/issues/242 | 1,330,988,298 | 242 | 3,941 |
CVE-2022-36262 | 2022-08-15T12:15:20.673 | An issue was discovered in taocms 3.0.2. in the website settings that allows arbitrary php code to be injected by modifying config.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"URL Repurposed"
],
"url": "http://taocms.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms"
},
{
"source": "cve... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"94"
] | 94 | https://github.com/taogogo/taocms/issues/34 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | 1. We enter the management page, Go to website settings.

2. Next, I want to inject php code by modifying these settings.
From the config.php file we found that the modified configuration will be writte... | Bypass security protection injection code in the website settings function | https://api.github.com/repos/taogogo/taocms/issues/34/comments | 0 | 2022-07-17T03:21:56Z | 2022-07-17T03:21:56Z | https://github.com/taogogo/taocms/issues/34 | 1,306,974,846 | 34 | 3,942 |
CVE-2022-36262 | 2022-08-15T12:15:20.673 | An issue was discovered in taocms 3.0.2. in the website settings that allows arbitrary php code to be injected by modifying config.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"URL Repurposed"
],
"url": "http://taocms.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms"
},
{
"source": "cve... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"94"
] | 94 | https://github.com/taogogo/taocms/issues/34?by=xboy%28topsec%29 | null | github.com | [
"taogogo",
"taocms"
] | 1. We enter the management page, Go to website settings.

2. Next, I want to inject php code by modifying these settings.
From the config.php file we found that the modified configuration will be writte... | Bypass security protection injection code in the website settings function | https://api.github.com/repos/taogogo/taocms/issues/34/comments | 0 | 2022-07-17T03:21:56Z | 2022-07-17T03:21:56Z | https://github.com/taogogo/taocms/issues/34 | 1,306,974,846 | 34 | 3,943 |
CVE-2020-21365 | 2022-08-15T20:15:08.107 | Directory traversal vulnerability in wkhtmltopdf through 0.12.5 allows remote attackers to read local files and disclose sensitive information via a crafted html file running with the default configurations. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/wkhtmltopdf/wkhtmltopdf/issues/4536"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wkhtmltopdf:wkhtmltopdf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "188C03DB-7001-45E0-BCF9-C31881353BCC",
"versionEndExcluding": null,
"versionEndIncluding": "0.12.5",
"versionSta... | [
"22"
] | 22 | https://github.com/wkhtmltopdf/wkhtmltopdf/issues/4536 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"wkhtmltopdf",
"wkhtmltopdf"
] | **wkhtmltopdf version(s) affected**:
all version ( <=0.12.5 )
**OS information**
All supported OS
**Description**
Because the same-origin policy is not strict enough, the html files under the `file` domain can read any files.
**How to reproduce**
Create an HTML file named `111.html`
The file contents a... | The same origin policy allows local files to be read by default | https://api.github.com/repos/wkhtmltopdf/wkhtmltopdf/issues/4536/comments | 14 | 2019-11-21T07:17:33Z | 2020-10-20T09:24:57Z | https://github.com/wkhtmltopdf/wkhtmltopdf/issues/4536 | 526,410,059 | 4,536 | 3,944 |
CVE-2020-23622 | 2022-08-15T20:15:09.040 | An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked CALLBACK parameter in the request header | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/4thline/cling/issues/253"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://zh-cn.tenable.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cling_project:cling:*:*:*:*:*:*:*:*",
"matchCriteriaId": "740B8998-CC1B-4AC7-A0EC-216E4230D80F",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.2",
"versionStartExc... | [
"918"
] | 918 | https://github.com/4thline/cling/issues/253 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"4thline",
"cling"
] | The Upnp protocol implemented in the latest version of cling has a flaw, and the CALLBACK parameter in the request header of the service's subscribe request is not checked, resulting in the attacker using this flaw to send malicious data to the device developed using cling, which causes the device to specify to the att... | SSRF and DDOS vulnerability | https://api.github.com/repos/4thline/cling/issues/253/comments | 0 | 2020-06-10T10:10:26Z | 2020-06-10T10:10:26Z | https://github.com/4thline/cling/issues/253 | 636,120,676 | 253 | 3,945 |
CVE-2022-36272 | 2022-08-16T13:15:11.357 | Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/page/verify URI via fieldName parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ming-soft/MCMS/issues/97"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mingsoft:mcms:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7C5B845C-EA6C-4362-B197-7C58FE4C8129",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"89"
] | 89 | https://github.com/ming-soft/MCMS/issues/97 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ming-soft",
"MCMS"
] | # 漏洞分析
漏洞路由位置/${ms.manager.path}/mdiy/page/verify,漏洞点在如下方法,if...else两个条件中的validated方法均存在问题。
<img width="1388" alt="image-20220717104840622" src="https://user-images.githubusercontent.com/76940213/179385662-6320f8e4-9a66-4a5d-a720-1e7bec901c13.png">
调用了父类的`validated`方法,validated方法中将传入的fieldName和fieldValue复制wher... | Mingsoft MCMS v5.2.8 SQL注入【后台】 | https://api.github.com/repos/ming-soft/MCMS/issues/97/comments | 1 | 2022-07-17T06:10:16Z | 2022-09-09T01:37:02Z | https://github.com/ming-soft/MCMS/issues/97 | 1,306,999,774 | 97 | 3,946 |
CVE-2022-36530 | 2022-08-16T13:15:11.593 | An issue was discovered in rageframe2 2.6.37. There is a XSS vulnerability in the user agent related parameters of the info.php page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"URL Repurposed"
],
"url": "http://rageframe2.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/jianyan74/rageframe2"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rageframe:rageframe:2.6.37:*:*:*:*:*:*:*",
"matchCriteriaId": "A47AB39E-4AD7-4349-BBD5-4F11B4D4C0D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/jianyan74/rageframe2/issues/106 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jianyan74",
"rageframe2"
] | ## Reflective Cross Site Scripting at info.php
1. I found that at line 50 of backend/common/system/info.php, Receive parameters without any filtering at `$_SERVER['HTTP_USER_AGENT']`.

2. This is an ... | Reflective Cross Site Scripting at info.php | https://api.github.com/repos/jianyan74/rageframe2/issues/106/comments | 4 | 2022-07-18T06:57:57Z | 2022-09-05T18:30:54Z | https://github.com/jianyan74/rageframe2/issues/106 | 1,307,490,211 | 106 | 3,947 |
CVE-2022-36530 | 2022-08-16T13:15:11.593 | An issue was discovered in rageframe2 2.6.37. There is a XSS vulnerability in the user agent related parameters of the info.php page. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"URL Repurposed"
],
"url": "http://rageframe2.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/jianyan74/rageframe2"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rageframe:rageframe:2.6.37:*:*:*:*:*:*:*",
"matchCriteriaId": "A47AB39E-4AD7-4349-BBD5-4F11B4D4C0D4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"79"
] | 79 | https://github.com/jianyan74/rageframe2/issues/106?by=xboy%28Topsec%29 | null | github.com | [
"jianyan74",
"rageframe2"
] | ## Reflective Cross Site Scripting at info.php
1. I found that at line 50 of backend/common/system/info.php, Receive parameters without any filtering at `$_SERVER['HTTP_USER_AGENT']`.

2. This is an ... | Reflective Cross Site Scripting at info.php | https://api.github.com/repos/jianyan74/rageframe2/issues/106/comments | 4 | 2022-07-18T06:57:57Z | 2022-09-05T18:30:54Z | https://github.com/jianyan74/rageframe2/issues/106 | 1,307,490,211 | 106 | 3,948 |
CVE-2022-34998 | 2022-08-16T21:15:10.403 | JPEGDEC commit be4843c was discovered to contain a global buffer overflow via JPEGDecodeMCU at /src/jpeg.inl. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bitbank2/JPEGDEC/issues/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitbanksoftware:jpegdec:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD48ECE-E09D-4E1E-9483-C049A63EAB96",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"120"
] | 120 | https://github.com/bitbank2/JPEGDEC/issues/41 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bitbank2",
"JPEGDEC"
] | hi, with the help of fuzzing ,I found some crash sample in this repo.
crash sample will be offered, and to reproduce the crash info please use command `./linux/jpegdec crash_sample`
## negative-size-param
### sample here:
[negative-size-param-crash-sample.zip](https://github.com/bitbank2/JPEGDEC/files/9015823... | BUGS FOUND | https://api.github.com/repos/bitbank2/JPEGDEC/issues/41/comments | 2 | 2022-06-30T03:14:11Z | 2025-02-07T17:18:22Z | https://github.com/bitbank2/JPEGDEC/issues/41 | 1,289,522,620 | 41 | 3,949 |
CVE-2022-35007 | 2022-08-16T21:15:10.620 | PNGDec commit 8abf6be was discovered to contain a heap buffer overflow via __interceptor_fwrite.part.57 at sanitizer_common_interceptors.inc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bitbank2/PNGdec/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pngdec_project:pngdec:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D61EF480-84D3-471F-8D05-3358C729D827",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/bitbank2/PNGdec/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"bitbank2",
"PNGdec"
] | hi, i found something unusual in this repo, are they new bugs ?
To reproduce the crash please use command: `./png_demo @@ /dev/null (replace @@ to the sample's path)`
## FPE
### crash sample
[id0-FPE-sample1.zip](https://github.com/bitbank2/PNGdec/files/9018637/id0-FPE-sample1.zip)
### crash info
```
Ad... | BUGS FOUND | https://api.github.com/repos/bitbank2/PNGdec/issues/10/comments | 1 | 2022-06-30T10:01:15Z | 2024-03-25T23:07:11Z | https://github.com/bitbank2/PNGdec/issues/10 | 1,289,895,820 | 10 | 3,950 |
CVE-2022-35100 | 2022-08-16T21:15:10.973 | SWFTools commit 772e55a2 was discovered to contain a segmentation violation via gfxline_getbbox at /lib/gfxtools.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/182"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"125"
] | 125 | https://github.com/matthiaskramm/swftools/issues/182 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | Hi, I currently learn to use fuzz tech to detect bugs and I found something in this repo.
in order to reproduce the crash info, please attach ASAN when you compile this repo.
## heap buffer overflow
### reproduce
command to reproduce: ./pdf2swf -G -f -t [sample file] -o /dev/null
### sample file
[id3_he... | bug found in swftools-pdf2swf | https://api.github.com/repos/swftools/swftools/issues/182/comments | 0 | 2022-07-03T08:46:34Z | 2022-07-04T03:25:22Z | https://github.com/swftools/swftools/issues/182 | 1,292,246,190 | 182 | 3,951 |
CVE-2022-35105 | 2022-08-16T21:15:11.107 | SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via /bin/png2swf+0x552cea. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/matthiaskramm/swftools/issues/183 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | Hi, I currently learn to use fuzz tech to detect bugs and I found something in this repo.
in order to reproduce the crash info, please attach ASAN when you compile this repo.
## heap buffer overflow
### reproduce
command to reproduce the crash : ./png2swf -j 50 [sample file] -o /dev/null
### sample file
[id... | bug found in swftools-png2swf | https://api.github.com/repos/swftools/swftools/issues/183/comments | 0 | 2022-07-03T08:51:23Z | 2022-07-04T03:22:44Z | https://github.com/swftools/swftools/issues/183 | 1,292,247,150 | 183 | 3,952 |
CVE-2022-35107 | 2022-08-16T21:15:11.180 | SWFTools commit 772e55a2 was discovered to contain a stack overflow via vfprintf at /stdio-common/vfprintf.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"770"
] | 770 | https://github.com/matthiaskramm/swftools/issues/184 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # heap buffer overflow
### reproduce
command to reproduce: ./pdf2swf -G -f -t [sample file] -o /dev/null
### sample file
[id458_heap_overflow_draw_stroke.zip](https://github.com/matthiaskramm/swftools/files/9036118/id458_heap_overflow_draw_stroke.zip)
### crash info
```
==11942==ERROR: AddressSanitizer: heap-b... | bug report swftools-pdf2swf | https://api.github.com/repos/swftools/swftools/issues/184/comments | 0 | 2022-07-04T03:13:51Z | 2022-07-04T03:20:37Z | https://github.com/swftools/swftools/issues/184 | 1,292,557,716 | 184 | 3,953 |
CVE-2022-35113 | 2022-08-16T21:15:11.363 | SWFTools commit 772e55a2 was discovered to contain a heap-buffer overflow via swf_DefineLosslessBitsTagToImage at /modules/swfbits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/185"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E27E60-6223-457B-BF90-E747C9C5DEE1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"787"
] | 787 | https://github.com/matthiaskramm/swftools/issues/185 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | # swfrender
## heap buffer overflow
### command to reproduce
`./swfrender [sample file] -o /dev/null`
### crash sample
[id8_heap-buffer-overflow_swf_DefineLosslessBitsTagToImage.zip](https://github.com/matthiaskramm/swftools/files/9036326/id8_heap-buffer-overflow_swf_DefineLosslessBitsTagToImage.zip)
### cr... | bug found in swfrender | https://api.github.com/repos/swftools/swftools/issues/185/comments | 0 | 2022-07-04T04:15:24Z | 2022-07-04T04:15:24Z | https://github.com/swftools/swftools/issues/185 | 1,292,592,670 | 185 | 3,954 |
CVE-2022-35433 | 2022-08-16T21:15:11.440 | ffjpeg commit caade60a69633d74100bd3c2528bddee0b6a1291 was discovered to contain a memory leak via /src/jfif.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ffjpeg_project:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1391A61-FDE9-48B2-A3F5-5A162BA44F82",
"versionEndExcluding": "2021-12-16",
"versionEndIncluding": null,
"versionS... | [
"401"
] | 401 | https://github.com/rockcarry/ffjpeg/issues/52 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | ### sample file
[id8_memory_leak.zip](https://github.com/rockcarry/ffjpeg/files/9053199/id8_memory_leak.zip)
### command to reproduce
`./ffjpeg -d [sample file]`
### execute info
```
usrc overflow
=================================================================
==16225==ERROR: LeakSanitizer: detected me... | memory leak | https://api.github.com/repos/rockcarry/ffjpeg/issues/52/comments | 1 | 2022-07-06T08:50:43Z | 2023-07-13T01:47:45Z | https://github.com/rockcarry/ffjpeg/issues/52 | 1,295,485,297 | 52 | 3,955 |
CVE-2022-35434 | 2022-08-16T21:15:11.477 | jpeg-quantsmooth before commit 8879454 contained a floating point exception (FPE) via /jpeg-quantsmooth/jpegqs+0x4f5d6c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ilyakurdyukov/jpeg-quantsmooth/issues/25"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpeg_quant_smooth_project:jpeg_quant_smooth:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E70D5AC-A410-48F8-BE3D-90CD1392BEC5",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"697"
] | 697 | https://github.com/ilyakurdyukov/jpeg-quantsmooth/issues/25 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ilyakurdyukov",
"jpeg-quantsmooth"
] |
### sample file
[id0_FPE_jpegqs+0x41c889.zip](https://github.com/ilyakurdyukov/jpeg-quantsmooth/files/9078414/id0_FPE_jpegqs%2B0x41c889.zip)
### command to reproduce
`./jpegqs -o [sample file] /dev/null`
### crash detail
```
AddressSanitizerAddressSanitizerAddressSanitizerAddressSanitizer:DEADLYSIGNAL... | New issue about FPB | https://api.github.com/repos/ilyakurdyukov/jpeg-quantsmooth/issues/25/comments | 1 | 2022-07-10T04:04:00Z | 2022-07-10T06:38:49Z | https://github.com/ilyakurdyukov/jpeg-quantsmooth/issues/25 | 1,299,822,380 | 25 | 3,956 |
CVE-2022-36139 | 2022-08-16T21:15:12.953 | SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Writer::writeByte(unsigned char). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/djcsdy/swfmill/issues/56 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id10_heap-buffer-overflow_writebyte.zip](https://github.com/Cvjark/Poc/files/9080797/id10_heap-buffer-overflow_writebyte.zip)
### command to reproduce
`./swfmill simple @@ /dev/null`
### crash detail
```
=================================================================
==56715==ERROR: Addres... | heap-buffer-overflow in SWF::Writer::writeByte(unsigned char) | https://api.github.com/repos/djcsdy/swfmill/issues/56/comments | 0 | 2022-07-11T03:58:04Z | 2022-07-11T03:58:04Z | https://github.com/djcsdy/swfmill/issues/56 | 1,300,170,829 | 56 | 3,957 |
CVE-2022-36140 | 2022-08-16T21:15:12.990 | SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::DeclareFunction2::write(SWF::Writer*, SWF::Context*). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"754"
] | 754 | https://github.com/djcsdy/swfmill/issues/57 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id41_SEGV_DeclareFunction2_write.zip](https://github.com/Cvjark/Poc/files/9080778/id41_SEGV_DeclareFunction2_write.zip)
### command to reproduce
`./swfmill simple @@ /dev/null`
### crash detail
```
AddressSanitizer:DEADLYSIGNAL
================================================================... | SEGV in SWF::DeclareFunction2::write(SWF::Writer*, SWF::Context*) | https://api.github.com/repos/djcsdy/swfmill/issues/57/comments | 0 | 2022-07-11T04:01:34Z | 2022-07-11T04:01:34Z | https://github.com/djcsdy/swfmill/issues/57 | 1,300,172,450 | 57 | 3,958 |
CVE-2022-36141 | 2022-08-16T21:15:13.030 | SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::MethodBody::write(SWF::Writer*, SWF::Context*). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/58"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"754"
] | 754 | https://github.com/djcsdy/swfmill/issues/58 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id11_SEGV_MethodBodywrite.zip](https://github.com/Cvjark/Poc/files/9080801/id11_SEGV_MethodBodywrite.zip)
### command to reproduce
`./swfmill simple @@ /dev/null`
### crash detail
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==56731==ER... | SEGV in SWF::MethodBody::write(SWF::Writer*, SWF::Context*) | https://api.github.com/repos/djcsdy/swfmill/issues/58/comments | 0 | 2022-07-11T04:06:43Z | 2022-07-11T04:06:43Z | https://github.com/djcsdy/swfmill/issues/58 | 1,300,175,740 | 58 | 3,959 |
CVE-2022-36142 | 2022-08-16T21:15:13.073 | SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Reader::getU30(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/djcsdy/swfmill/issues/61 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id2_heap-buffer-overflow_getU30.zip](https://github.com/Cvjark/Poc/files/9080686/id2_heap-buffer-overflow_getU30.zip)
### command to reproduce
`./swfmill swf2xml [sample file] /dev/null`
### crash detail
```
==55588==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a0000051f3 at pc... | heap-buffer-overflow in SWF::Reader::getU30() | https://api.github.com/repos/djcsdy/swfmill/issues/61/comments | 0 | 2022-07-11T04:27:58Z | 2022-07-11T04:27:58Z | https://github.com/djcsdy/swfmill/issues/61 | 1,300,190,030 | 61 | 3,960 |
CVE-2022-36143 | 2022-08-16T21:15:13.113 | SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via __interceptor_strlen.part at /sanitizer_common/sanitizer_common_interceptors.inc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/62"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/djcsdy/swfmill/issues/62 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id5_heap-buffer-overflow_372.zip](https://github.com/Cvjark/Poc/files/9080709/id5_heap-buffer-overflow_372.zip)
### command to reproduce
`./swfmill swf2xml [sample file] /dev/null`
### crash detail
```
==55620==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a0000051f3 at pc 0x0... | heap-buffer-overflow | https://api.github.com/repos/djcsdy/swfmill/issues/62/comments | 0 | 2022-07-11T04:29:52Z | 2022-07-11T04:29:52Z | https://github.com/djcsdy/swfmill/issues/62 | 1,300,191,194 | 62 | 3,961 |
CVE-2022-36144 | 2022-08-16T21:15:13.150 | SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via base64_encode. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/63"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"787"
] | 787 | https://github.com/djcsdy/swfmill/issues/63 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id11_heap-buffer-overflow_base64_encode.zip](https://github.com/Cvjark/Poc/files/9080710/id11_heap-buffer-overflow_base64_encode.zip)
### command to reproduce
`./swfmill swf2xml [sample file] /dev/null`
### crash detail
```
==55556==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x... | heap-buffer-overflow in base64_encode | https://api.github.com/repos/djcsdy/swfmill/issues/63/comments | 0 | 2022-07-11T04:32:42Z | 2022-07-11T04:32:42Z | https://github.com/djcsdy/swfmill/issues/63 | 1,300,192,907 | 63 | 3,962 |
CVE-2022-36145 | 2022-08-16T21:15:13.187 | SWFMill commit 53d7690 was discovered to contain a segmentation violation via SWF::Reader::getWord(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/64"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"754"
] | 754 | https://github.com/djcsdy/swfmill/issues/64 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id4_SEGV_getWord.zip](https://github.com/Cvjark/Poc/files/9080713/id4_SEGV_getWord.zip)
### command to reproduce
`./swfmill swf2xml [sample file] /dev/null`
### crash detail
```
==55604==ERROR: AddressSanitizer: SEGV on unknown address 0x629feb002f56 (pc 0x0000005339a8 bp 0x000000bd0dc0 sp 0... | SEGV in SWF::Reader::getWord() | https://api.github.com/repos/djcsdy/swfmill/issues/64/comments | 0 | 2022-07-11T04:34:48Z | 2022-07-11T04:34:48Z | https://github.com/djcsdy/swfmill/issues/64 | 1,300,194,170 | 64 | 3,963 |
CVE-2022-36146 | 2022-08-16T21:15:13.223 | SWFMill commit 53d7690 was discovered to contain a memory allocation issue via operator new[](unsigned long) at asan_new_delete.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/djcsdy/swfmill/issues/65"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2288D1A-A5F3-4FBF-8531-BF01CDE3C35A",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.6",
"versionStartExcludi... | [
"770"
] | 770 | https://github.com/djcsdy/swfmill/issues/65 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"djcsdy",
"swfmill"
] | ### sample file
[id0_allocation-size-too-big_new.zip](https://github.com/Cvjark/Poc/files/9080719/id0_allocation-size-too-big_new.zip)
### command to reproduce
`./swfmill swf2xml [sample file] /dev/null`
### crash detail
```
==55540==ERROR: AddressSanitizer: requested allocation size 0xfffffffffffff4d6 (0x4d... | issue about memory allocation | https://api.github.com/repos/djcsdy/swfmill/issues/65/comments | 0 | 2022-07-11T04:36:56Z | 2022-07-11T04:48:41Z | https://github.com/djcsdy/swfmill/issues/65 | 1,300,195,408 | 65 | 3,964 |
CVE-2022-36148 | 2022-08-16T21:15:13.260 | fdkaac commit 53fe239 was discovered to contain a floating point exception (FPE) via wav_open at /src/wav_reader.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nu774/fdkaac/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fdkaac_project:fdkaac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D97131C-0389-4805-8DA2-DED74C93A0FE",
"versionEndExcluding": "1.0.3",
"versionEndIncluding": null,
"versionStartE... | [
"697"
] | 697 | https://github.com/nu774/fdkaac/issues/52 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nu774",
"fdkaac"
] |
### sample file
[id0_FPE_in_wav_open.zip](https://github.com/Cvjark/Poc/files/9089415/id0_FPE_in_wav_open.zip)
### command to reproduce
`./fdkaac -m3 [sample file] -o /dev/null`
### crash detail
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==78507... | New issue about FPE_in_wav_open | https://api.github.com/repos/nu774/fdkaac/issues/52/comments | 3 | 2022-07-12T04:16:59Z | 2022-07-13T12:05:12Z | https://github.com/nu774/fdkaac/issues/52 | 1,301,512,586 | 52 | 3,965 |
CVE-2022-36149 | 2022-08-16T21:15:13.297 | tifig v0.2.2 was discovered to contain a heap-use-after-free via temInfoEntry(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monostream/tifig/issues/70"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"416"
] | 416 | https://github.com/monostream/tifig/issues/70 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monostream",
"tifig"
] | ### crash sample
[id17_heap-use-after-free_in_ItemInfoEntry.zip](https://github.com/monostream/tifig/files/9120846/id17_heap-use-after-free_in_ItemInfoEntry.zip)
### command to reproduce
`./tifig -v -p [crash sample] /dev/null`
### crash detail
```
==53276==ERROR: AddressSanitizer: heap-use-after-free on ad... | heap-use-after-free in ~ItemInfoEntry() | https://api.github.com/repos/monostream/tifig/issues/70/comments | 0 | 2022-07-15T12:46:28Z | 2022-07-15T12:46:28Z | https://github.com/monostream/tifig/issues/70 | 1,305,996,386 | 70 | 3,966 |
CVE-2022-36150 | 2022-08-16T21:15:13.337 | tifig v0.2.2 was discovered to contain a heap-buffer overflow via __asan_memmove at /asan/asan_interceptors_memintrinsics.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monostream/tifig/issues/68"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/monostream/tifig/issues/68 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monostream",
"tifig"
] | Hi, by testing this repo, i found something unusual.
### crash sample
[id0_heap_buffer_overflow_in __asan_memmove.zip](https://github.com/monostream/tifig/files/9120807/id0_heap_buffer_overflow_in.__asan_memmove.zip)
### command to reproduce
`./tifig -p -v [sample file] /dev/null`
### crash detail
```
=... | Heap buffer overflow | https://api.github.com/repos/monostream/tifig/issues/68/comments | 0 | 2022-07-15T12:42:06Z | 2022-07-15T12:42:57Z | https://github.com/monostream/tifig/issues/68 | 1,305,992,249 | 68 | 3,967 |
CVE-2022-36151 | 2022-08-16T21:15:13.373 | tifig v0.2.2 was discovered to contain a segmentation violation via getType() at /common/bbox.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monostream/tifig/issues/69"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"476"
] | 476 | https://github.com/monostream/tifig/issues/69 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monostream",
"tifig"
] | ### crash sample
[id15_SEGV_in_getType.zip](https://github.com/monostream/tifig/files/9120821/id15_SEGV_in_getType.zip)
### command to reproduce
`./tifig -v -p [crash sample] /dev/null`
### crash detail
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==53... | SEGV in getType() | https://api.github.com/repos/monostream/tifig/issues/69/comments | 0 | 2022-07-15T12:44:55Z | 2022-07-15T12:44:55Z | https://github.com/monostream/tifig/issues/69 | 1,305,994,908 | 69 | 3,968 |
CVE-2022-36152 | 2022-08-16T21:15:13.410 | tifig v0.2.2 was discovered to contain a memory leak via operator new[](unsigned long) at /asan/asan_new_delete.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monostream/tifig/issues/72"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"401"
] | 401 | https://github.com/monostream/tifig/issues/72 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monostream",
"tifig"
] | ### crash sample
[id0_memory_leakF9.zip](https://github.com/monostream/tifig/files/9124886/id0_memory_leakF9.zip)
### command to reproduce
`../tifig -v -p [crash sample] /dev/null`
### crash detail
```
==74044==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 10 byte(s) in 1 object(s) alloca... | Issues in this repor about memory leak | https://api.github.com/repos/monostream/tifig/issues/72/comments | 0 | 2022-07-16T01:31:10Z | 2022-07-16T01:37:46Z | https://github.com/monostream/tifig/issues/72 | 1,306,663,543 | 72 | 3,969 |
CVE-2022-36153 | 2022-08-16T21:15:13.447 | tifig v0.2.2 was discovered to contain a segmentation violation via std::vector<unsigned int, std::allocator<unsigned int> >::size() const at /bits/stl_vector.h. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monostream/tifig/issues/71"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"476"
] | 476 | https://github.com/monostream/tifig/issues/71 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monostream",
"tifig"
] |
### sample file
[id13_SEGV_in_size.zip](https://github.com/monostream/tifig/files/9124844/id13_SEGV_in_size.zip)
### command to reproduce
`./tifig -v -p [crash sample] /dev/null`
### crash detail
```
AddressSanitizer:DEADLYSIGNAL
=================================================================
==74081=... | SEGV in this repo | https://api.github.com/repos/monostream/tifig/issues/71/comments | 0 | 2022-07-16T01:13:32Z | 2022-07-16T01:13:32Z | https://github.com/monostream/tifig/issues/71 | 1,306,659,145 | 71 | 3,970 |
CVE-2022-36155 | 2022-08-16T21:15:13.487 | tifig v0.2.2 was discovered to contain a resource allocation issue via operator new(unsigned long) at asan_new_delete.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monostream/tifig/issues/73"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monostream:tifig:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBE709C-2F0F-486C-A561-C3A4A93A970D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"770"
] | 770 | https://github.com/monostream/tifig/issues/73 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monostream",
"tifig"
] | ### carsh sample
[id41_allocation_too_big.zip](https://github.com/monostream/tifig/files/9124893/id41_allocation_too_big.zip)
### command to reproduce
`../tifig -v -p [crash sample ] /dev/null`
### crash detail
```
==74167==ERROR: AddressSanitizer: requested allocation size 0xffffffffffffffff (0x800 after ... | Issue about resources allocate | https://api.github.com/repos/monostream/tifig/issues/73/comments | 0 | 2022-07-16T01:32:48Z | 2022-07-16T01:32:48Z | https://github.com/monostream/tifig/issues/73 | 1,306,664,251 | 73 | 3,971 |
CVE-2022-37781 | 2022-08-16T21:15:13.690 | fdkaac v1.0.3 was discovered to contain a heap buffer overflow via __interceptor_memcpy.part.46 at /sanitizer_common/sanitizer_common_interceptors.inc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nu774/fdkaac/issues/54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fdkaac_project:fdkaac:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "17ACD087-BA4A-4126-AB8F-3903597D79B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"787"
] | 787 | https://github.com/nu774/fdkaac/issues/54 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nu774",
"fdkaac"
] | Hi, in the lastest version of this repo [PS: commit ID -> 1a1ee29], I found something insterest.
### POC
[1id0-heap-buffer-overflow.zip](https://github.com/nu774/fdkaac/files/9257074/1id0-heap-buffer-overflow.zip)
### command to reproduce
`./fdkaac -p5 -b64 POC -o /dev/null`
### output
```
==122363==ERROR:... | bugs found | https://api.github.com/repos/nu774/fdkaac/issues/54/comments | 1 | 2022-08-04T06:09:23Z | 2022-08-04T12:17:07Z | https://github.com/nu774/fdkaac/issues/54 | 1,328,115,070 | 54 | 3,972 |
CVE-2022-38227 | 2022-08-16T21:15:13.730 | XPDF commit ffaf11c was discovered to contain a stack overflow via __asan_memcpy at asan_interceptors_memintrinsics.cpp. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/jhcloos/xpdf/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id2-stack-overflow.zip](https://github.com/jhcloos/xpdf/files/9278179/8id2-stack-overflow.zip)
### command to reproduce... | stack overflow | https://api.github.com/repos/jhcloos/xpdf/issues/4/comments | 0 | 2022-08-08T02:27:54Z | 2022-08-09T08:18:14Z | https://github.com/jhcloos/xpdf/issues/4 | 1,331,237,183 | 4 | 3,973 |
CVE-2022-38228 | 2022-08-16T21:15:13.770 | XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::transformDataUnit at /xpdf/Stream.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/jhcloos/xpdf/issues/7 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id64_heap_buffer_overflow_in_transformDataUnit.zip](https://github.com/jhcloos/xpdf/files/9278198/8id64_heap_buffer_over... | heap_buffer_overflow_in_transformDataUnit | https://api.github.com/repos/jhcloos/xpdf/issues/7/comments | 0 | 2022-08-08T02:33:28Z | 2022-08-08T03:06:49Z | https://github.com/jhcloos/xpdf/issues/7 | 1,331,240,070 | 7 | 3,974 |
CVE-2022-38229 | 2022-08-16T21:15:13.813 | XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readHuffSym(DCTHuffTable*) at /xpdf/Stream.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/jhcloos/xpdf/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] |
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id0_heap-buffer-overflow_in_readHuffSym.zip](https://github.com/jhcloos/xpdf/files/9278166/8id0_heap-buffer-overflow_in_... | heap-buffer-overflow_in_readHuffSym | https://api.github.com/repos/jhcloos/xpdf/issues/3/comments | 2 | 2022-08-08T02:26:09Z | 2022-10-26T16:30:16Z | https://github.com/jhcloos/xpdf/issues/3 | 1,331,236,173 | 3 | 3,975 |
CVE-2022-38230 | 2022-08-16T21:15:13.853 | XPDF commit ffaf11c was discovered to contain a floating point exception (FPE) via DCTStream::decodeImage() at /xpdf/Stream.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"697"
] | 697 | https://github.com/jhcloos/xpdf/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id63_FPE_in_decodeImage.zip](https://github.com/jhcloos/xpdf/files/9278197/8id63_FPE_in_decodeImage.zip)
### command to... | FPE_in_decodeImage | https://api.github.com/repos/jhcloos/xpdf/issues/6/comments | 1 | 2022-08-08T02:32:16Z | 2023-12-08T02:13:42Z | https://github.com/jhcloos/xpdf/issues/6 | 1,331,239,491 | 6 | 3,976 |
CVE-2022-38231 | 2022-08-16T21:15:13.893 | XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::getChar() at /xpdf/Stream.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/jhcloos/xpdf/issues/11 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id93_heap_buffer_overflow_in_getChar.zip](https://github.com/jhcloos/xpdf/files/9278226/8id93_heap_buffer_overflow_in_getC... | heap_buffer_overflow_in_getChar | https://api.github.com/repos/jhcloos/xpdf/issues/11/comments | 0 | 2022-08-08T02:37:53Z | 2022-08-09T08:16:19Z | https://github.com/jhcloos/xpdf/issues/11 | 1,331,242,296 | 11 | 3,977 |
CVE-2022-38233 | 2022-08-16T21:15:13.933 | XPDF commit ffaf11c was discovered to contain a segmentation violation via DCTStream::readMCURow() at /xpdf/Stream.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"754"
] | 754 | https://github.com/jhcloos/xpdf/issues/9 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id69_SEGV_in_readMCURow.zip](https://github.com/jhcloos/xpdf/files/9278208/8id69_SEGV_in_readMCURow.zip)
### command to... | SEGV_in_readMCURow | https://api.github.com/repos/jhcloos/xpdf/issues/9/comments | 0 | 2022-08-08T02:34:55Z | 2022-08-08T03:06:21Z | https://github.com/jhcloos/xpdf/issues/9 | 1,331,240,842 | 9 | 3,978 |
CVE-2022-38234 | 2022-08-16T21:15:13.970 | XPDF commit ffaf11c was discovered to contain a segmentation violation via Lexer::getObj(Object*) at /xpdf/Lexer.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"754"
] | 754 | https://github.com/jhcloos/xpdf/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id95_SEGV_in_getObj.zip](https://github.com/jhcloos/xpdf/files/9278229/8id95_SEGV_in_getObj.zip)
### command to reprodu... | SEGV_in_getObj | https://api.github.com/repos/jhcloos/xpdf/issues/12/comments | 0 | 2022-08-08T02:38:41Z | 2022-08-08T03:05:40Z | https://github.com/jhcloos/xpdf/issues/12 | 1,331,242,652 | 12 | 3,979 |
CVE-2022-38235 | 2022-08-16T21:15:14.007 | XPDF commit ffaf11c was discovered to contain a segmentation violation via DCTStream::getChar() at /xpdf/Stream.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"754"
] | 754 | https://github.com/jhcloos/xpdf/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id46_SEGV_in_getChar.zip](https://github.com/jhcloos/xpdf/files/9278186/8id46_SEGV_in_getChar.zip)
### command to repro... | SEGV_in_getChar | https://api.github.com/repos/jhcloos/xpdf/issues/5/comments | 0 | 2022-08-08T02:31:31Z | 2023-12-19T11:30:43Z | https://github.com/jhcloos/xpdf/issues/5 | 1,331,239,126 | 5 | 3,980 |
CVE-2022-38236 | 2022-08-16T21:15:14.043 | XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party A... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"120"
] | 120 | https://github.com/jhcloos/xpdf/issues/8 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] | Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id65_global_buffer_overflow_in_getObj.zip](https://github.com/jhcloos/xpdf/files/9278202/8id65_global_buffer_overflow_in_g... | global_buffer_overflow_in_getObj | https://api.github.com/repos/jhcloos/xpdf/issues/8/comments | 0 | 2022-08-08T02:34:19Z | 2022-08-08T03:06:35Z | https://github.com/jhcloos/xpdf/issues/8 | 1,331,240,551 | 8 | 3,981 |
CVE-2022-38237 | 2022-08-16T21:15:14.083 | XPDF commit ffaf11c was discovered to contain a heap-buffer overflow via DCTStream::readScan() at /xpdf/Stream.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jhcloos/xpdf/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD71528-E16D-42E8-A422-05AAD924A832",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/jhcloos/xpdf/issues/14 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jhcloos",
"xpdf"
] |
Hi, in the lastest version of this code [ ps: commit id [ffaf11c](https://github.com/jhcloos/xpdf/commit/ffaf11c4f9ee0c4a124ec454f96c0f99ee699f10)] I found something unusual.
### crash sample
[8id103_heap_buffer_overflow_in_readScan.zip](https://github.com/jhcloos/xpdf/files/9278231/8id103_heap_buffer_overflow_in... | heap_buffer_overflow_in_readScan | https://api.github.com/repos/jhcloos/xpdf/issues/14/comments | 0 | 2022-08-08T02:39:57Z | 2022-08-08T03:05:25Z | https://github.com/jhcloos/xpdf/issues/14 | 1,331,243,294 | 14 | 3,982 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.