cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
71
cve_configurations
listlengths
1
10
cve_tags
listlengths
1
4
issue_owner_repo
listlengths
2
2
type
stringclasses
1 value
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
57
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
38
62
issue_github_id
int64
128M
2.29B
issue_number
int64
3
125k
issue_embedding
listlengths
3.07k
3.07k
__index_level_0__
int64
0
1.14k
msg
stringlengths
175
88.8k
n_tokens
int64
175
88.8k
CVE-2018-20659
2019-01-02T17:29:00.220
An issue was discovered in Bento4 1.5.1-627. The AP4_StcoAtom class in Core/Ap4StcoAtom.cpp has an attempted excessive memory allocation when called from AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp, as demonstrated by mp42hls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/350" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627 Triggered by ./mp42hls crash7.mp4 Poc [crash7.mp4.zip](https://github.com/axiomatic-systems/Bento4/files/2718552/crash7.mp4.zip) Bento4 Version 1.5.1-627 The ASAN information is as follows: ``` ==10432==ERROR: Add...
Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/350/comments
2
2018-12-31T15:52:26Z
2019-01-12T21:14:48Z
https://github.com/axiomatic-systems/Bento4/issues/350
394,998,583
350
[ -0.021416833624243736, 0.005525269545614719, -0.01057156827300787, 0.011272918432950974, 0.03262132778763771, -0.009972854517400265, -0.039412450045347214, 0.033972710371017456, -0.0039472319185733795, 0.032723963260650635, -0.0036628430243581533, 0.016259346157312393, 0.010725523345172405, ...
0
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Allocate for large amounts of memory failed in Ap4StcoAtom.cpp:81 at Bento4 1.5.1-627 when running mp42hls Issue date: --- start body --- A crafted input will lead to Memory allocation failed in Ap4StcoAtom.cpp at Bento4 1.5.1-627 Triggered by ./mp...
17,108
CVE-2018-14718
2019-01-02T18:29:00.310
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106601" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "Patch", "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
This issue covers following CVEs related to polymorphic deserialization, gadgets: * CVE-2018-14718: RCE with slf4j-ext jar * CVE-2018-14719: RCE with blaze-ds-opt, -core jars * CVE-2018-14720: exfiltration/XXE with only JDK classes (some JDK versions) * CVE-2018-14721: exfiltration/SSRF with axis2-jaxws Origin...
Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2097/comments
11
2018-07-27T05:58:22Z
2019-10-16T04:34:07Z
https://github.com/FasterXML/jackson-databind/issues/2097
345,100,313
2,097
[ 0.0074428049847483635, -0.013423113152384758, -0.016840431839227676, 0.02090935967862606, 0.03310165926814079, 0.018722854554653168, -0.025745734572410583, 0.03127715736627579, 0.02364611066877842, 0.07483349740505219, 0.028004640713334084, -0.0039494652301073074, 0.038227636367082596, -0....
1
This is a GitHub Issue repo:jackson-databind owner:FasterXML Title : Block more classes from polymorphic deserialization (CVE-2018-14718 - CVE-2018-14721) Issue date: --- start body --- This issue covers following CVEs related to polymorphic deserialization, gadgets: * CVE-2018-14718: RCE with slf4j-ext jar * CVE-...
705
CVE-2018-19360
2019-01-02T18:29:00.717
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107985" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5128ECDA-6F9A-42AC-9063-CDFC4C256537", "versionEndExcluding": null, "versionEndIncluding": "2.6.7.2", "versio...
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
This issue covers following CVEs related to polymorphic deserialization, gadgets: CVE-2018-19360 (axis2-transport-jms) CVE-2018-19361 (openjpa) CVE-2018-19362 (jboss-common-core) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the gen...
Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2186/comments
8
2018-11-18T23:39:02Z
2020-07-31T17:29:54Z
https://github.com/FasterXML/jackson-databind/issues/2186
382,014,049
2,186
[ 0.0028032574336975813, -0.009676402434706688, -0.01738128252327442, 0.024644020944833755, 0.023730741813778877, 0.018743952736258507, -0.027514323592185974, 0.030094698071479797, 0.028978468850255013, 0.07561365514993668, 0.029659803956747055, -0.0034628473222255707, 0.0430835485458374, -0...
2
This is a GitHub Issue repo:jackson-databind owner:FasterXML Title : Block more classes from polymorphic deserialization (CVE-2018-19360, CVE-2018-19361, CVE-2018-19362) Issue date: --- start body --- This issue covers following CVEs related to polymorphic deserialization, gadgets: CVE-2018-19360 (axis2-transport-j...
735
CVE-2019-6132
2019-01-11T05:29:01.763
An issue was discovered in Bento4 v1.5.1-627. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp when called from the AP4_EsdsAtom class in Core/Ap4EsdsAtom.cpp, as demonstrated by mp42aac.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/357" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
there is memory leaks in Ap4String.cpp ./mp42aac poc /dev/null ================================================================= ==15810==ERROR: LeakSanitizer: detected memory leaks Direct leak of 96 byte(s) in 1 object(s) allocated from: #0 0x522860 in operator new(unsigned long) (/root/apps/Bento4...
memory leaks in Ap4String.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/357/comments
1
2019-01-10T17:00:31Z
2019-01-12T09:36:13Z
https://github.com/axiomatic-systems/Bento4/issues/357
397,925,621
357
[ -0.005346340127289295, 0.018189847469329834, -0.005688167642802, 0.0014844543766230345, 0.01558580994606018, -0.002844083821401, -0.018604649230837822, 0.03425959125161171, -0.02814510092139244, 0.023904899135231972, -0.015485950745642185, 0.01680717244744301, 0.015163326635956764, 0.02789...
3
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : memory leaks in Ap4String.cpp Issue date: --- start body --- there is memory leaks in Ap4String.cpp ./mp42aac poc /dev/null ================================================================= ==15810==ERROR: LeakSanitizer: detected memory lea...
2,144
CVE-2019-6779
2019-01-24T19:29:00.197
Cscms 4.1.8 allows admin.php/links/save CSRF to add, modify, or delete friend links.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "A70E830D-724F-4B4C-A709-0DAAD326DC70", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "Exploit", "Third Party Advisory" ]
[ "chshcms", "cscms" ]
Issue
just use add friend links for example: After the admin logged in, we can send him a url with these code on that page PoC: ```html <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost:9000/admin.php/links/save" method="POST"> <input type="hidden" name="...
There is a CSRF vulnerability that can add/modify/delete friend links
https://api.github.com/repos/chshcms/cscms/issues/3/comments
0
2019-01-24T14:51:59Z
2020-02-27T04:22:34Z
https://github.com/chshcms/cscms/issues/3
402,743,077
3
[ -0.013318462297320366, -0.0017178509151563048, -0.009469583630561829, 0.010683059692382812, 0.012618666514754295, 0.018045809119939804, 0.02400152198970318, 0.010102378204464912, -0.015455074608325958, 0.028244968503713608, -0.029808342456817627, 0.07146855443716049, -0.0293616633862257, -...
4
This is a GitHub Issue repo:cscms owner:chshcms Title : There is a CSRF vulnerability that can add/modify/delete friend links Issue date: --- start body --- just use add friend links for example: After the admin logged in, we can send him a url with these code on that page PoC: ```html <html> <body> <s...
1,421
CVE-2019-6966
2019-01-25T23:29:00.237
An issue was discovered in Bento4 1.5.1-628. The AP4_ElstAtom class in Core/Ap4ElstAtom.cpp has an attempted excessive memory allocation related to AP4_Array<AP4_ElstEntry>::EnsureCapacity in Core/Ap4Array.h, as demonstrated by mp42hls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/361" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
A crafted input will lead to failed allocate LargeMmapAllocator in Ap4Array.h at Bento4 1.5.1-628. Triggered by ./mp42hls crash3.mp4 Poc [poc1.zip](https://github.com/axiomatic-systems/Bento4/files/2795098/poc1.zip) Bento4 Version 1.5.1-628 The ASAN information is as follows: ``` ==56305==ERROR: Add...
failed to allocate LargeMmapAllocator in Ap4Array.h at Bento4 v1.5.1-628 when running mp42hls
https://api.github.com/repos/axiomatic-systems/Bento4/issues/361/comments
1
2019-01-25T07:49:22Z
2019-12-26T14:50:59Z
https://github.com/axiomatic-systems/Bento4/issues/361
403,042,062
361
[ -0.02854139357805252, 0.005858820863068104, -0.01280048955231905, 0.012950151227414608, 0.03368271887302399, -0.004067280795425177, -0.040355876088142395, 0.03806693106889725, -0.0015032212249934673, 0.03239738568663597, 0.004740758799016476, 0.0260939821600914, 0.02074137143790722, -0.001...
5
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : failed to allocate LargeMmapAllocator in Ap4Array.h at Bento4 v1.5.1-628 when running mp42hls Issue date: --- start body --- A crafted input will lead to failed allocate LargeMmapAllocator in Ap4Array.h at Bento4 1.5.1-628. Triggered by ./mp42h...
10,966
CVE-2019-7395
2019-02-05T00:29:00.400
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opens...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "E982CE9C-89F7-4A5D-B036-A9A483493D5B", "versionEndExcluding": "6.9.10-25", "versionEndIncluding": null, "version...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leak in WritePSDChannel in coders/psd.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1451/comments
2
2019-01-17T03:11:55Z
2019-02-12T01:45:47Z
https://github.com/ImageMagick/ImageMagick/issues/1451
400,092,278
1,451
[ -0.030279599130153656, 0.01799202896654606, -0.004521663300693035, 0.04317546263337135, 0.017816299572587013, 0.010929042473435402, -0.001065362012013793, 0.03536224365234375, -0.024466997012495995, 0.035794809460639954, 0.011206154711544514, 0.002500770380720496, 0.022561004385352135, -0....
6
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory leak in WritePSDChannel in coders/psd.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](http...
3,069
CVE-2019-7396
2019-02-05T00:29:00.447
In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "E982CE9C-89F7-4A5D-B036-A9A483493D5B", "versionEndExcluding": "6.9.10-25", "versionEndIncluding": null, "version...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Potential Memory Leak in ReadSIXELImage in coders/sixel.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1452/comments
2
2019-01-17T04:06:51Z
2019-03-11T01:54:07Z
https://github.com/ImageMagick/ImageMagick/issues/1452
400,102,085
1,452
[ -0.024491598829627037, 0.024295441806316376, -0.0038425747770816088, 0.018761012703180313, 0.03547638654708862, 0.038867101073265076, 0.011776423081755638, 0.031413137912750244, -0.0024151825346052647, 0.044331472367048264, -0.015538433566689491, -0.013205567374825478, 0.008427743799984455, ...
7
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Potential Memory Leak in ReadSIXELImage in coders/sixel.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched ...
4,647
CVE-2019-7397
2019-02-05T00:29:00.510
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://lists.opens...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "E982CE9C-89F7-4A5D-B036-A9A483493D5B", "versionEndExcluding": "6.9.10-25", "versionEndIncluding": null, "version...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Potential Memory Leak in WritePDFImage in coders/pdf.c different from #576
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1454/comments
2
2019-01-17T11:10:56Z
2019-02-12T01:46:36Z
https://github.com/ImageMagick/ImageMagick/issues/1454
400,226,040
1,454
[ -0.03378884494304657, 0.02055272087454796, -0.005026558879762888, 0.034393761307001114, 0.02098480425775051, 0.03376004099845886, -0.014316331595182419, 0.034105706959962845, -0.03831131011247635, 0.04631923884153366, 0.017945824190974236, 0.007971921004354954, 0.01604466140270233, 0.00706...
8
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Potential Memory Leak in WritePDFImage in coders/pdf.c different from #576 Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x]...
3,591
CVE-2019-7398
2019-02-05T00:29:00.570
In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opens...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "E982CE9C-89F7-4A5D-B036-A9A483493D5B", "versionEndExcluding": "6.9.10-25", "versionEndIncluding": null, "version...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Potential Memory Leak in WriteDIBImage in coders/dib.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1453/comments
2
2019-01-17T06:50:47Z
2019-02-12T01:46:59Z
https://github.com/ImageMagick/ImageMagick/issues/1453
400,133,504
1,453
[ -0.02625642716884613, 0.007168920245021582, -0.0018007726175710559, 0.03119061328470707, 0.027910267934203148, 0.04644421488046646, 0.003830485977232456, 0.026065073907375336, -0.0045583127066493034, 0.045542120933532715, -0.01120784506201744, 0.0038749072700738907, 0.014939237385988235, -...
9
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Potential Memory Leak in WriteDIBImage in coders/dib.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [op...
4,563
CVE-2018-20760
2019-02-06T23:29:00.230
In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because a certain -1 return value is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/4c1360818fc8948e9307059fba4dc47ba8ad255d" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "085CE50F-C216-47FB-A0A6-00BE575E4B4F", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExcluding": n...
[ "Exploit", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
In gf_text_get_utf8_line function, gf_utf8_wcstombs return -1 with crafted srt file, it will cause szLineConv[i] = 0 out of bound write root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box GNU gdb (Ubuntu 7.7.1-0ubuntu5~14.04.3) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. Licen...
OOB issue of gf_text_get_utf8_line
https://api.github.com/repos/gpac/gpac/issues/1177/comments
4
2018-12-13T10:41:00Z
2022-08-25T08:25:32Z
https://github.com/gpac/gpac/issues/1177
390,618,242
1,177
[ -0.0063771032728254795, 0.022709259763360023, -0.005696126725524664, 0.00735154002904892, 0.03455299139022827, 0.0122049106284976, -0.02143007703125477, 0.05339460074901581, -0.04060277342796326, -0.03286747634410858, -0.013792602345347404, 0.02906002663075924, 0.020918404683470726, -0.012...
10
This is a GitHub Issue repo:gpac owner:gpac Title : OOB issue of gf_text_get_utf8_line Issue date: --- start body --- In gf_text_get_utf8_line function, gf_utf8_wcstombs return -1 with crafted srt file, it will cause szLineConv[i] = 0 out of bound write root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc#...
2,599
CVE-2018-20761
2019-02-06T23:29:00.293
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac_project:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4ED3B4A-F8B8-4E70-BDF7-811129A50B0F", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExclu...
[ "Exploit", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
There is a buffer overflow issue in gf_sm_load_init () function, scene_manager.c GF_Err gf_sm_load_init(GF_SceneLoader *load) { …… ext = (char *)strrchr(load->fileName, '.'); if (!ext) return GF_NOT_SUPPORTED; if (!stricmp(ext, ...
buffer overflow issue 3#
https://api.github.com/repos/gpac/gpac/issues/1186/comments
3
2018-12-22T02:44:19Z
2022-08-25T08:33:41Z
https://github.com/gpac/gpac/issues/1186
393,636,374
1,186
[ -0.011591874063014984, 0.026455648243427277, -0.011030977591872215, 0.02195289172232151, 0.02687632106244564, 0.03384079411625862, -0.01952233724296093, 0.05281781405210495, -0.02904200740158558, 0.019257469102740288, -0.018338220193982124, 0.013282355852425098, 0.0115840844810009, 0.02404...
11
This is a GitHub Issue repo:gpac owner:gpac Title : buffer overflow issue 3# Issue date: --- start body --- There is a buffer overflow issue in gf_sm_load_init () function, scene_manager.c GF_Err gf_sm_load_init(GF_SceneLoader *load) { …… ext = (char *)strrchr(load->fileName, '.'); ...
1,315
CVE-2018-20762
2019-02-06T23:29:00.370
GPAC version 0.7.1 and earlier has a buffer overflow vulnerability in the cat_multiple_files function in applications/mp4box/fileimport.c when MP4Box is used for a local directory containing crafted filenames.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac_project:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4ED3B4A-F8B8-4E70-BDF7-811129A50B0F", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExclu...
[ "Exploit", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
There is a buffer overflow issue in cat_multiple_files () function, fileimport.c GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tmp_dir, Bool force_cat, Bool align_timelines, Bool allow_add_in_command) { …… if (sep) { ...
buffer overflow issue 4#
https://api.github.com/repos/gpac/gpac/issues/1187/comments
2
2018-12-22T02:47:42Z
2022-08-25T08:34:06Z
https://github.com/gpac/gpac/issues/1187
393,636,571
1,187
[ -0.015600299462676048, 0.03030402958393097, -0.011598342098295689, 0.014157638885080814, 0.035569336265325546, 0.027190489694476128, -0.04668679088354111, 0.04499145969748497, -0.03899259865283966, 0.03219497576355934, -0.029391160234808922, 0.02226751111447811, 0.02225121110677719, -0.020...
12
This is a GitHub Issue repo:gpac owner:gpac Title : buffer overflow issue 4# Issue date: --- start body --- There is a buffer overflow issue in cat_multiple_files () function, fileimport.c GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tm...
2,197
CVE-2018-20763
2019-02-06T23:29:00.417
In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac_project:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4ED3B4A-F8B8-4E70-BDF7-811129A50B0F", "versionEndExcluding": null, "versionEndIncluding": "0.7.1", "versionStartExclu...
[ "Exploit", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
There is a buffer overflow issue in gf_text_get_utf8_line () function, text_import.c in line 429 of gf_text_import_srt, parameter lineSize is 2048, but in gf_text_get_utf8_line (), the size of szLineConv is 1024, so, when the size of szLine is more than 1024, the buffer of szLineConv will overflow. 429 ch...
buffer overflow issue 5#
https://api.github.com/repos/gpac/gpac/issues/1188/comments
2
2018-12-22T03:05:37Z
2019-04-19T08:57:13Z
https://github.com/gpac/gpac/issues/1188
393,637,600
1,188
[ -0.020820090547204018, 0.031498681753873825, -0.00879088044166565, 0.015646662563085556, 0.046379201114177704, 0.023695096373558044, -0.025653891265392303, 0.04799046739935875, -0.038417648524045944, -0.016009986400604248, -0.02186267450451851, 0.03254126384854317, 0.03446846455335617, -0....
13
This is a GitHub Issue repo:gpac owner:gpac Title : buffer overflow issue 5# Issue date: --- start body --- There is a buffer overflow issue in gf_text_get_utf8_line () function, text_import.c in line 429 of gf_text_import_srt, parameter lineSize is 2048, but in gf_text_get_utf8_line (), the size of szLineConv is ...
3,988
CVE-2019-7697
2019-02-10T22:29:00.327
An issue was discovered in Bento4 v1.5.1-627. There is an assertion failure in AP4_AtomListWriter::Action in Core/Ap4Atom.cpp, leading to a denial of service (program crash), as demonstrated by mp42hls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/351" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi there, Multiple Assertion failed were discovered in AP4_AtomListWriter::Action(AP4_Atom *) in Ap4Atom.cpp Here are the POC files. Please use "./mp42hls $POC" to reproduce the error. [POC.zip](https://github.com/axiomatic-systems/Bento4/files/2719232/POC.zip) The output were shown as follow: ``` Bento4/...
Multiple Assertion failed were discovered in AP4_AtomListWriter::Action(AP4_Atom *) in Ap4Atom.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/351/comments
3
2019-01-01T09:47:39Z
2019-07-24T08:35:38Z
https://github.com/axiomatic-systems/Bento4/issues/351
395,069,674
351
[ -0.020142152905464172, 0.026681413874030113, -0.010495203547179699, 0.005590758752077818, 0.026712259277701378, 0.008389993570744991, -0.020280959084630013, 0.036582838743925095, -0.013518068939447403, 0.04848922789096832, 0.006874705199152231, 0.0008521087002009153, 0.019016290083527565, ...
14
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Multiple Assertion failed were discovered in AP4_AtomListWriter::Action(AP4_Atom *) in Ap4Atom.cpp Issue date: --- start body --- Hi there, Multiple Assertion failed were discovered in AP4_AtomListWriter::Action(AP4_Atom *) in Ap4Atom.cpp Here are ...
770
CVE-2019-7698
2019-02-10T22:29:00.373
An issue was discovered in AP4_Array<AP4_CttsTableEntry>::EnsureCapacity in Core/Ap4Array.h in Bento4 1.5.1-627. Crafted MP4 input triggers an attempt at excessive memory allocation, as demonstrated by mp42hls, a related issue to CVE-2018-20095.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/354" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, there. I test the program at the master branch. ``` commit 5a0ce8023ea312a2d87c194049106e893ed57767 Merge: 91d2bc6 bab5bb9 Author: Gilles Boccon-Gibod <bok@bok.net> Date: Fri Dec 28 22:42:38 2018 -0800 Merge pull request #347 from orivej/apps Let Scons and CMake build all apps ``` An O...
when running mp4dump, there is a out-of-memory problem in AP4_Array<AP4_CttsTableEntry>::EnsureCapacity in Ap4Array.h
https://api.github.com/repos/axiomatic-systems/Bento4/issues/354/comments
1
2019-01-01T10:46:25Z
2019-01-01T10:46:50Z
https://github.com/axiomatic-systems/Bento4/issues/354
395,072,870
354
[ -0.04312685504555702, 0.03133484721183777, -0.009731956757605076, 0.022763149812817574, 0.027104249224066734, -0.016732966527342796, -0.024294374510645866, 0.05881795659661293, -0.023552440106868744, 0.03820167854428291, -0.0012174812145531178, 0.014893919229507446, 0.012123508378863335, 0...
15
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : when running mp4dump, there is a out-of-memory problem in AP4_Array<AP4_CttsTableEntry>::EnsureCapacity in Ap4Array.h Issue date: --- start body --- Hi, there. I test the program at the master branch. ``` commit 5a0ce8023ea312a2d87c194049106e893...
943
CVE-2019-7699
2019-02-10T22:29:00.403
A heap-based buffer over-read occurs in AP4_BitStream::WriteBytes in Codecs/Ap4BitStream.cpp in Bento4 v1.5.1-627. Remote attackers could leverage this vulnerability to cause an exception via crafted mp4 input, which leads to a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/355" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
Hi, there. A Heap-buffer-overflow problem was discovered in function AP4_BitStream::WriteBytes(unsigned char const*, unsigned int) in Ap4BitStream.cpp. A crafted input can cause segment faults and I have confirmed them with address sanitizer too. Here are the POC files. Please use "./avcinfo $POC" to reproduce th...
When running avcinfo, a heap-buffer-overflow occur in function AP4_BitStream::WriteBytes in Ap4BitStream.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/355/comments
0
2019-01-01T11:33:09Z
2019-01-01T11:33:09Z
https://github.com/axiomatic-systems/Bento4/issues/355
395,075,442
355
[ -0.048788074404001236, 0.021131334826350212, -0.01167102251201868, 0.01864619366824627, 0.05141043663024902, 0.008705622516572475, -0.029394816607236862, 0.03250505402684212, -0.02599489688873291, 0.04351286590099335, -0.0023650783114135265, -0.002372701419517398, 0.015734154731035233, 0.0...
16
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : When running avcinfo, a heap-buffer-overflow occur in function AP4_BitStream::WriteBytes in Ap4BitStream.cpp Issue date: --- start body --- Hi, there. A Heap-buffer-overflow problem was discovered in function AP4_BitStream::WriteBytes(unsigned char ...
4,149
CVE-2019-8378
2019-02-17T02:29:00.363
An issue was discovered in Bento4 1.5.1-628. A heap-based buffer over-read exists in AP4_BitStream::ReadBytes() in Codecs/Ap4BitStream.cpp, a similar issue to CVE-2017-14645. It can be triggered by sending a crafted file to the aac2mp4 binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or p...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/363" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.loginsoft.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
**Description** - we observed a heap-buffer-overflow occured in function` AP4_BitStream::ReadBytes()` located in `Ap4BitStream.cpp`.The same be triggered by sending a crafted file to the aac2mp4 binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. *...
A heap-buffer-overflow occured in function AP4_BitStream::ReadBytes()
https://api.github.com/repos/axiomatic-systems/Bento4/issues/363/comments
0
2019-01-29T07:09:12Z
2019-02-01T10:24:02Z
https://github.com/axiomatic-systems/Bento4/issues/363
404,151,105
363
[ -0.02300330251455307, -0.005333625245839357, -0.014168464578688145, 0.011223518289625645, 0.04990047961473465, -0.001966365147382021, -0.03645189106464386, 0.04014943540096283, -0.009890111163258553, 0.05601942539215088, -0.0007485072128474712, 0.006875631865113974, 0.03461948037147522, -0...
17
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : A heap-buffer-overflow occured in function AP4_BitStream::ReadBytes() Issue date: --- start body --- **Description** - we observed a heap-buffer-overflow occured in function` AP4_BitStream::ReadBytes()` located in `Ap4BitStream.cpp`.The same be trigger...
7,653
CVE-2019-8380
2019-02-17T02:29:00.473
An issue was discovered in Bento4 1.5.1-628. A NULL pointer dereference occurs in AP4_Track::GetSampleIndexForTimeStampMs() located in Core/Ap4Track.cpp. It can triggered by sending a crafted file to the mp4audioclip binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspec...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/366" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.loginsoft.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
**Description** - we observed a NULL pointer dereference occured in `AP4_Track::GetSampleIndexForTimeStampMs()` located in `Ap4Track.cpp`.The same be triggered by sending a crafted file to the mp4audioclip binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other i...
NULL POINTER DEREFERENCE in AP4_Track::GetSampleIndexForTimeStampMs()
https://api.github.com/repos/axiomatic-systems/Bento4/issues/366/comments
0
2019-02-07T06:32:20Z
2019-02-07T06:32:50Z
https://github.com/axiomatic-systems/Bento4/issues/366
407,559,605
366
[ -0.010749498382210732, 0.01292346976697445, -0.004554808605462313, 0.00888394471257925, 0.0177678894251585, 0.009072004817426205, -0.044472381472587585, 0.03481363132596016, -0.01675988920032978, 0.04946725070476532, -0.009553438052535057, 0.03370031714439392, 0.02471858076751232, 0.004133...
18
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL POINTER DEREFERENCE in AP4_Track::GetSampleIndexForTimeStampMs() Issue date: --- start body --- **Description** - we observed a NULL pointer dereference occured in `AP4_Track::GetSampleIndexForTimeStampMs()` located in `Ap4Track.cpp`.The same be t...
6,219
CVE-2019-8382
2019-02-17T02:29:00.597
An issue was discovered in Bento4 1.5.1-628. A NULL pointer dereference occurs in the function AP4_List:Find located in Core/Ap4List.h when called from Core/Ap4Movie.cpp. It can be triggered by sending a crafted file to the mp4dump binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/364" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.loginsoft.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
**Description** - we observed a NULL pointer dereference occured in function AP4_List<AP4_Track>: Find () located in Ap4List.h.The same be triggered by sending a crafted file to the mp4dump binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. **Comm...
NULL POINTER DEREFERENCE in AP4_List<AP4_Track>: Find ()
https://api.github.com/repos/axiomatic-systems/Bento4/issues/364/comments
0
2019-02-01T10:30:07Z
2019-02-01T10:30:07Z
https://github.com/axiomatic-systems/Bento4/issues/364
405,641,344
364
[ -0.01699320785701275, 0.010565767996013165, -0.011551471427083015, 0.0018319020746275783, 0.03209647163748741, 0.004863348789513111, -0.031395889818668365, 0.03486621752381325, -0.01252902951091528, 0.0445440374314785, 0.0040996321476995945, 0.022288311272859573, 0.041937217116355896, 0.00...
19
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : NULL POINTER DEREFERENCE in AP4_List<AP4_Track>: Find () Issue date: --- start body --- **Description** - we observed a NULL pointer dereference occured in function AP4_List<AP4_Track>: Find () located in Ap4List.h.The same be triggered by sending a cr...
7,507
CVE-2018-20786
2019-02-24T14:29:00.283
libvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/vim/vim/commit/cd929f7ba8cc5b6d6dcf35c8b34124e969fed6b8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:leonerd:libvterm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E906BAA8-91DB-4D6B-901F-DB13B8565FE0", "versionEndExcluding": null, "versionEndIncluding": "0\\+bzr726", "versionStartE...
[ "Exploit", "Third Party Advisory" ]
[ "vim", "vim" ]
Issue
Hi, recently I use fuzzing to check the vim and I find an NPD problem. In **src/libvterm/src/termscreen.c** <img width="681" alt="image" src="https://user-images.githubusercontent.com/7632714/50393633-728d6700-0792-11e9-8e38-9a10b38c7f0f.png"> This could return a null pointer for the caller function **vterm_obtain_s...
Possible NPD error
https://api.github.com/repos/vim/vim/issues/3711/comments
7
2018-12-24T07:53:42Z
2018-12-24T22:22:51Z
https://github.com/vim/vim/issues/3711
393,830,314
3,711
[ -0.03394809365272522, 0.039488233625888824, -0.0007132377941161394, 0.03721913322806358, 0.039281949400901794, 0.029586706310510635, -0.0006091760005801916, 0.03825054317712784, -0.0027056068647652864, 0.030942272394895554, 0.0005483964923769236, 0.02249945141375065, 0.0008467684383504093, ...
20
This is a GitHub Issue repo:vim owner:vim Title : Possible NPD error Issue date: --- start body --- Hi, recently I use fuzzing to check the vim and I find an NPD problem. In **src/libvterm/src/termscreen.c** <img width="681" alt="image" src="https://user-images.githubusercontent.com/7632714/50393633-728d6700-0792-1...
1,429
CVE-2019-9143
2019-02-25T15:29:00.310
An issue was discovered in Exiv2 0.27. There is infinite recursion at Exiv2::Image::printTiffStructure in the file image.cpp. This can be triggered by a crafted file. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107161" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/711"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27:*:*:*:*:*:*:*", "matchCriteriaId": "B93112D5-5AD0-4F97-B3DC-DA4AF7D027B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "Exploit", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
**Description** - During our research ,we Observed that an infinite uncontrolled recursion loop, at function Exiv2::Image::printTiffStructure at file image.cpp . It allows an attacker to cause Denial of Service or possibly have unspecified other impact. **Command** - `exiv2 -b -u -k -p R pr $POC` **POC** - [REPRODUC...
uncontrolled recursion loop in Exiv2::Image::printTiffStructure()
https://api.github.com/repos/Exiv2/exiv2/issues/711/comments
2
2019-02-21T11:50:59Z
2019-02-28T16:31:44Z
https://github.com/Exiv2/exiv2/issues/711
412,886,432
711
[ -0.030968571081757545, -0.009711598977446556, -0.003916298970580101, 0.016734210774302483, 0.07137737423181534, 0.021758586168289185, 0.0004242657159920782, 0.029439054429531097, -0.014875768683850765, 0.053549475967884064, 0.015089571475982666, 0.009958295151591301, 0.023288100957870483, ...
21
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : uncontrolled recursion loop in Exiv2::Image::printTiffStructure() Issue date: --- start body --- **Description** - During our research ,we Observed that an infinite uncontrolled recursion loop, at function Exiv2::Image::printTiffStructure at file image.cpp . It all...
5,536
CVE-2019-9144
2019-02-25T15:29:00.357
An issue was discovered in Exiv2 0.27. There is infinite recursion at BigTiffImage::printIFD in the file bigtiffimage.cpp. This can be triggered by a crafted file. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107161" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/712"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27:*:*:*:*:*:*:*", "matchCriteriaId": "B93112D5-5AD0-4F97-B3DC-DA4AF7D027B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "Exploit", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
**Description** - During our research ,we Observed that an infinite uncontrolled recursion loop, at function `Exiv2::(anonymous namespace)::BigTiffImage::printIFD( `) located in `bigtiffimage.cpp` . It allows an attacker to cause Denial of Service or possibly have unspecified other impact. **Command** - exiv2 -b -u -...
Uncontrolled recursion loop in Exiv2::(anonymous namespace)::BigTiffImage::printIFD( )
https://api.github.com/repos/Exiv2/exiv2/issues/712/comments
4
2019-02-21T11:57:14Z
2020-01-24T16:01:01Z
https://github.com/Exiv2/exiv2/issues/712
412,888,776
712
[ -0.033175673335790634, -0.006208925507962704, -0.005639529787003994, 0.008708405308425426, 0.05583427473902702, 0.016286391764879227, 0.0012518332805484533, 0.028436291962862015, -0.01791921816766262, 0.06651882082223892, 0.01564163528382778, -0.0026983495336025953, 0.02602473460137844, -0...
22
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : Uncontrolled recursion loop in Exiv2::(anonymous namespace)::BigTiffImage::printIFD( ) Issue date: --- start body --- **Description** - During our research ,we Observed that an infinite uncontrolled recursion loop, at function `Exiv2::(anonymous namespace)::BigTif...
6,582
CVE-2019-9544
2019-03-01T19:29:02.850
An issue was discovered in Bento4 1.5.1-628. An out of bounds write occurs in AP4_CttsTableEntry::AP4_CttsTableEntry() located in Core/Ap4Array.h. It can be triggered by sending a crafted file to (for example) the mp42hls binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have uns...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/374" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.loginsoft.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
**Description** - we observed a Out of bound write occured in function AP4_Array<AP4_CttsTableEntry>::SetItemCount() located in Ap4Array.h.The same be triggered by sending a crafted file to the [mp42hls.exe(windows)] [mp42hls(ubuntu)] binary. It allows an attacker to cause Denial of Service (Segmentation fault) or pos...
Out of bound write in AP4_CttsTableEntry::AP4_CttsTableEntry()
https://api.github.com/repos/axiomatic-systems/Bento4/issues/374/comments
0
2019-02-28T15:32:28Z
2019-02-28T15:32:28Z
https://github.com/axiomatic-systems/Bento4/issues/374
415,682,606
374
[ -0.01775861531496048, -0.01608026586472988, -0.015592701733112335, 0.022953057661652565, 0.03778628259897232, 0.010820191353559494, -0.04189307987689972, 0.04451842978596687, -0.008415183052420616, 0.05408220365643501, 0.007182206492871046, 0.017805496230721474, 0.037223707884550095, -0.01...
23
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Out of bound write in AP4_CttsTableEntry::AP4_CttsTableEntry() Issue date: --- start body --- **Description** - we observed a Out of bound write occured in function AP4_Array<AP4_CttsTableEntry>::SetItemCount() located in Ap4Array.h.The same be trigge...
10,763
CVE-2019-7175
2019-03-07T23:29:01.597
In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opens...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "E982CE9C-89F7-4A5D-B036-A9A483493D5B", "versionEndExcluding": "6.9.10-25", "versionEndIncluding": null, "version...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leak in DecodeImage in coders/pcd.c different from #1193 and #811
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1450/comments
3
2019-01-17T02:37:57Z
2019-03-11T01:54:24Z
https://github.com/ImageMagick/ImageMagick/issues/1450
400,085,839
1,450
[ -0.03703515976667404, 0.011313105933368206, -0.005767888389527798, 0.01436584908515215, 0.0031999927014112473, 0.03263920918107033, -0.006371254101395607, 0.035282526165246964, 0.0042379251681268215, 0.0713120698928833, 0.004543199669569731, -0.024134626612067223, 0.013733751140534878, 0.0...
24
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory leak in DecodeImage in coders/pcd.c different from #1193 and #811 Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I...
3,750
CVE-2019-9598
2019-03-07T23:29:02.157
An issue was discovered in Cscms 4.1.0. There is an admin.php/pay CSRF vulnerability that can change the payment account to redirect funds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Exploit", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1DCFB098-04A8-43FE-AF93-0BE46815BAA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
[ "chshcms", "cscms" ]
Issue
Hi, I would like to report CSRF vulnerability inCsCMS V4.1. There is a CSRF vulnerability that can change of payment account to steal property. POC: 1.Login to administrator panel. 2.Open below URL in browser which supports flash. url:http://www.cscms.com/admin.php/pay eg: 1.Before modification ![csrf1](https:...
Bug: CsCMS V4.1 CSRF
https://api.github.com/repos/chshcms/cscms/issues/4/comments
0
2019-03-06T09:20:08Z
2019-03-11T06:50:56Z
https://github.com/chshcms/cscms/issues/4
417,699,575
4
[ -0.03514412045478821, -0.0018628851976245642, -0.009048299863934517, 0.03767424821853638, 0.0284176766872406, 0.027013763785362244, 0.013090336695313454, 0.046560559421777725, -0.010884186252951622, 0.046560559421777725, 0.013815434649586678, 0.018590282648801804, -0.007000282872468233, -0...
25
This is a GitHub Issue repo:cscms owner:chshcms Title : Bug: CsCMS V4.1 CSRF Issue date: --- start body --- Hi, I would like to report CSRF vulnerability inCsCMS V4.1. There is a CSRF vulnerability that can change of payment account to steal property. POC: 1.Login to administrator panel. 2.Open below URL in brows...
827
CVE-2019-9770
2019-03-14T09:29:00.677
An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a heap-based buffer overflow in the function dwg_decode_eed_data at decode.c for the y dimension.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FCD988B2-8F4F-41B5-B60A-6D63D4152E56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding":...
[ "Exploit", "Third Party Advisory" ]
[ "LibreDWG", "libredwg" ]
Issue
# libredwg ## version libredwg 0.7 and 0.7.1645 ## description ```txt libredwg ``` ## download link https://github.com/LibreDWG/libredwg/releases --------------------- ## dwg_dxf_LEADER@dwg.spec:2034-3___null-pointer-dereference ### description An issue was discovered in lib...
fuzzing results LibreDWG
https://api.github.com/repos/LibreDWG/libredwg/issues/99/comments
7
2019-03-12T10:51:26Z
2019-04-24T13:52:34Z
https://github.com/LibreDWG/libredwg/issues/99
419,920,036
99
null
26
This is a GitHub Issue repo:libredwg owner:LibreDWG Title : fuzzing results LibreDWG Issue date: --- start body --- # libredwg ## version libredwg 0.7 and 0.7.1645 ## description ```txt libredwg ``` ## download link https://github.com/LibreDWG/libredwg/releases --------------------- ...
29,125
CVE-2018-12022
2019-03-21T16:00:12.310
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107585" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "Patch", "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
There is a potential remote code execution (RCE) vulnerability, if user is 1. handling untrusted content (where attacker can craft JSON) 2. using "Default Typing" feature (or equivalent; polymorphic value with base type of `java.lang.Object` 3. has `jodd-db` (https://jodd.org/db/) jar in classpath 4. allows conne...
Block one more gadget type (jodd-db, CVE-2018-12022)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2052/comments
2
2018-05-29T20:03:23Z
2020-12-02T04:02:53Z
https://github.com/FasterXML/jackson-databind/issues/2052
327,467,262
2,052
[ -0.005886619444936514, -0.01074719987809658, -0.010522519238293171, 0.04071203991770744, 0.046493809670209885, 0.02401081658899784, 0.011967961676418781, 0.031065773218870163, 0.010956901125609875, 0.06878207623958588, 0.04385755956172943, 0.0066168298944830894, 0.03783613443374634, 0.0006...
27
This is a GitHub Issue repo:jackson-databind owner:FasterXML Title : Block one more gadget type (jodd-db, CVE-2018-12022) Issue date: --- start body --- There is a potential remote code execution (RCE) vulnerability, if user is 1. handling untrusted content (where attacker can craft JSON) 2. using "Default Typing"...
1,038
CVE-2018-12023
2019-03-21T16:00:12.407
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execut...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIA...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105659" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:0959" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F16CE8-7CAD-4846-A38E-8192D56AB09B", "versionEndExcluding": "2.7.9.4", "versionEndIncluding": null, "versio...
[ "Patch", "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
There is a potential remote code execution (RCE) vulnerability, if user is 1. handling untrusted content (where attacker can craft JSON) 2. using "Default Typing" feature (or equivalent; polymorphic value with base type of `java.lang.Object` 3. has oracle JDBC driver jar in classpath 4. allows connections from se...
Block one more gadget type (oracle-jdbc, CVE-2018-12023)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2058/comments
1
2018-06-08T05:30:38Z
2020-12-02T04:02:26Z
https://github.com/FasterXML/jackson-databind/issues/2058
330,524,621
2,058
[ -0.0007415752043016255, -0.012213539332151413, -0.010217863135039806, 0.039652276784181595, 0.03613988682627678, 0.025138266384601593, 0.010130778886377811, 0.03091484121978283, 0.012598160654306412, 0.05846243351697922, 0.041568126529455185, 0.0018187869573011994, 0.042497020214796066, -0...
28
This is a GitHub Issue repo:jackson-databind owner:FasterXML Title : Block one more gadget type (oracle-jdbc, CVE-2018-12023) Issue date: --- start body --- There is a potential remote code execution (RCE) vulnerability, if user is 1. handling untrusted content (where attacker can craft JSON) 2. using "Default Typ...
1,023
CVE-2019-9956
2019-03-24T00:29:00.213
In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:q16:*:*:*:*:*:*", "matchCriteriaId": "7D254272-9A50-4719-8FC1-3DB7E74B141F", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
stack-buffer-overflow in PopHexPixel of ps.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1523/comments
5
2019-03-22T10:37:33Z
2019-03-26T09:38:55Z
https://github.com/ImageMagick/ImageMagick/issues/1523
424,144,480
1,523
[ -0.019034387543797493, 0.008191140368580818, -0.00498651247471571, 0.0469367541372776, 0.05265536159276962, 0.04273758828639984, -0.012459374032914639, 0.030057204887270927, -0.006809835322201252, 0.034947026520967484, 0.005946519318968058, 0.0009315178031101823, 0.018260857090353966, 0.01...
29
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : stack-buffer-overflow in PopHexPixel of ps.c Issue date: --- start body --- ### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https:...
5,165
CVE-2019-10649
2019-03-30T14:29:00.240
In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/107645" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1533"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*", "matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leak in SVGKeyValuePairs of coders/svg.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1533/comments
5
2019-03-28T15:41:27Z
2019-06-27T04:31:35Z
https://github.com/ImageMagick/ImageMagick/issues/1533
426,565,379
1,533
[ -0.03352564573287964, 0.02844958007335663, -0.0021968004293739796, 0.010329204611480236, 0.043028514832258224, 0.02746092714369297, 0.008713421411812305, 0.027785560116171837, -0.03588660806417465, 0.03842464089393616, 0.009156101383268833, 0.007444404996931553, -0.007359557785093784, 0.01...
30
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory leak in SVGKeyValuePairs of coders/svg.c Issue date: --- start body --- ### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](htt...
3,951
CVE-2019-10650
2019-03-30T14:29:00.303
In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*", "matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WriteTIFFImage of coders/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1532/comments
5
2019-03-28T15:33:16Z
2019-05-18T13:35:30Z
https://github.com/ImageMagick/ImageMagick/issues/1532
426,560,687
1,532
[ -0.041843026876449585, -0.00010614010534482077, 0.0006847056210972369, 0.021773209795355797, 0.042502403259277344, 0.03810654953122139, -0.017130089923739433, 0.03522177040576935, -0.015358011238276958, 0.056431762874126434, 0.0008680092287249863, -0.005903493147343397, 0.006700241472572088,...
31
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow in WriteTIFFImage of coders/tiff.c Issue date: --- start body --- ### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [o...
4,663
CVE-2019-1002100
2019-04-01T14:29:00.483
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources w...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "josh@bress.net", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107290" }, { "source": "josh@bress.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHS...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DA71853-0F00-4D01-834F-63A8B24A27AB", "versionEndExcluding": "1.11.8", "versionEndIncluding": null, "versionStart...
[ "Issue Tracking", "Vendor Advisory" ]
[ "kubernetes", "kubernetes" ]
Issue
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (6.5, medium) Users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type “json-patch” (e.g. `kubectl patch --type json` o...
CVE-2019-1002100: json-patch requests can exhaust apiserver resources
https://api.github.com/repos/kubernetes/kubernetes/issues/74534/comments
4
2019-02-25T19:39:09Z
2022-05-16T21:57:19Z
https://github.com/kubernetes/kubernetes/issues/74534
414,272,146
74,534
[ -0.03463241457939148, -0.0020292431581765413, -0.003583216108381748, 0.023396817967295647, 0.01790006086230278, -0.010658866725862026, -0.009149393998086452, 0.03665453940629959, 0.02793947421014309, 0.004681499674916267, 0.009704765863716602, -0.005315192975103855, -0.008843228220939636, ...
32
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2019-1002100: json-patch requests can exhaust apiserver resources Issue date: --- start body --- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (6.5, medium) Use...
2,118
CVE-2019-10714
2019-04-02T21:29:00.250
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "78CC3088-3ED5-4CED-B051-2A3B58EDA881", "versionEndExcluding": "6.9.10-32", "versionEndIncluding": null, "version...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Out-of-boundary in function LocaleLowercase of MagickCore/locale.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1495/comments
2
2019-03-04T14:35:44Z
2019-04-03T01:40:39Z
https://github.com/ImageMagick/ImageMagick/issues/1495
416,830,460
1,495
[ -0.00812968797981739, 0.016105853021144867, -0.0026116184890270233, 0.039134152233600616, 0.029085440561175346, 0.033272404223680496, -0.023781953379511833, 0.038240935653448105, -0.0441305972635746, 0.02135351486504078, 0.0011758389882743359, 0.005886172875761986, 0.015114938840270042, 0....
33
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Out-of-boundary in function LocaleLowercase of MagickCore/locale.c Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I...
3,526
CVE-2018-15631
2019-04-09T16:29:01.087
Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32516" }, { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://www.excellium-services.com/cert-xlm-advisory/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-11-28-3 Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request. **Affects**: Odoo Community 12.0 and e...
[SEC] ODOO-SA-2018-11-28-3 (CVE-2018-15631) - Improper access control in the...
https://api.github.com/repos/odoo/odoo/issues/32516/comments
0
2019-04-08T13:40:55Z
2019-04-08T13:40:57Z
https://github.com/odoo/odoo/issues/32516
430,458,377
32,516
[ -0.04620959237217903, -0.008075462654232979, -0.0031535429880023003, -0.009780282154679298, 0.031135395169258118, 0.005495801102370024, 0.02495916187763214, 0.031135395169258118, 0.005585528444498777, 0.0663384273648262, 0.010393419302999973, -0.009122282266616821, -0.0018852092325687408, ...
34
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-11-28-3 (CVE-2018-15631) - Improper access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-11-28-3 Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earl...
3,691
CVE-2018-15635
2019-04-09T16:29:01.130
Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32515" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
[ "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-11-28-2 Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on ...
[SEC] ODOO-SA-2018-11-28-2 (CVE-2018-15635) - Cross-site scripting vulnerabil...
https://api.github.com/repos/odoo/odoo/issues/32515/comments
0
2019-04-08T13:40:52Z
2019-04-08T13:40:54Z
https://github.com/odoo/odoo/issues/32515
430,458,345
32,515
[ -0.024988185614347458, 0.0028596639167517424, -0.004710244480520487, 0.022378118708729744, 0.05094623193144798, 0.0005330670392140746, 0.04278799146413803, 0.04050596430897713, 0.013135912828147411, 0.06292687356472015, 0.010475926101207733, -0.021508095785975456, -0.028425488620996475, 0....
35
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-11-28-2 (CVE-2018-15635) - Cross-site scripting vulnerabil... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-11-28-2 Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 1...
3,779
CVE-2018-15640
2019-04-09T16:29:01.193
Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32514" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4C406AC-8BCE-431E-9E09-7A793E3C750F", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclu...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-11-28-1 Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request. **Affects**: Odoo 10.0 Enterprise through 12.0 (Enterprise Editions only) **Component**: Helpdesk **Cre...
[SEC] ODOO-SA-2018-11-28-1 (CVE-2018-15640) - Improper access control in the...
https://api.github.com/repos/odoo/odoo/issues/32514/comments
0
2019-04-08T13:40:48Z
2019-04-08T13:40:50Z
https://github.com/odoo/odoo/issues/32514
430,458,311
32,514
[ -0.03911608085036278, -0.011137420311570168, 0.004246826283633709, 0.0015966679202392697, 0.02873089350759983, 0.0070658717304468155, 0.008157704025506973, 0.03672062233090401, 0.009581833146512508, 0.04919453337788582, 0.00801163911819458, -0.010385188274085522, 0.02218720130622387, -0.00...
36
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-11-28-1 (CVE-2018-15640) - Improper access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-11-28-1 Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated att...
3,520
CVE-2019-11221
2019-04-15T12:31:36.477
GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1203" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
There is a buffer overflow issue in gf_import_message () function, media_import.c szMsg overflow when srt file contains more than one txt line and the line is long enough. GF_Err gf_import_message(GF_MediaImporter *import, GF_Err e, char *format, ...) { if (gf_log_tool_level_on(GF_LOG_AUTHOR, e ? GF_LOG_WARN...
buffer overflow issue 6#
https://api.github.com/repos/gpac/gpac/issues/1203/comments
6
2019-02-12T03:44:32Z
2019-04-19T09:00:55Z
https://github.com/gpac/gpac/issues/1203
409,106,668
1,203
[ -0.022328555583953857, 0.032946884632110596, -0.005178610794246197, 0.00037979119224473834, 0.04383423179388046, 0.013625008054077625, -0.021996239200234413, 0.04538504406809807, -0.042821455746889114, -0.00466035446152091, -0.014503275975584984, 0.023610351607203484, 0.021822167560458183, ...
37
This is a GitHub Issue repo:gpac owner:gpac Title : buffer overflow issue 6# Issue date: --- start body --- There is a buffer overflow issue in gf_import_message () function, media_import.c szMsg overflow when srt file contains more than one txt line and the line is long enough. GF_Err gf_import_message(GF_Media...
3,784
CVE-2019-11222
2019-04-15T12:31:36.507
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted key value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box (gdb) set args -crypt crafted_drm_file.xml overview.mp4 -out overview_encrypted.mp4 (gdb) r Starting p...
buffer overflow issue 7#
https://api.github.com/repos/gpac/gpac/issues/1204/comments
1
2019-02-13T07:12:39Z
2019-04-19T08:50:59Z
https://github.com/gpac/gpac/issues/1204
409,659,238
1,204
[ -0.03925418108701706, 0.010738298296928406, -0.005807609762996435, -0.009367113001644611, 0.0419965535402298, 0.0369582436978817, -0.024123305454850197, 0.05079765245318413, -0.035459503531455994, 0.03034147247672081, -0.015441784635186195, 0.03219097852706909, 0.003854467300698161, -0.023...
38
This is a GitHub Issue repo:gpac owner:gpac Title : buffer overflow issue 7# Issue date: --- start body --- there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted key value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4B...
2,725
CVE-2019-11222
2019-04-15T12:31:36.507
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted ID128 value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box (gdb) set args -crypt drm_file.xml overview.mp4 -out overview_encrypted.mp4 (gdb) r Starting program...
buffer overflow issue 8#
https://api.github.com/repos/gpac/gpac/issues/1205/comments
1
2019-02-13T09:49:56Z
2019-04-19T08:50:26Z
https://github.com/gpac/gpac/issues/1205
409,715,577
1,205
[ -0.040079474449157715, 0.00825741607695818, -0.007951434701681137, -0.007066128775477409, 0.04523627832531929, 0.041744012385606766, -0.023842064663767815, 0.050099343061447144, -0.02560451626777649, 0.03139776363968849, -0.015690721571445465, 0.03141408413648605, 0.008950973860919476, -0....
39
This is a GitHub Issue repo:gpac owner:gpac Title : buffer overflow issue 8# Issue date: --- start body --- there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted ID128 value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./M...
4,516
CVE-2019-11243
2019-04-22T15:29:00.790
In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credenti...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108053" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/7...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1909D3-D45E-4AD4-B773-51ADCFC63113", "versionEndExcluding": null, "versionEndIncluding": "1.12.4", "versionStart...
[ "Third Party Advisory" ]
[ "kubernetes", "kubernetes" ]
Issue
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N The `rest.AnonymousClientConfig()` method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the following versions, `rest.AnonymousClientConfig()` did not effectively clear service acc...
CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()
https://api.github.com/repos/kubernetes/kubernetes/issues/76797/comments
2
2019-04-18T21:31:53Z
2022-05-16T21:59:22Z
https://github.com/kubernetes/kubernetes/issues/76797
434,967,981
76,797
[ -0.048031989485025406, -0.022177832201123238, -0.0034898449666798115, 0.015890782698988914, 0.016543462872505188, -0.02762571908533573, 0.01804862543940544, 0.04387614130973816, 0.009950053878128529, 0.005680988077074289, -0.038947734981775284, -0.015318022109568119, -0.0037196152843534946, ...
40
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig() Issue date: --- start body --- CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N The `rest.An...
1,901
CVE-2019-11244
2019-04-22T15:29:00.837
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact"...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108064" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3942" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A57F3AC4-5E09-4C16-91A7-80D54F8F968C", "versionEndExcluding": null, "versionEndIncluding": "1.14.1", "versionStart...
[ "Third Party Advisory" ]
[ "kubernetes", "kubernetes" ]
Issue
In kubectl v1.8.0+, schema info is cached in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (rw-rw-rw-). If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written files may be modified by...
CVE-2019-11244: `kubectl --http-cache=<world-accessible dir>` creates world-writeable cached schema files
https://api.github.com/repos/kubernetes/kubernetes/issues/76676/comments
12
2019-04-16T20:14:25Z
2022-10-14T02:06:00Z
https://github.com/kubernetes/kubernetes/issues/76676
433,964,918
76,676
[ -0.03840555623173714, -0.01609133929014206, -0.006857180967926979, 0.016118047758936882, 0.038298726081848145, -0.007771917153149843, 0.019029177725315094, 0.03236963227391243, 0.010663016699254513, -0.006950657814741135, 0.00553849246352911, -0.012666087597608566, -0.001554049551486969, -...
41
This is a GitHub Issue repo:kubernetes owner:kubernetes Title : CVE-2019-11244: `kubectl --http-cache=<world-accessible dir>` creates world-writeable cached schema files Issue date: --- start body --- In kubectl v1.8.0+, schema info is cached in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-...
3,492
CVE-2019-11470
2019-04-23T14:29:00.600
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-26:q16:*:*:*:*:*:*", "matchCriteriaId": "64AB3C42-4698-4E94-9A4A-F75BA34C7213", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Incorrect parsing Cineon causing `convert` to take ridiculous time
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1472/comments
7
2019-02-05T04:29:35Z
2019-04-23T16:45:43Z
https://github.com/ImageMagick/ImageMagick/issues/1472
406,625,350
1,472
[ 0.0046651107259094715, 0.022265629842877388, -0.0064136260189116, 0.011918745003640652, 0.014838946051895618, 0.029043380171060562, -0.01879023015499115, 0.03198521211743355, -0.023981697857379913, 0.0505879707634449, 0.007477155886590481, -0.01922285184264183, 0.009460008703172207, -0.003...
42
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Incorrect parsing Cineon causing `convert` to take ridiculous time Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have ...
3,123
CVE-2019-11472
2019-04-23T14:29:00.837
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*", "matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
FPE errors when reading XWD images
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1546/comments
2
2019-04-14T07:21:12Z
2019-04-24T01:24:42Z
https://github.com/ImageMagick/ImageMagick/issues/1546
432,941,385
1,546
[ -0.036945488303899765, 0.011610634624958038, -0.0026402215007692575, -0.001769247930496931, 0.027490712702274323, 0.01755685731768608, -0.008383892476558685, 0.022051751613616943, -0.012899922206997871, 0.012801287695765495, -0.020544059574604034, -0.007186193484812975, 0.026293013244867325,...
43
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : FPE errors when reading XWD images Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.c...
3,068
CVE-2019-11597
2019-04-29T16:29:00.407
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap_buffer_overflow in WriteTIFFImage of coders/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1555/comments
2
2019-04-27T13:08:13Z
2019-05-04T14:21:50Z
https://github.com/ImageMagick/ImageMagick/issues/1555
437,941,914
1,555
[ -0.04179998114705086, 0.00006662748637609184, -0.0003291923785582185, 0.02461710199713707, 0.0436515249311924, 0.03753582015633583, -0.016088783740997314, 0.03691864013671875, -0.014700127765536308, 0.05605125054717064, 0.002829914912581444, -0.004372867289930582, 0.009285767562687397, 0.0...
44
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap_buffer_overflow in WriteTIFFImage of coders/tiff.c Issue date: --- start body --- ### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [o...
4,684
CVE-2019-11598
2019-04-29T16:29:00.470
In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:q16:*:*:*:*:*:*", "matchCriteriaId": "389645FC-93EE-430B-AFAB-108570F3857D", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WritePNMImage of coders/pnm.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1540/comments
6
2019-04-08T03:10:13Z
2019-05-12T11:30:48Z
https://github.com/ImageMagick/ImageMagick/issues/1540
430,236,223
1,540
[ -0.04599481821060181, 0.009506856091320515, -0.004429330583661795, 0.009695912711322308, 0.03400321677327156, 0.027008114382624626, -0.018730126321315765, 0.03216666355729103, -0.012268436141312122, 0.04386117681860924, 0.004928980953991413, -0.006346907000988722, 0.016177861019968987, 0.0...
45
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow in WritePNMImage of coders/pnm.c Issue date: --- start body --- ### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [ope...
5,812
CVE-2019-11837
2019-05-09T14:29:00.510
njs through 0.3.1, used in NGINX, has a segmentation fault in String.prototype.toBytes for negative arguments, related to nxt_utf8_next in nxt/nxt_utf8.h and njs_string_offset in njs/njs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/155" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
[ "nginx", "njs" ]
Issue
```js >> "A".repeat(38).toBytes(-5) ASAN:SIGSEGV ================================================================= ==16054==ERROR: AddressSanitizer: SEGV on unknown address 0x6090000168e0 (pc 0x00000042c455 bp 0x7fffa72fbb30 sp 0x7fffa72fbaf0 T0) #0 0x42c454 in nxt_utf8_next nxt/nxt_utf8.h:44 #1 0x42c454 ...
Segfault in String.prototype.toBytes() for negative arguments.
https://api.github.com/repos/nginx/njs/issues/155/comments
0
2019-05-07T18:38:36Z
2019-05-31T12:13:12Z
https://github.com/nginx/njs/issues/155
441,389,038
155
[ -0.014524091966450214, -0.019248470664024353, -0.0034825424663722515, -0.0009389704209752381, 0.06004011258482933, -0.0219076219946146, -0.01708875596523285, 0.03577030077576637, -0.04559700936079025, -0.013619710691273212, -0.01608988642692566, 0.045624006539583206, -0.03334062173962593, ...
46
This is a GitHub Issue repo:njs owner:nginx Title : Segfault in String.prototype.toBytes() for negative arguments. Issue date: --- start body --- ```js >> "A".repeat(38).toBytes(-5) ASAN:SIGSEGV ================================================================= ==16054==ERROR: AddressSanitizer: SEGV on unknown addr...
1,136
CVE-2019-11838
2019-05-09T14:29:00.557
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/153" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
[ "nginx", "njs" ]
Issue
```js var v0=[] var x = new Array(10) var i = 0 while (i < 100) { v0.shift(v0.splice(0, "AAAA", "BBBB")) i++; } ``` ```js $ njs test.js ==21010==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c700 at pc 0x000000447d20 bp 0x7fffbdc99110 sp 0x7fffbdc99100 WRITE of size 16 at 0x...
heap-buffer-overflow in Array.prototype.splice() after resize.
https://api.github.com/repos/nginx/njs/issues/153/comments
0
2019-05-07T17:43:35Z
2019-05-14T17:37:45Z
https://github.com/nginx/njs/issues/153
441,355,829
153
[ -0.04750223830342293, -0.022627754136919975, -0.0019038825994357467, 0.0019057062454521656, 0.042950425297021866, 0.0030746611300855875, -0.030637191608548164, 0.022248437628149986, -0.015216471627354622, 0.029046975076198578, -0.012955155223608017, 0.0521707609295845, -0.0008489055326208472...
47
This is a GitHub Issue repo:njs owner:nginx Title : heap-buffer-overflow in Array.prototype.splice() after resize. Issue date: --- start body --- ```js var v0=[] var x = new Array(10) var i = 0 while (i < 100) { v0.shift(v0.splice(0, "AAAA", "BBBB")) i++; } ``` ```js $ njs test.js ==21010==ERROR...
2,798
CVE-2019-11839
2019-05-09T14:29:00.637
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/152" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
[ "nginx", "njs" ]
Issue
```js var v0=[], i = 0; while (i++ < 100) { v0.push(v0.shift(0)); } ``` ```sh $ njs test.js ==13374==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c7d0 at pc 0x000000447165 bp 0x7ffd25e422b0 sp 0x7ffd25e422a 0 WRITE of size 16 at 0x60d00000c7d0 thread T0 #0 0x447164 in njs...
heap-buffer-overflow in Array.prototype.push() after resize.
https://api.github.com/repos/nginx/njs/issues/152/comments
0
2019-05-07T17:30:56Z
2019-05-08T22:22:13Z
https://github.com/nginx/njs/issues/152
441,350,927
152
[ -0.06360288709402084, -0.01323860976845026, 0.004716254770755768, 0.005029232706874609, 0.0537027083337307, -0.001709687290713191, -0.020476674661040306, 0.029959548264741898, -0.031772661954164505, 0.020591793581843376, -0.006259560119360685, 0.0463351346552372, 0.0007532157469540834, 0.0...
48
This is a GitHub Issue repo:njs owner:nginx Title : heap-buffer-overflow in Array.prototype.push() after resize. Issue date: --- start body --- ```js var v0=[], i = 0; while (i++ < 100) { v0.push(v0.shift(0)); } ``` ```sh $ njs test.js ==13374==ERROR: AddressSanitizer: heap-buffer-overflow on addre...
2,747
CVE-2017-12805
2019-05-09T16:29:00.327
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/664" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*", "matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
``` root@ubuntu:/home/hjy/Desktop# convert oom-ReadTIFFImage /dev/null ==27669==ERROR: AddressSanitizer failed to allocate 0x80002000 (-2147475456) bytes of LargeMmapAllocator: 12 ==27669==Process memory map follows: 0x08048000-0x09714000 /usr/local/bin/magick 0x09714000-0x09715000 /usr/local/bin/magick 0x0971...
memory exhaustion in ReadTIFFImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/664/comments
2
2017-08-10T05:00:53Z
2019-05-10T01:41:54Z
https://github.com/ImageMagick/ImageMagick/issues/664
249,233,709
664
null
49
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory exhaustion in ReadTIFFImage Issue date: --- start body --- ``` root@ubuntu:/home/hjy/Desktop# convert oom-ReadTIFFImage /dev/null ==27669==ERROR: AddressSanitizer failed to allocate 0x80002000 (-2147475456) bytes of LargeMmapAllocator: 12 ==27...
5,669
CVE-2017-12806
2019-05-09T16:29:00.373
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/660" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*", "matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
``` root@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null ==8638==ERROR: AddressSanitizer failed to allocate 0x72e8d000 (1927860224) bytes of LargeMmapAllocator: 12 ==8638==Process memory map follows: 0x08048000-0x0971a000 /usr/local/bin/magick 0x0971a000-0x0971b000 /usr/local/bin/magick 0x0971b000-0...
memory exhaustion in format8BIM
https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments
2
2017-08-08T03:28:18Z
2019-05-10T01:41:26Z
https://github.com/ImageMagick/ImageMagick/issues/660
248,590,588
660
[ -0.03800496831536293, 0.012336176820099354, 0.0033647308591753244, 0.0008240783354267478, 0.04179423674941063, 0.0032121073454618454, -0.028882652521133423, 0.0313526950776577, -0.037640076130628586, -0.0038664580788463354, 0.015928965061903, 0.005466371774673462, 0.010469610802829266, -0....
50
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory exhaustion in format8BIM Issue date: --- start body --- ``` root@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null ==8638==ERROR: AddressSanitizer failed to allocate 0x72e8d000 (1927860224) bytes of LargeMmapAllocator: 12 ==8638==Proc...
5,654
CVE-2019-12086
2019-05-17T17:29:00.483
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a cra...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "Patch", "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was `CVE-2019-12086`. CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12086 for full details, but the specific variation (in addit...
Block one more gadget type (mysql, CVE-2019-12086)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2326/comments
12
2019-05-11T17:31:34Z
2019-10-16T04:36:08Z
https://github.com/FasterXML/jackson-databind/issues/2326
443,018,345
2,326
[ -0.0031278657261282206, 0.011102935299277306, -0.010089658200740814, 0.036161791533231735, 0.03127506375312805, 0.012231194414198399, -0.0006184765952639282, 0.03179248422384262, 0.02138662524521351, 0.052086781710386276, 0.04337690398097038, -0.00699952058494091, 0.04544657841324806, -0.0...
51
This is a GitHub Issue repo:jackson-databind owner:FasterXML Title : Block one more gadget type (mysql, CVE-2019-12086) Issue date: --- start body --- A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was `C...
977
CVE-2019-12206
2019-05-20T14:29:00.697
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/162" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "Exploit", "Third Party Advisory" ]
[ "nginx", "njs" ]
Issue
NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 summary: Fixed uninitialized-memory-access in Object.defineProperties(). ``` JavaScript testcase: ```js var v0="@褀+Qh" while (((((((((((((v0)>>>v0....
heap-buffer-overflow in nxt_utf8_encode (nxt_utf8.c:32)
https://api.github.com/repos/nginx/njs/issues/162/comments
0
2019-05-20T08:18:34Z
2019-05-30T14:15:14Z
https://github.com/nginx/njs/issues/162
445,981,633
162
[ -0.04528602212667465, 0.011139445006847382, -0.0024746828712522984, 0.024800773710012436, 0.04671553894877434, 0.015441481955349445, -0.004932508338242769, 0.03565701097249985, -0.02099771797657013, 0.0018880415009334683, 0.00227913586422801, 0.04026922583580017, 0.001094052568078041, 0.00...
52
This is a GitHub Issue repo:njs owner:nginx Title : heap-buffer-overflow in nxt_utf8_encode (nxt_utf8.c:32) Issue date: --- start body --- NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 summary: Fixed...
2,882
CVE-2019-12207
2019-05-20T14:29:00.773
njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/168" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "Exploit", "Third Party Advisory" ]
[ "nginx", "njs" ]
Issue
Testcase (in base64): ``` bmV3IFJlZ0V4cChuZXcgUmVnRXhwKFJlZ0V4cCgobmV3IE9iamVjdCgiADs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7GDtzOzskOzs7OzsiLCAobmV3IEVycm9yKG5ldyBFcnJvcihuZXcgRXJyb3IobmV3IEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKCgwLTApKSkpKSkpKSk8PTApKSswKSkpKQo= ``...
heap-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72
https://api.github.com/repos/nginx/njs/issues/168/comments
4
2019-05-20T09:01:01Z
2019-06-20T12:24:14Z
https://github.com/nginx/njs/issues/168
446,000,306
168
[ -0.042725417762994766, 0.012994026765227318, -0.0030731463339179754, 0.0077783591113984585, 0.04808693006634712, 0.01252871472388506, -0.013896872289478779, 0.03464147821068764, -0.028529910370707512, 0.0024203199427574873, 0.0026929096784442663, 0.031057877466082573, -0.008410351350903511, ...
53
This is a GitHub Issue repo:njs owner:nginx Title : heap-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72 Issue date: --- start body --- Testcase (in base64): ``` bmV3IFJlZ0V4cChuZXcgUmVnRXhwKFJlZ0V4cCgobmV3IE9iamVjdCgiADs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7GDtzOzskOzs7OzsiLCAobmV3IEVycm9yKG5ldyBFcnJvcihuZXcgRXJyb3IobmV3IE...
1,724
CVE-2019-12208
2019-05-20T14:29:00.837
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/163" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
[ "Exploit", "Third Party Advisory" ]
[ "nginx", "njs" ]
Issue
NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 summary: Fixed uninitialized-memory-access in Object.defineProperties(). ``` JavaScript testcase: ```js var v0=Array() while(v0.includes(v0.u,(Obje...
heap-buffer-overflow in njs_function_native_call njs/njs_function.c:623
https://api.github.com/repos/nginx/njs/issues/163/comments
1
2019-05-20T08:30:18Z
2019-05-24T16:00:19Z
https://github.com/nginx/njs/issues/163
445,986,781
163
[ -0.055511411279439926, -0.003920439630746841, -0.004085737746208906, 0.019663285464048386, 0.04999189078807831, 0.0026519563980400562, -0.017981557175517082, 0.038032934069633484, -0.02864687703549862, 0.012727953493595123, -0.007445600815117359, 0.03903909772634506, -0.005688410252332687, ...
54
This is a GitHub Issue repo:njs owner:nginx Title : heap-buffer-overflow in njs_function_native_call njs/njs_function.c:623 Issue date: --- start body --- NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 su...
1,496
CVE-2019-12481
2019-05-30T23:29:00.267
An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function GetESD at isomedia/track.c in libgpac.a, as demonstrated by MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1249" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "Exploit", "Third Party Advisory" ]
[ "gpac", "gpac" ]
Issue
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
4 bugs found in gpac v0.7.1 release
https://api.github.com/repos/gpac/gpac/issues/1249/comments
2
2019-05-27T07:11:13Z
2019-07-10T08:47:22Z
https://github.com/gpac/gpac/issues/1249
448,700,419
1,249
[ -0.03636174276471138, -0.0007708568591624498, -0.021665073931217194, 0.003959111403673887, 0.017504416406154633, 0.017643414437770844, -0.029263602569699287, 0.04577650502324104, 0.0013876581797376275, 0.04833405837416649, 0.00562476459890604, 0.014650334604084492, 0.030004922300577164, -0...
55
This is a GitHub Issue repo:gpac owner:gpac Title : 4 bugs found in gpac v0.7.1 release Issue date: --- start body --- Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [ ] I tried with the...
18,028
CVE-2019-12814
2019-06-19T14:15:10.897
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON messag...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2858" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2935" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
[ "Third Party Advisory" ]
[ "FasterXML", "jackson-databind" ]
Issue
Similar to other polymorphic types with no limits, but for XXE with `jdom2.jar`, tracked as `CVE-2019-12814`. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Fixed in: * 2.9.10 * 2.8.11.4 * 2.7.9.6 * 2.6.7.3
Block yet another gadget type (jdom, CVE-2019-12814)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2341/comments
35
2019-06-04T04:08:07Z
2019-10-16T04:53:30Z
https://github.com/FasterXML/jackson-databind/issues/2341
451,788,559
2,341
[ -0.015215897932648659, 0.0133639145642519, -0.021275589242577553, 0.031231852248311043, 0.053485289216041565, 0.02209046110510826, -0.007741291541606188, 0.03250601887702942, 0.0027520477306097746, 0.04942573979496956, 0.04379570856690407, 0.00722273625433445, 0.02554255910217762, 0.001583...
56
This is a GitHub Issue repo:jackson-databind owner:FasterXML Title : Block yet another gadget type (jdom, CVE-2019-12814) Issue date: --- start body --- Similar to other polymorphic types with no limits, but for XXE with `jdom2.jar`, tracked as `CVE-2019-12814`. See https://medium.com/@cowtowncoder/on-jackson-cves-...
548
CVE-2019-12974
2019-06-26T18:15:10.167
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Null pointer deference in function ReadPANGOImage in coders/pango.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1515/comments
3
2019-03-21T03:25:02Z
2019-06-27T01:28:59Z
https://github.com/ImageMagick/ImageMagick/issues/1515
423,558,712
1,515
[ -0.014147239737212658, 0.016861306503415108, -0.0013922705547884107, 0.040566783398389816, 0.024990396574139595, 0.027140673249959946, -0.03802316263318062, 0.02243366651237011, -0.01738576404750347, 0.012613201513886452, -0.0009169810218736529, -0.004716839175671339, 0.008843663148581982, ...
57
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Null pointer deference in function ReadPANGOImage in coders/pango.c Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] ...
1,670
CVE-2019-12975
2019-06-26T18:15:10.213
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) is...
Possible but rare memory leak in function WriteDPXImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1517/comments
2
2019-03-21T06:25:46Z
2019-06-27T01:29:21Z
https://github.com/ImageMagick/ImageMagick/issues/1517
423,586,613
1,517
[ -0.041153475642204285, 0.01965305767953396, -0.00632009981200099, 0.024996189400553703, 0.02115936577320099, 0.0156030785292387, 0.0006878747954033315, 0.025195134803652763, -0.01010363269597292, 0.04175031557679176, 0.02528039924800396, 0.0033447856549173594, 0.030154583975672722, 0.00265...
58
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Possible but rare memory leak in function WriteDPXImage Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have sear...
1,711
CVE-2019-12976
2019-06-26T18:15:10.277
ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in function ReadPCLImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1520/comments
2
2019-03-21T07:25:10Z
2019-06-27T01:29:46Z
https://github.com/ImageMagick/ImageMagick/issues/1520
423,598,777
1,520
[ -0.0179103072732687, -0.012754932977259159, -0.00613099429756403, 0.03097333014011383, 0.013939367607235909, 0.019115282222628593, -0.002861815271899104, 0.02282605692744255, -0.009194779209792614, 0.05485374107956886, 0.00868129637092352, -0.005922177340835333, 0.003981209360063076, 0.010...
59
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Memory leak in function ReadPCLImage Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://...
1,480
CVE-2019-12977
2019-06-26T18:15:10.323
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function WriteJP2Image
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1518/comments
4
2019-03-21T06:44:34Z
2019-06-27T01:30:10Z
https://github.com/ImageMagick/ImageMagick/issues/1518
423,590,022
1,518
[ -0.027218323200941086, -0.007006020750850439, 0.0011190172517672181, 0.017057543620467186, 0.030810102820396423, 0.03217579796910286, -0.005824693478643894, 0.03285864740610123, -0.04613321274518967, 0.004517039749771357, 0.0189968328922987, 0.0015492114471271634, 0.021591654047369957, 0.0...
60
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Use-of-uninitialized-value in function WriteJP2Image Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched...
1,747
CVE-2019-12978
2019-06-26T18:15:10.370
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function ReadPANGOImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1519/comments
2
2019-03-21T06:54:58Z
2019-06-27T01:30:41Z
https://github.com/ImageMagick/ImageMagick/issues/1519
423,592,141
1,519
[ -0.011906091123819351, 0.0011015677591785789, -0.0055731358006596565, 0.018072834238409996, 0.01994524523615837, 0.0449649952352047, -0.0292801633477211, 0.016566766425967216, -0.026322297751903534, 0.004820100963115692, 0.01696024276316166, -0.00011130159691674635, 0.00806629192084074, 0....
61
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Use-of-uninitialized-value in function ReadPANGOImage Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searche...
1,783
CVE-2019-12979
2019-06-26T18:15:10.417
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
[ "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function SyncImageSettings.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments
5
2019-03-21T11:58:29Z
2019-08-10T06:30:27Z
https://github.com/ImageMagick/ImageMagick/issues/1522
423,694,012
1,522
[ -0.03433871641755104, 0.04041661322116852, -0.0002783368690870702, 0.03338642045855522, 0.014746601693332195, 0.0398564375936985, -0.024619683623313904, 0.04503805562853813, -0.034982915967702866, -0.002226694952696562, 0.007135226856917143, 0.009571987204253674, 0.026356223970651627, 0.01...
62
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Use-of-uninitialized-value in function SyncImageSettings. Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have sea...
1,784
CVE-2018-14867
2019-06-28T18:15:10.410
Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32503" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-3 Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters. **Affects**: Odoo 9.0, 10....
[SEC] ODOO-SA-2018-08-07-3 (CVE-2018-14867) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32503/comments
0
2019-04-08T13:37:31Z
2019-04-08T13:37:33Z
https://github.com/odoo/odoo/issues/32503
430,456,556
32,503
null
63
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-3 (CVE-2018-14867) - Incorrect access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-3 Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 ...
3,797
CVE-2018-14868
2019-06-28T18:15:10.473
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32507" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-7 Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. **Affects**: Odoo 9.0 (Community and Enter...
[SEC] ODOO-SA-2018-08-07-7 (CVE-2018-14868) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32507/comments
0
2019-04-08T13:37:42Z
2019-04-08T13:37:43Z
https://github.com/odoo/odoo/issues/32507
430,456,652
32,507
[ -0.022587774321436882, 0.013990422710776329, -0.002943546511232853, 0.010607745498418808, 0.038286689668893814, 0.011410530656576157, 0.021695788949728012, 0.024316849187016487, -0.012618139386177063, 0.07739674299955368, 0.023424865677952766, -0.004336413461714983, -0.004542255774140358, ...
64
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-7 (CVE-2018-14868) - Incorrect access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-7 Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows...
3,227
CVE-2018-14885
2019-06-28T18:15:10.520
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32512" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-12 Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds. **Affects**: Odoo 10.0,...
[SEC] ODOO-SA-2018-08-07-12 (CVE-2018-14885) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32512/comments
0
2019-04-08T13:37:55Z
2019-04-08T13:37:57Z
https://github.com/odoo/odoo/issues/32512
430,456,776
32,512
[ -0.04003293439745903, 0.01639389991760254, 0.0030951653607189655, 0.008495278656482697, 0.03611203655600548, -0.0032780696637928486, 0.00833901111036539, 0.02532956935465336, 0.001275890041142702, 0.06478004902601242, 0.040174998342990875, -0.012330939993262291, 0.01932036690413952, -0.007...
65
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-12 (CVE-2018-14885) - Incorrect access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-12 Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterpris...
3,736
CVE-2018-14886
2019-06-28T18:15:10.567
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32513" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-13 The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description. **Affects**: Odoo 9.0, 10.0...
[SEC] ODOO-SA-2018-08-07-13 (CVE-2018-14886) - The module-description renderer...
https://api.github.com/repos/odoo/odoo/issues/32513/comments
0
2019-04-08T13:37:58Z
2019-04-08T13:38:00Z
https://github.com/odoo/odoo/issues/32513
430,456,802
32,513
[ -0.02891826443374157, 0.008618637919425964, 0.0006035000551491976, 0.016910435631871223, 0.03595243766903877, 0.0016164386179298162, 0.013009666465222836, 0.025479335337877274, -0.00919416081160307, 0.07071119546890259, -0.008959688246250153, -0.008469427935779095, 0.01733674854040146, -0....
66
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-13 (CVE-2018-14886) - The module-description renderer... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-13 The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does ...
3,462
CVE-2018-14887
2019-06-28T18:15:10.613
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-11 Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request. **Affects**: Odoo 9.0, 10...
[SEC] ODOO-SA-2018-08-07-11 (CVE-2018-14887) - Improper Host header sanitizati...
https://api.github.com/repos/odoo/odoo/issues/32511/comments
0
2019-04-08T13:37:52Z
2019-04-08T13:37:55Z
https://github.com/odoo/odoo/issues/32511
430,456,748
32,511
[ -0.027687953785061836, 0.010326413437724113, -0.002166764112189412, 0.024424094706773758, 0.04854648560285568, -0.005811179056763649, -0.0031815776601433754, 0.02221618965268135, -0.007048840168863535, 0.04171706736087799, 0.010490978136658669, -0.012527462095022202, -0.008989328518509865, ...
67
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-11 (CVE-2018-14887) - Improper Host header sanitizati... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-11 Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Od...
4,137
CVE-2019-13067
2019-06-30T00:15:11.283
njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081", "versionEndExcluding": null, "versionEndIncluding": "0.3.3", "versionStartExcluding": null...
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
[ "nginx", "njs" ]
Issue
NJS version: ``` changeset: 1011:2fb43ddbce84 tag: tip user: hongzhidao <hongzhidao@gmail.com> date: Mon Jun 10 22:23:56 2019 -0400 summary: Added property getter/setter support in Object.defineProperty(). ``` JS Testcase: ```js (new InternalError(new Object(), RegExp().source....
global-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72
https://api.github.com/repos/nginx/njs/issues/183/comments
5
2019-06-20T12:23:30Z
2019-07-02T14:04:00Z
https://github.com/nginx/njs/issues/183
458,626,122
183
[ -0.049832627177238464, 0.0013605128042399883, 0.0025252013001590967, 0.01650146394968033, 0.04326784983277321, 0.00486763333901763, -0.024304596707224846, 0.039179783314466476, -0.02964593842625618, 0.009951605461537838, 0.0005277931923046708, 0.025528032332658768, -0.007646473590284586, 0...
68
This is a GitHub Issue repo:njs owner:nginx Title : global-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72 Issue date: --- start body --- NJS version: ``` changeset: 1011:2fb43ddbce84 tag: tip user: hongzhidao <hongzhidao@gmail.com> date: Mon Jun 10 22:23:56 2019 -0400 summary: ...
3,981
CVE-2019-13108
2019-06-30T23:15:09.970
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/789" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Exiv2/exiv2/pull/794" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
There is a bug at [pngimage.cpp:469](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L469). If `iccOffset == 0`, which happens if `chunkLength == 0`, then Exiv2 crashes with a SIGSEGV. Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exi...
SIGSEGV in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/789/comments
2
2019-04-24T15:24:45Z
2019-07-01T08:58:12Z
https://github.com/Exiv2/exiv2/issues/789
436,761,517
789
[ -0.0302249938249588, -0.0034757519606500864, -0.0018463024171069264, 0.009248310700058937, 0.018081240355968475, -0.004349271301180124, -0.01765364408493042, 0.033694636076688766, -0.034818604588508606, 0.013341023586690426, -0.026901954784989357, -0.004917364567518234, 0.017128311097621918,...
69
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : SIGSEGV in PngImage::readMetadata() Issue date: --- start body --- There is a bug at [pngimage.cpp:469](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L469). If `iccOffset == 0`, which happens if `chunkLength == 0`, th...
774
CVE-2019-13109
2019-06-30T23:15:10.017
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/790" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
This issue is closely related to #789, but the consequences of this bug are different. The calculation of `chunkLength - iccOffset` at [pngimage.cpp:472](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L472) can have a negative integer overflow which leads to an 8GB memory...
Integer overflow, leading to very large allocation in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/790/comments
1
2019-04-24T15:39:42Z
2019-07-01T09:01:35Z
https://github.com/Exiv2/exiv2/issues/790
436,769,374
790
[ -0.032183632254600525, 0.016929930076003075, -0.006987787317484617, 0.004113749600946903, 0.038720931857824326, -0.005004247184842825, -0.021330036222934723, 0.0399501658976078, -0.02676381729543209, 0.03656976670026779, 0.010846610181033611, -0.0010738353012129664, 0.0182010717689991, -0....
70
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : Integer overflow, leading to very large allocation in PngImage::readMetadata() Issue date: --- start body --- This issue is closely related to #789, but the consequences of this bug are different. The calculation of `chunkLength - iccOffset` at [pngimage.cpp:472](...
1,185
CVE-2019-13110
2019-06-30T23:15:10.067
A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/843" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/844" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "Exploit", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
The problem is that the calculation of `o+2` can overflow at [crwimage_int.cpp:284](https://github.com/Exiv2/exiv2/blob/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b/src/crwimage_int.cpp#L284). ![issue_843_poc](https://user-images.githubusercontent.com/4358136/57623256-52b2e000-7587-11e9-9696-70483a645830.jpg) Reprodu...
Integer overflow causes out-of-bounds read in CiffDirectory::readDirectory()
https://api.github.com/repos/Exiv2/exiv2/issues/843/comments
2
2019-05-13T12:58:33Z
2019-07-01T09:02:45Z
https://github.com/Exiv2/exiv2/issues/843
443,384,339
843
[ -0.027532538399100304, 0.00019613184849731624, -0.002729334169998765, 0.005515790078788996, 0.03567234426736832, 0.0038414173759520054, -0.0073401061818003654, 0.04701095446944237, -0.015379950404167175, 0.029446106404066086, -0.009053749963641167, 0.006854573730379343, 0.01104586012661457, ...
71
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : Integer overflow causes out-of-bounds read in CiffDirectory::readDirectory() Issue date: --- start body --- The problem is that the calculation of `o+2` can overflow at [crwimage_int.cpp:284](https://github.com/Exiv2/exiv2/blob/f4a37c63f2f890c16ff7192fc89a75a7c34ae...
723
CVE-2019-13111
2019-06-30T23:15:10.113
A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Exiv2/exiv2/issues/791" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull/797" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "Exploit", "Issue Tracking", "Patch" ]
[ "Exiv2", "exiv2" ]
Issue
There is a bug at [webpimage.cpp:515](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/webpimage.cpp#L515). If `filesize < io_->tell()` then the subtraction overflows and the bounds check on `size` is ineffective. There is an additional problem in this function, which is that the erro...
Integer overflow, leading to very large allocation in WebPImage::decodeChunks()
https://api.github.com/repos/Exiv2/exiv2/issues/791/comments
1
2019-04-24T16:03:00Z
2019-07-01T09:03:36Z
https://github.com/Exiv2/exiv2/issues/791
436,781,784
791
[ -0.029098166152834892, 0.016894808039069176, -0.005375620909035206, 0.01396265160292387, 0.04599297419190407, -0.01002518367022276, -0.011470318771898746, 0.03183484449982643, -0.010953700169920921, 0.03487870469689369, 0.01010895986109972, 0.007916823960840702, 0.018528439104557037, -0.00...
72
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : Integer overflow, leading to very large allocation in WebPImage::decodeChunks() Issue date: --- start body --- There is a bug at [webpimage.cpp:515](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/webpimage.cpp#L515). If `filesize <...
1,757
CVE-2019-13112
2019-06-30T23:15:10.160
A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/845" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/846" }, { "sour...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "Exploit", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
The attached file causes a `std::bad_alloc` exception in `exiv2`. ![issue_845_poc](https://user-images.githubusercontent.com/4358136/57626292-7e38c900-758d-11e9-99aa-85d538eea630.png) The bug is that there is no bounds check on the value of `length` at [pngchunk_int.cpp:669](https://github.com/Exiv2/exiv2/blob/f4...
Out of memory error due to unchecked allocation size in PngChunk::parseChunkContent()
https://api.github.com/repos/Exiv2/exiv2/issues/845/comments
2
2019-05-13T13:42:43Z
2019-07-01T09:04:40Z
https://github.com/Exiv2/exiv2/issues/845
443,405,977
845
[ -0.03632532060146332, 0.021324850618839264, -0.003012716304510832, -0.006477173883467913, 0.04063015058636665, -0.012070795521140099, -0.027210773900151253, 0.04352660849690437, -0.012881272472441196, 0.03031981736421585, 0.013087213039398193, -0.010728857479989529, 0.016887154430150986, -...
73
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : Out of memory error due to unchecked allocation size in PngChunk::parseChunkContent() Issue date: --- start body --- The attached file causes a `std::bad_alloc` exception in `exiv2`. ![issue_845_poc](https://user-images.githubusercontent.com/4358136/57626292-7e3...
811
CVE-2019-13113
2019-06-30T23:15:10.207
Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/841" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/842" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "Exploit", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
The attached file causes an assertion failure in `exiv2`. ![issue_841_poc](https://user-images.githubusercontent.com/4358136/57619635-45452800-757e-11e9-8496-9e198b7f53f4.jpg) Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)): ...
Invalid data location in CRW image causes exiv2 to crash
https://api.github.com/repos/Exiv2/exiv2/issues/841/comments
3
2019-05-13T11:53:23Z
2019-07-01T09:05:47Z
https://github.com/Exiv2/exiv2/issues/841
443,356,775
841
[ -0.023708835244178772, -0.002668431494385004, -0.0006323317647911608, 0.006466662976890802, 0.01992247812449932, -0.001334215747192502, 0.00048347297706641257, 0.03737500309944153, -0.009146968834102154, 0.03550218418240547, -0.029205160215497017, -0.02400740049779415, 0.024075256660580635, ...
74
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : Invalid data location in CRW image causes exiv2 to crash Issue date: --- start body --- The attached file causes an assertion failure in `exiv2`. ![issue_841_poc](https://user-images.githubusercontent.com/4358136/57619635-45452800-757e-11e9-8496-9e198b7f53f4.jpg...
572
CVE-2019-13114
2019-06-30T23:15:10.267
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/E...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
[ "Exploit", "Patch", "Third Party Advisory" ]
[ "Exiv2", "exiv2" ]
Issue
There is a null pointer deference bug at [http.cpp:364](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L364). If the http server sends back a reply that does not contain a space character, then `strchr` will return `NULL`, leading to a null pointer dereference in `atoi`. To...
null pointer dereference in http.cpp
https://api.github.com/repos/Exiv2/exiv2/issues/793/comments
4
2019-04-24T20:14:50Z
2019-07-01T09:07:49Z
https://github.com/Exiv2/exiv2/issues/793
436,886,165
793
[ -0.016377758234739304, 0.03242184594273567, 0.00006587642565136775, 0.03436826914548874, 0.03834453225135803, -0.006433622911572456, -0.00044467943371273577, 0.04507359489798546, -0.01454256009310484, 0.016391662880778313, -0.017420485615730286, 0.013034082017838955, 0.021076980978250504, ...
75
This is a GitHub Issue repo:exiv2 owner:Exiv2 Title : null pointer dereference in http.cpp Issue date: --- start body --- There is a null pointer deference bug at [http.cpp:364](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L364). If the http server sends back a reply that d...
1,448
CVE-2019-13133
2019-07-01T20:15:11.180
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionS...
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1600/comments
2
2019-06-18T10:55:16Z
2019-07-03T01:29:51Z
https://github.com/ImageMagick/ImageMagick/issues/1600
457,401,228
1,600
[ -0.008473029360175133, 0.005631548352539539, -0.0033950386568903923, 0.02909347601234913, 0.01896148920059204, 0.05972252041101456, -0.010344499722123146, 0.024116599932312965, -0.018509045243263245, 0.05944830924272537, 0.010646128095686436, -0.0011979464907199144, 0.01453302800655365, -0...
76
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Memory leak in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c. Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick...
2,359
CVE-2019-13135
2019-07-01T20:15:11.337
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "version...
[ "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use of uninitialized value in function ReadCUTImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1599/comments
2
2019-06-18T10:33:40Z
2019-07-03T01:30:23Z
https://github.com/ImageMagick/ImageMagick/issues/1599
457,391,875
1,599
[ -0.01815040223300457, -0.009924913756549358, -0.0012980742612853646, 0.02315116673707962, 0.028207648545503616, 0.028207648545503616, -0.01713353395462036, 0.029224516823887825, -0.02514311484992504, 0.02650822512805462, 0.0006777670932933688, -0.005993254948407412, 0.009332900866866112, 0...
77
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Use of uninitialized value in function ReadCUTImage Issue date: --- start body --- ### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched ...
1,714
CVE-2019-13136
2019-07-01T20:15:11.417
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "024CF82C-BA9A-441D-80DD-BDA9FEC819A7", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionS...
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Possible integer overflow in TIFFSeekCustomStream in coder/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1602/comments
2
2019-06-18T11:47:50Z
2019-07-03T01:30:44Z
https://github.com/ImageMagick/ImageMagick/issues/1602
457,432,764
1,602
[ -0.03802825137972832, 0.02045156992971897, 0.0030438967514783144, 0.03227847069501877, 0.042013246566057205, 0.025987869128584862, -0.018402142450213432, 0.044318851083517075, -0.02536165527999401, 0.04565666988492012, 0.017818626016378403, -0.0012542064068838954, 0.012602550908923149, 0.0...
78
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Possible integer overflow in TIFFSeekCustomStream in coder/tiff.c Issue date: --- start body --- ### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I ...
1,229
CVE-2019-13137
2019-07-01T20:15:11.493
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "version...
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in ReadPSImage in coder/ps.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1601/comments
2
2019-06-18T11:02:58Z
2019-07-03T01:31:05Z
https://github.com/ImageMagick/ImageMagick/issues/1601
457,404,400
1,601
[ -0.01649744063615799, -0.015997927635908127, 0.00007530669972766191, 0.03261687234044075, 0.01669994555413723, 0.026771215721964836, -0.008538978174328804, 0.027486734092235565, -0.022937113419175148, 0.038260024040937424, 0.020588049665093422, 0.001960927387699485, 0.01582242362201214, -0...
79
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Memory leak in ReadPSImage in coder/ps.c Issue date: --- start body --- ### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](http...
1,712
CVE-2018-14866
2019-07-03T18:15:10.317
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32509" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-9 Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. **...
[SEC] ODOO-SA-2018-08-07-9 (CVE-2018-14866) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32509/comments
0
2019-04-08T13:37:46Z
2019-04-08T13:37:49Z
https://github.com/odoo/odoo/issues/32509
430,456,694
32,509
[ -0.04635552316904068, 0.009616305120289326, -0.002155691385269165, 0.006465260870754719, 0.025367900729179382, -0.0070236739702522755, 0.018899012356996536, 0.018899012356996536, -0.000530764227733016, 0.07664036005735397, 0.010892678052186966, 0.006722711026668549, 0.002623452804982662, -...
80
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-9 (CVE-2018-14866) - Incorrect access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-9 Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise...
4,059
CVE-2018-14861
2019-07-03T19:15:10.503
Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32506" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-6 Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. **Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions) **Component**: Od...
[SEC] ODOO-SA-2018-08-07-6 (CVE-2018-14861) - Improper data access control in...
https://api.github.com/repos/odoo/odoo/issues/32506/comments
0
2019-04-08T13:37:39Z
2019-04-08T13:37:41Z
https://github.com/odoo/odoo/issues/32506
430,456,630
32,506
[ -0.04237699136137962, 0.02128884568810463, 0.00001014994631987065, 0.006178783252835274, 0.04507214203476906, -0.03343137353658676, 0.009648076258599758, 0.027037551626563072, -0.01962587982416153, 0.05370236933231354, 0.021503886207938194, -0.02141786925494671, 0.0056877778843045235, 0.00...
81
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-6 (CVE-2018-14861) - Improper data access control in... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-6 Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authentic...
3,510
CVE-2018-14862
2019-07-03T19:15:10.580
Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32504" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-4 Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterp...
[SEC] ODOO-SA-2018-08-07-4 (CVE-2018-14862) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32504/comments
0
2019-04-08T13:37:34Z
2019-04-08T13:37:36Z
https://github.com/odoo/odoo/issues/32504
430,456,583
32,504
[ -0.04444253817200661, -0.011349651031196117, -0.003031160682439804, 0.00827865395694971, 0.043312642723321915, -0.0037156164180487394, -0.00008634915138827637, 0.03143426030874252, -0.006511382292956114, 0.060376957058906555, 0.002582099987193942, 0.0003492443938739598, -0.018382523208856583...
82
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-4 (CVE-2018-14862) - Incorrect access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-4 Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 1...
3,105
CVE-2018-14863
2019-07-03T19:15:10.643
Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32508" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-8 Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Odoo Frame...
[SEC] ODOO-SA-2018-08-07-8 (CVE-2018-14863) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32508/comments
0
2019-04-08T13:37:44Z
2019-04-08T13:37:45Z
https://github.com/odoo/odoo/issues/32508
430,456,676
32,508
[ -0.052653394639492035, 0.005183068569749594, 0.00032863658270798624, 0.010437676683068275, 0.019573327153921127, -0.012061633169651031, 0.015466934069991112, 0.03265082836151123, 0.005751810967922211, 0.07772098481655121, 0.02076089009642601, 0.008055397309362888, 0.00525818532332778, -0.0...
83
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-8 (CVE-2018-14863) - Incorrect access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-8 Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 throug...
3,215
CVE-2018-14864
2019-07-03T19:15:10.707
Incorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32502" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-2 Incorrect access control in asset bundles in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. **Affects**: Odoo 8.0, 9.0, 10.0 (Community and Enterprise Editions) *...
[SEC] ODOO-SA-2018-08-07-2 (CVE-2018-14864) - Incorrect access control in ass...
https://api.github.com/repos/odoo/odoo/issues/32502/comments
0
2019-04-08T13:37:25Z
2019-04-08T13:37:30Z
https://github.com/odoo/odoo/issues/32502
430,456,495
32,502
[ -0.04350132495164871, 0.015094960108399391, 0.001062157447449863, 0.0002569297212176025, 0.03274199739098549, -0.008359504863619804, -0.0039151194505393505, 0.037962157279253006, -0.008678514510393143, 0.07551830261945724, 0.03184296935796738, -0.017067020758986473, 0.006282316520810127, 0...
84
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-2 (CVE-2018-14864) - Incorrect access control in ass... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-2 Incorrect access control in asset bundles in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earli...
4,055
CVE-2018-14865
2019-07-03T19:15:10.767
Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32501" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-1 Report engine in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) *...
[SEC] ODOO-SA-2018-08-07-1 (CVE-2018-14865) - Report engine in Odoo Community...
https://api.github.com/repos/odoo/odoo/issues/32501/comments
0
2019-04-08T13:37:23Z
2019-04-08T13:37:25Z
https://github.com/odoo/odoo/issues/32501
430,456,471
32,501
[ -0.02068614400923252, -0.00008847413846524432, 0.0007628286257386208, 0.021075904369354248, 0.028481341898441315, 0.018780652433633804, 0.013959177769720554, 0.03470306470990181, -0.013165222480893135, 0.072581946849823, 0.0439995601773262, 0.006012407131493092, -0.003724372014403343, -0.0...
85
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-1 (CVE-2018-14865) - Report engine in Odoo Community... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-1 Report engine in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not use secure optio...
3,792
CVE-2018-14859
2019-07-03T20:15:10.777
Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32510" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-10 Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token. **Affects**: Odoo 9.0, 10.0, 11...
[SEC] ODOO-SA-2018-08-07-10 (CVE-2018-14859) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32510/comments
0
2019-04-08T13:37:50Z
2019-04-08T13:37:51Z
https://github.com/odoo/odoo/issues/32510
430,456,723
32,510
[ -0.03214244917035103, 0.01347250398248434, 0.0011972428765147924, -0.004183307755738497, 0.03707227483391762, 0.019057290628552437, 0.01714170165359974, 0.023874431848526, -0.014690875075757504, 0.06732730567455292, 0.00747220404446125, -0.0010018106549978256, 0.0011373807210475206, -0.025...
86
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-10 (CVE-2018-14859) - Incorrect access control in the... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-10 Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterpri...
3,638
CVE-2018-14860
2019-07-03T20:15:10.837
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32505" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB", "versionEndExcluding": null, "versionEndIncluding": "11.0", "versionStartExclud...
[ "Patch", "Third Party Advisory" ]
[ "odoo", "odoo" ]
Issue
# Security Advisory - ODOO-SA-2018-08-07-5 Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system. **Affects**: Odo...
[SEC] ODOO-SA-2018-08-07-5 (CVE-2018-14860) - Improper sanitization of dynami...
https://api.github.com/repos/odoo/odoo/issues/32505/comments
0
2019-04-08T13:37:37Z
2019-04-08T14:38:16Z
https://github.com/odoo/odoo/issues/32505
430,456,607
32,505
[ -0.031935930252075195, 0.005309632513672113, -0.0019107573898509145, 0.0061478083953261375, 0.04355674237012863, 0.008516721427440643, 0.0008794633322395384, 0.026438063010573387, -0.008459895849227905, 0.04764818027615547, 0.02412242256104946, -0.030145926401019096, -0.0056825499050319195, ...
87
This is a GitHub Issue repo:odoo owner:odoo Title : [SEC] ODOO-SA-2018-08-07-5 (CVE-2018-14860) - Improper sanitization of dynami... Issue date: --- start body --- # Security Advisory - ODOO-SA-2018-08-07-5 Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 ...
4,620
CVE-2019-13238
2019-07-04T14:15:10.853
An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/396" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "Exploit", "Third Party Advisory" ]
[ "axiomatic-systems", "Bento4" ]
Issue
A memory allocation failure unhandled in Ap4SdpAtom.cpp and leads to crashes. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4SdpAtom.cpp <img width="640" alt="image" src="https://user-images.githubusercontent.com/7632714/58334121-73c1dd80-7e71-11e9-88a2-c9fbd2129068.png"> AP4_SdpAtom allocate a n...
Exhaustive memory misunhandle
https://api.github.com/repos/axiomatic-systems/Bento4/issues/396/comments
0
2019-05-24T14:17:26Z
2019-08-25T16:31:09Z
https://github.com/axiomatic-systems/Bento4/issues/396
448,195,676
396
[ -0.025944281369447708, 0.011395636945962906, -0.004361391998827457, -0.007538406178355217, 0.019190125167369843, -0.00556177506223321, -0.03626757487654686, 0.03982071205973625, -0.0218309685587883, 0.02784888818860054, -0.021174758672714233, 0.02475990355014801, 0.02981751784682274, 0.015...
88
This is a GitHub Issue repo:Bento4 owner:axiomatic-systems Title : Exhaustive memory misunhandle Issue date: --- start body --- A memory allocation failure unhandled in Ap4SdpAtom.cpp and leads to crashes. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4SdpAtom.cpp <img width="640" alt="image" src="...
4,165
CVE-2019-13295
2019-07-05T01:15:09.907
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1608/comments
2
2019-06-21T05:58:31Z
2019-07-08T01:48:18Z
https://github.com/ImageMagick/ImageMagick/issues/1608
459,023,037
1,608
[ -0.026510043069720268, -0.0033611950930207968, -0.002899096580222249, 0.004585843533277512, 0.04171887785196304, -0.002600401872768998, -0.018708836287260056, 0.0430963896214962, -0.03322891891002655, 0.007351406384259462, -0.023150604218244553, -0.011652611196041107, 0.03033333644270897, ...
89
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick ...
4,020
CVE-2019-13296
2019-07-05T01:15:09.983
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Direct memory leaks in AcquireMagickMemory and indirect memory leaks
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1604/comments
2
2019-06-18T17:22:26Z
2019-07-08T01:48:39Z
https://github.com/ImageMagick/ImageMagick/issues/1604
457,603,906
1,604
null
90
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : Direct memory leaks in AcquireMagickMemory and indirect memory leaks Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I ha...
22,407
CVE-2019-13297
2019-07-05T01:15:10.047
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1609/comments
2
2019-06-21T06:02:04Z
2019-07-08T01:48:56Z
https://github.com/ImageMagick/ImageMagick/issues/1609
459,024,141
1,609
[ -0.027237234637141228, -0.0012793457135558128, -0.002898463513702154, 0.009298658929765224, 0.04282514378428459, 0.010442789644002914, -0.027958383783698082, 0.045127272605895996, -0.035474974662065506, 0.011926691979169846, -0.019595831632614136, -0.012266463600099087, 0.0280831977725029, ...
91
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick ...
2,787
CVE-2019-13298
2019-07-05T01:15:10.110
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1611/comments
2
2019-06-21T06:07:48Z
2019-07-08T01:49:17Z
https://github.com/ImageMagick/ImageMagick/issues/1611
459,025,805
1,611
[ -0.031666457653045654, 0.00001770598282746505, -0.0022698473185300827, 0.006450961343944073, 0.04882260411977768, 0.004268148448318243, -0.014287504367530346, 0.032752640545368195, -0.0102839395403862, 0.02062358148396015, 0.007874838076531887, -0.004358663689345121, 0.02088816463947296, 0...
92
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagic...
4,173
CVE-2019-13299
2019-07-05T01:15:10.187
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1610/comments
6
2019-06-21T06:05:24Z
2019-10-25T13:50:32Z
https://github.com/ImageMagick/ImageMagick/issues/1610
459,025,122
1,610
[ -0.04091494157910347, -0.010165464133024216, -0.003256674623116851, -0.0006744462298229337, 0.037428032606840134, -0.0000014726050494573428, -0.009504638612270355, 0.037428032606840134, -0.01244320347905159, 0.02588467486202717, -0.010088133625686169, -0.014608461409807205, 0.034166082739830...
93
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - ...
4,241
CVE-2019-13300
2019-07-05T01:15:10.250
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/statistic.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586/comments
3
2019-06-10T15:57:48Z
2019-07-08T01:49:56Z
https://github.com/ImageMagick/ImageMagick/issues/1586
454,242,285
1,586
[ -0.035415276885032654, -0.003588805440813303, -0.011532887816429138, -0.0047528394497931, 0.05343810096383095, 0.008925452828407288, -0.03068751096725464, 0.04272183030843735, -0.013123136945068836, 0.04083072021603584, -0.0063287620432674885, -0.015386735089123249, 0.022822223603725433, 0...
94
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow in MagickCore/statistic.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](http...
4,133
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks in AcquireMagickMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1585/comments
5
2019-06-10T14:34:22Z
2019-10-05T02:53:40Z
https://github.com/ImageMagick/ImageMagick/issues/1585
454,202,041
1,585
[ -0.02004455216228962, 0.0038545553106814623, -0.01463996060192585, 0.0060963802970945835, 0.03168388456106186, 0.01824590377509594, -0.024956246837973595, 0.02742938883602619, -0.01796918921172619, 0.053648147732019424, 0.01793459989130497, 0.002339107682928443, 0.025613445788621902, 0.011...
95
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : memory leaks in AcquireMagickMemory of MagickCore/memory.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched...
11,876
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free in MagickCore/resize.c and double-free in RelinquishAlignedMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1589/comments
11
2019-06-11T05:31:32Z
2019-07-09T13:21:32Z
https://github.com/ImageMagick/ImageMagick/issues/1589
454,487,713
1,589
[ -0.026396075263619423, 0.0017595974495634437, -0.010257629677653313, 0.0008037537336349487, 0.050223518162965775, 0.021867170929908752, -0.027612796053290367, 0.03362880274653435, -0.013502217829227448, 0.06617607176303864, 0.01187992375344038, -0.0069369967095553875, 0.023776745423674583, ...
96
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-use-after-free in MagickCore/resize.c and double-free in RelinquishAlignedMemory of MagickCore/memory.c Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the la...
9,441
CVE-2019-13302
2019-07-05T01:15:10.373
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1597/comments
2
2019-06-17T03:51:17Z
2019-07-08T01:50:56Z
https://github.com/ImageMagick/ImageMagick/issues/1597
456,730,033
1,597
[ -0.016917163506150246, 0.014390573836863041, -0.012735474854707718, 0.002700521145015955, 0.04203658550977707, 0.0007584344712086022, -0.04048401489853859, 0.04314975067973137, -0.027755863964557648, 0.0444386787712574, -0.027243223041296005, -0.01485927402973175, 0.0366465300321579, 0.014...
97
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I hav...
6,410
CVE-2019-13303
2019-07-05T01:15:10.437
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d29148fa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1603/comments
2
2019-06-18T17:08:25Z
2019-07-08T01:51:18Z
https://github.com/ImageMagick/ImageMagick/issues/1603
457,598,033
1,603
[ -0.021734323352575302, -0.012238221243023872, -0.009232698008418083, -0.0038193785585463047, 0.05027666687965393, 0.007084930315613747, -0.03060906007885933, 0.0364985354244709, -0.025273412466049194, 0.031095348298549652, -0.003903803415596485, -0.012373301200568676, 0.01641218364238739, ...
98
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I ...
4,439
CVE-2019-13304
2019-07-05T01:15:10.500
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
Issue
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1614/comments
4
2019-06-21T06:36:50Z
2019-08-10T11:27:40Z
https://github.com/ImageMagick/ImageMagick/issues/1614
459,035,202
1,614
[ -0.03514272719621658, 0.0185701847076416, -0.0036305829416960478, 0.0024592680856585503, 0.041109368205070496, 0.00828627124428749, -0.018110200762748718, 0.03482731059193611, -0.023051736876368523, 0.025233373045921326, 0.0013470940757542849, -0.00620977533981204, 0.027204729616642, 0.030...
99
This is a GitHub Issue repo:ImageMagick owner:ImageMagick Title : stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage Issue date: --- start body --- ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searche...
3,401