cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2019-9956
2019-03-24T00:29:00.213
In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:q16:*:*:*:*:*:*", "matchCriteriaId": "7D254272-9A50-4719-8FC1-3DB7E74B141F", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1523
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
stack-buffer-overflow in PopHexPixel of ps.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1523/comments
5
2019-03-22T10:37:33Z
2019-03-26T09:38:55Z
https://github.com/ImageMagick/ImageMagick/issues/1523
424,144,480
1,523
CVE-2019-10649
2019-03-30T14:29:00.240
In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.securityfocus.com/bid/107645" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1533"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*", "matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1533
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leak in SVGKeyValuePairs of coders/svg.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1533/comments
5
2019-03-28T15:41:27Z
2019-06-27T04:31:35Z
https://github.com/ImageMagick/ImageMagick/issues/1533
426,565,379
1,533
CVE-2019-10650
2019-03-30T14:29:00.303
In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*", "matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1532
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [Y] I have written a descriptive issue title - [Y] I have verified that I am using the latest version of ImageMagick - [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WriteTIFFImage of coders/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1532/comments
5
2019-03-28T15:33:16Z
2019-05-18T13:35:30Z
https://github.com/ImageMagick/ImageMagick/issues/1532
426,560,687
1,532
CVE-2019-1002100
2019-04-01T14:29:00.483
In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources w...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "josh@bress.net", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107290" }, { "source": "josh@bress.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHS...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DA71853-0F00-4D01-834F-63A8B24A27AB", "versionEndExcluding": "1.11.8", "versionEndIncluding": null, "versionStart...
https://github.com/kubernetes/kubernetes/issues/74534
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (6.5, medium) Users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type “json-patch” (e.g. `kubectl patch --type json` o...
CVE-2019-1002100: json-patch requests can exhaust apiserver resources
https://api.github.com/repos/kubernetes/kubernetes/issues/74534/comments
4
2019-02-25T19:39:09Z
2022-05-16T21:57:19Z
https://github.com/kubernetes/kubernetes/issues/74534
414,272,146
74,534
CVE-2019-10714
2019-04-02T21:29:00.250
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "78CC3088-3ED5-4CED-B051-2A3B58EDA881", "versionEndExcluding": "6.9.10-32", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1495
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Out-of-boundary in function LocaleLowercase of MagickCore/locale.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1495/comments
2
2019-03-04T14:35:44Z
2019-04-03T01:40:39Z
https://github.com/ImageMagick/ImageMagick/issues/1495
416,830,460
1,495
CVE-2019-11024
2019-04-08T23:29:00.790
The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/85" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://research.loginsoft.com/bugs/15...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/85
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
**Description** : we Observerd an infinite recursive loop at function load_pnm( ) at file frompnm.c which can lead to a denial of service attack. **Command** : ./img2sixel -78eIkiugv -w 4 -h 8 -q auto -l force -o out $POC **POC** : [REPRODUCER](https://github.com/SegfaultMasters/covering360/blob/master/libsexel/PO...
infinite recursive loop in load_pnm( )
https://api.github.com/repos/saitoha/libsixel/issues/85/comments
2
2019-03-29T05:47:49Z
2019-12-18T20:34:07Z
https://github.com/saitoha/libsixel/issues/85
426,827,367
85
CVE-2019-11025
2019-04-08T23:29:00.853
In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/compare/6ea486a...99995bb" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C1989C8-DBC3-4926-8AA3-245A0E8FE2DC", "versionEndExcluding": "1.2.3", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/Cacti/cacti/issues/2581
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** There's no escape being done before printing out the value of `SNMP community string` (SNMP Options) in the `View poller cache`. **To Reproduce** Steps to reproduce the behavior: 1. Login as normal user ( should have device creation explicitly enabled ). 2. Select create a new device from th...
When viewing poller cache, Device SNMP community is not properly escaped
https://api.github.com/repos/Cacti/cacti/issues/2581/comments
2
2019-03-28T10:14:04Z
2020-06-30T03:46:01Z
https://github.com/Cacti/cacti/issues/2581
426,407,384
2,581
CVE-2018-15631
2019-04-09T16:29:01.087
Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32516" }, { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://www.excellium-services.com/cert-xlm-advisory/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/32516
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-11-28-3 Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request. **Affects**: Odoo Community 12.0 and e...
[SEC] ODOO-SA-2018-11-28-3 (CVE-2018-15631) - Improper access control in the...
https://api.github.com/repos/odoo/odoo/issues/32516/comments
0
2019-04-08T13:40:55Z
2019-04-08T13:40:57Z
https://github.com/odoo/odoo/issues/32516
430,458,377
32,516
CVE-2018-15635
2019-04-09T16:29:01.130
Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security@odoo.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32515" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/32515
[ "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-11-28-2 Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on ...
[SEC] ODOO-SA-2018-11-28-2 (CVE-2018-15635) - Cross-site scripting vulnerabil...
https://api.github.com/repos/odoo/odoo/issues/32515/comments
0
2019-04-08T13:40:52Z
2019-04-08T13:40:54Z
https://github.com/odoo/odoo/issues/32515
430,458,345
32,515
CVE-2018-15640
2019-04-09T16:29:01.193
Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32514" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4C406AC-8BCE-431E-9E09-7A793E3C750F", "versionEndExcluding": null, "versionEndIncluding": "12.0", "versionStartExclu...
https://github.com/odoo/odoo/issues/32514
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-11-28-1 Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request. **Affects**: Odoo 10.0 Enterprise through 12.0 (Enterprise Editions only) **Component**: Helpdesk **Cre...
[SEC] ODOO-SA-2018-11-28-1 (CVE-2018-15640) - Improper access control in the...
https://api.github.com/repos/odoo/odoo/issues/32514/comments
0
2019-04-08T13:40:48Z
2019-04-08T13:40:50Z
https://github.com/odoo/odoo/issues/32514
430,458,311
32,514
CVE-2019-11221
2019-04-15T12:31:36.477
GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1203" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1203
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a buffer overflow issue in gf_import_message () function, media_import.c szMsg overflow when srt file contains more than one txt line and the line is long enough. GF_Err gf_import_message(GF_MediaImporter *import, GF_Err e, char *format, ...) { if (gf_log_tool_level_on(GF_LOG_AUTHOR, e ? GF_LOG_WARN...
buffer overflow issue 6#
https://api.github.com/repos/gpac/gpac/issues/1203/comments
6
2019-02-12T03:44:32Z
2019-04-19T09:00:55Z
https://github.com/gpac/gpac/issues/1203
409,106,668
1,203
CVE-2019-11222
2019-04-15T12:31:36.507
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1204
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted key value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box (gdb) set args -crypt crafted_drm_file.xml overview.mp4 -out overview_encrypted.mp4 (gdb) r Starting p...
buffer overflow issue 7#
https://api.github.com/repos/gpac/gpac/issues/1204/comments
1
2019-02-13T07:12:39Z
2019-04-19T08:50:59Z
https://github.com/gpac/gpac/issues/1204
409,659,238
1,204
CVE-2019-11222
2019-04-15T12:31:36.507
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1205
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file. overflow occur when use a crafted ID128 value. root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box (gdb) set args -crypt drm_file.xml overview.mp4 -out overview_encrypted.mp4 (gdb) r Starting program...
buffer overflow issue 8#
https://api.github.com/repos/gpac/gpac/issues/1205/comments
1
2019-02-13T09:49:56Z
2019-04-19T08:50:26Z
https://github.com/gpac/gpac/issues/1205
409,715,577
1,205
CVE-2019-11344
2019-04-19T19:29:00.233
data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/72" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFF082EE-B695-400E-BF54-FC8707FBBE3E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/pluck-cms/pluck/issues/72
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Location: https://github.com/pluck-cms/pluck/blob/master/data/inc/files.php#L40 Code: ```php <?php // ...... $blockedExtentions = array('.php','php3','php4','php5','php6','php7','phtml'); if (in_array($lastfour, $blockedExtentions) or in_array($lastfive, $blockedExtentions) ){ if (!rename('files/'.l...
file-upload vulnerability in data/inc/files.php
https://api.github.com/repos/pluck-cms/pluck/issues/72/comments
4
2019-04-09T14:45:54Z
2019-05-29T16:19:45Z
https://github.com/pluck-cms/pluck/issues/72
431,009,393
72
CVE-2019-11243
2019-04-22T15:29:00.790
In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credenti...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108053" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/7...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1909D3-D45E-4AD4-B773-51ADCFC63113", "versionEndExcluding": null, "versionEndIncluding": "1.12.4", "versionStart...
https://github.com/kubernetes/kubernetes/issues/76797
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N The `rest.AnonymousClientConfig()` method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the following versions, `rest.AnonymousClientConfig()` did not effectively clear service acc...
CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig()
https://api.github.com/repos/kubernetes/kubernetes/issues/76797/comments
2
2019-04-18T21:31:53Z
2022-05-16T21:59:22Z
https://github.com/kubernetes/kubernetes/issues/76797
434,967,981
76,797
CVE-2019-11244
2019-04-22T15:29:00.837
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9000000000000001, "confidentialityImpact"...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108064" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3942" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A57F3AC4-5E09-4C16-91A7-80D54F8F968C", "versionEndExcluding": null, "versionEndIncluding": "1.14.1", "versionStart...
https://github.com/kubernetes/kubernetes/issues/76676
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
In kubectl v1.8.0+, schema info is cached in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (rw-rw-rw-). If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written files may be modified by...
CVE-2019-11244: `kubectl --http-cache=<world-accessible dir>` creates world-writeable cached schema files
https://api.github.com/repos/kubernetes/kubernetes/issues/76676/comments
12
2019-04-16T20:14:25Z
2022-10-14T02:06:00Z
https://github.com/kubernetes/kubernetes/issues/76676
433,964,918
76,676
CVE-2019-11470
2019-04-23T14:29:00.600
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-26:q16:*:*:*:*:*:*", "matchCriteriaId": "64AB3C42-4698-4E94-9A4A-F75BA34C7213", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1472
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Incorrect parsing Cineon causing `convert` to take ridiculous time
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1472/comments
7
2019-02-05T04:29:35Z
2019-04-23T16:45:43Z
https://github.com/ImageMagick/ImageMagick/issues/1472
406,625,350
1,472
CVE-2019-11472
2019-04-23T14:29:00.837
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*", "matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1546
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
FPE errors when reading XWD images
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1546/comments
2
2019-04-14T07:21:12Z
2019-04-24T01:24:42Z
https://github.com/ImageMagick/ImageMagick/issues/1546
432,941,385
1,546
CVE-2019-11597
2019-04-29T16:29:00.407
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1555
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap_buffer_overflow in WriteTIFFImage of coders/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1555/comments
2
2019-04-27T13:08:13Z
2019-05-04T14:21:50Z
https://github.com/ImageMagick/ImageMagick/issues/1555
437,941,914
1,555
CVE-2019-11598
2019-04-29T16:29:00.470
In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:q16:*:*:*:*:*:*", "matchCriteriaId": "389645FC-93EE-430B-AFAB-108570F3857D", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1540
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WritePNMImage of coders/pnm.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1540/comments
6
2019-04-08T03:10:13Z
2019-05-12T11:30:48Z
https://github.com/ImageMagick/ImageMagick/issues/1540
430,236,223
1,540
CVE-2019-11632
2019-05-01T14:29:00.483
In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5528" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/55...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817", "versionEndExcluding": null, "versionEndIncluding": "2019.3.1", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/5528
[ "Exploit", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process] (https://octopushq.atlassian.net/...
Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632)
https://api.github.com/repos/OctopusDeploy/Issues/issues/5528/comments
3
2019-05-01T05:11:04Z
2019-07-31T08:42:24Z
https://github.com/OctopusDeploy/Issues/issues/5528
439,070,509
5,528
CVE-2019-11632
2019-05-01T14:29:00.483
In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5528" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/55...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817", "versionEndExcluding": null, "versionEndIncluding": "2019.3.1", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/5529
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
This bug represents [this issue](https://github.com/OctopusDeploy/Issues/issues/5528) in LTS 2019.3
Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632)
https://api.github.com/repos/OctopusDeploy/Issues/issues/5529/comments
3
2019-05-01T05:15:06Z
2019-07-31T08:42:27Z
https://github.com/OctopusDeploy/Issues/issues/5529
439,071,058
5,529
CVE-2019-11837
2019-05-09T14:29:00.510
njs through 0.3.1, used in NGINX, has a segmentation fault in String.prototype.toBytes for negative arguments, related to nxt_utf8_next in nxt/nxt_utf8.h and njs_string_offset in njs/njs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/155" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/155
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
```js >> "A".repeat(38).toBytes(-5) ASAN:SIGSEGV ================================================================= ==16054==ERROR: AddressSanitizer: SEGV on unknown address 0x6090000168e0 (pc 0x00000042c455 bp 0x7fffa72fbb30 sp 0x7fffa72fbaf0 T0) #0 0x42c454 in nxt_utf8_next nxt/nxt_utf8.h:44 #1 0x42c454 ...
Segfault in String.prototype.toBytes() for negative arguments.
https://api.github.com/repos/nginx/njs/issues/155/comments
0
2019-05-07T18:38:36Z
2019-05-31T12:13:12Z
https://github.com/nginx/njs/issues/155
441,389,038
155
CVE-2019-11838
2019-05-09T14:29:00.557
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/153" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/153
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
```js var v0=[] var x = new Array(10) var i = 0 while (i < 100) { v0.shift(v0.splice(0, "AAAA", "BBBB")) i++; } ``` ```js $ njs test.js ==21010==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c700 at pc 0x000000447d20 bp 0x7fffbdc99110 sp 0x7fffbdc99100 WRITE of size 16 at 0x...
heap-buffer-overflow in Array.prototype.splice() after resize.
https://api.github.com/repos/nginx/njs/issues/153/comments
0
2019-05-07T17:43:35Z
2019-05-14T17:37:45Z
https://github.com/nginx/njs/issues/153
441,355,829
153
CVE-2019-11839
2019-05-09T14:29:00.637
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/152" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/152
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
```js var v0=[], i = 0; while (i++ < 100) { v0.push(v0.shift(0)); } ``` ```sh $ njs test.js ==13374==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c7d0 at pc 0x000000447165 bp 0x7ffd25e422b0 sp 0x7ffd25e422a 0 WRITE of size 16 at 0x60d00000c7d0 thread T0 #0 0x447164 in njs...
heap-buffer-overflow in Array.prototype.push() after resize.
https://api.github.com/repos/nginx/njs/issues/152/comments
0
2019-05-07T17:30:56Z
2019-05-08T22:22:13Z
https://github.com/nginx/njs/issues/152
441,350,927
152
CVE-2017-12805
2019-05-09T16:29:00.327
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/664" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*", "matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/664
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
``` root@ubuntu:/home/hjy/Desktop# convert oom-ReadTIFFImage /dev/null ==27669==ERROR: AddressSanitizer failed to allocate 0x80002000 (-2147475456) bytes of LargeMmapAllocator: 12 ==27669==Process memory map follows: 0x08048000-0x09714000 /usr/local/bin/magick 0x09714000-0x09715000 /usr/local/bin/magick 0x0971...
memory exhaustion in ReadTIFFImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/664/comments
2
2017-08-10T05:00:53Z
2019-05-10T01:41:54Z
https://github.com/ImageMagick/ImageMagick/issues/664
249,233,709
664
CVE-2017-12806
2019-05-09T16:29:00.373
In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/660" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*", "matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/660
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
``` root@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null ==8638==ERROR: AddressSanitizer failed to allocate 0x72e8d000 (1927860224) bytes of LargeMmapAllocator: 12 ==8638==Process memory map follows: 0x08048000-0x0971a000 /usr/local/bin/magick 0x0971a000-0x0971b000 /usr/local/bin/magick 0x0971b000-0...
memory exhaustion in format8BIM
https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments
2
2017-08-08T03:28:18Z
2019-05-10T01:41:26Z
https://github.com/ImageMagick/ImageMagick/issues/660
248,590,588
660
CVE-2019-11840
2019-05-09T16:29:00.607
An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/30965" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBA1D5EA-C8A7-40C2-9D8E-7E1ECF8ADE80", "versionEndExcluding": "2019-03-20", "versionEndIncluding": null, "versionStartExcl...
https://github.com/golang/go/issues/30965
[ "Third Party Advisory" ]
github.com
[ "golang", "go" ]
If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to pre...
x/crypto/salsa20: keystream loop in amd64 implementation after 256GiB
https://api.github.com/repos/golang/go/issues/30965/comments
3
2019-03-20T22:32:56Z
2020-05-09T07:00:19Z
https://github.com/golang/go/issues/30965
423,501,989
30,965
CVE-2019-12086
2019-05-17T17:29:00.483
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a cra...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.secur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2326
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was `CVE-2019-12086`. CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12086 for full details, but the specific variation (in addit...
Block one more gadget type (mysql, CVE-2019-12086)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2326/comments
12
2019-05-11T17:31:34Z
2019-10-16T04:36:08Z
https://github.com/FasterXML/jackson-databind/issues/2326
443,018,345
2,326
CVE-2019-12206
2019-05-20T14:29:00.697
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/162" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/162
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 summary: Fixed uninitialized-memory-access in Object.defineProperties(). ``` JavaScript testcase: ```js var v0="@褀+Qh" while (((((((((((((v0)>>>v0....
heap-buffer-overflow in nxt_utf8_encode (nxt_utf8.c:32)
https://api.github.com/repos/nginx/njs/issues/162/comments
0
2019-05-20T08:18:34Z
2019-05-30T14:15:14Z
https://github.com/nginx/njs/issues/162
445,981,633
162
CVE-2019-12207
2019-05-20T14:29:00.773
njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/168" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/168
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Testcase (in base64): ``` bmV3IFJlZ0V4cChuZXcgUmVnRXhwKFJlZ0V4cCgobmV3IE9iamVjdCgiADs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7GDtzOzskOzs7OzsiLCAobmV3IEVycm9yKG5ldyBFcnJvcihuZXcgRXJyb3IobmV3IEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKCgwLTApKSkpKSkpKSk8PTApKSswKSkpKQo= ``...
heap-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72
https://api.github.com/repos/nginx/njs/issues/168/comments
4
2019-05-20T09:01:01Z
2019-06-20T12:24:14Z
https://github.com/nginx/njs/issues/168
446,000,306
168
CVE-2019-12208
2019-05-20T14:29:00.837
njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/163" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/163
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
NJS version ``` changeset: 965:e0fdef4eb478 tag: tip user: Dmitry Volyntsev <xeioex@nginx.com> date: Thu May 16 15:20:31 2019 +0300 summary: Fixed uninitialized-memory-access in Object.defineProperties(). ``` JavaScript testcase: ```js var v0=Array() while(v0.includes(v0.u,(Obje...
heap-buffer-overflow in njs_function_native_call njs/njs_function.c:623
https://api.github.com/repos/nginx/njs/issues/163/comments
1
2019-05-20T08:30:18Z
2019-05-24T16:00:19Z
https://github.com/nginx/njs/issues/163
445,986,781
163
CVE-2019-12481
2019-05-30T23:29:00.267
An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function GetESD at isomedia/track.c in libgpac.a, as demonstrated by MP4Box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1249" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1249
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
4 bugs found in gpac v0.7.1 release
https://api.github.com/repos/gpac/gpac/issues/1249/comments
2
2019-05-27T07:11:13Z
2019-07-10T08:47:22Z
https://github.com/gpac/gpac/issues/1249
448,700,419
1,249
CVE-2019-12814
2019-06-19T14:15:10.897
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON messag...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2858" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2935" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2341
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Similar to other polymorphic types with no limits, but for XXE with `jdom2.jar`, tracked as `CVE-2019-12814`. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Fixed in: * 2.9.10 * 2.8.11.4 * 2.7.9.6 * 2.6.7.3
Block yet another gadget type (jdom, CVE-2019-12814)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2341/comments
35
2019-06-04T04:08:07Z
2019-10-16T04:53:30Z
https://github.com/FasterXML/jackson-databind/issues/2341
451,788,559
2,341
CVE-2018-16247
2019-06-20T16:15:11.087
YzmCMS 5.1 has XSS via the admin/system_manage/user_config_add.html title parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A656260-E114-4D4D-A5E7-E56F6B97245C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
http://127.0.0.1/yzmcms/admin/system_manage/user_config_add.html XSS, payload :<script>alert(1);</script> POC: POST /yzmcms/admin/system_manage/user_config_add.html HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0 Accept: application/json, text...
yzmcms v5.1 XSS
https://api.github.com/repos/yzmcms/yzmcms/issues/3/comments
1
2018-08-16T05:18:39Z
2020-01-02T07:59:45Z
https://github.com/yzmcms/yzmcms/issues/3
351,058,717
3
CVE-2019-12974
2019-06-26T18:15:10.167
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1515
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Null pointer deference in function ReadPANGOImage in coders/pango.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1515/comments
3
2019-03-21T03:25:02Z
2019-06-27T01:28:59Z
https://github.com/ImageMagick/ImageMagick/issues/1515
423,558,712
1,515
CVE-2019-12975
2019-06-26T18:15:10.213
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1517
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) is...
Possible but rare memory leak in function WriteDPXImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1517/comments
2
2019-03-21T06:25:46Z
2019-06-27T01:29:21Z
https://github.com/ImageMagick/ImageMagick/issues/1517
423,586,613
1,517
CVE-2019-12976
2019-06-26T18:15:10.277
ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1520
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in function ReadPCLImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1520/comments
2
2019-03-21T07:25:10Z
2019-06-27T01:29:46Z
https://github.com/ImageMagick/ImageMagick/issues/1520
423,598,777
1,520
CVE-2019-12977
2019-06-26T18:15:10.323
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1518
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function WriteJP2Image
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1518/comments
4
2019-03-21T06:44:34Z
2019-06-27T01:30:10Z
https://github.com/ImageMagick/ImageMagick/issues/1518
423,590,022
1,518
CVE-2019-12978
2019-06-26T18:15:10.370
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://www.securityfocus.com/bid/108913" }, { "source": "cve@mitre.org", "tags": [ "Patch...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1519
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function ReadPANGOImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1519/comments
2
2019-03-21T06:54:58Z
2019-06-27T01:30:41Z
https://github.com/ImageMagick/ImageMagick/issues/1519
423,592,141
1,519
CVE-2019-12979
2019-06-26T18:15:10.417
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*", "matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1522
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use-of-uninitialized-value in function SyncImageSettings.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments
5
2019-03-21T11:58:29Z
2019-08-10T06:30:27Z
https://github.com/ImageMagick/ImageMagick/issues/1522
423,694,012
1,522
CVE-2018-14867
2019-06-28T18:15:10.410
Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32503" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32503
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-3 Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters. **Affects**: Odoo 9.0, 10....
[SEC] ODOO-SA-2018-08-07-3 (CVE-2018-14867) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32503/comments
0
2019-04-08T13:37:31Z
2019-04-08T13:37:33Z
https://github.com/odoo/odoo/issues/32503
430,456,556
32,503
CVE-2018-14868
2019-06-28T18:15:10.473
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32507" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32507
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-7 Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. **Affects**: Odoo 9.0 (Community and Enter...
[SEC] ODOO-SA-2018-08-07-7 (CVE-2018-14868) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32507/comments
0
2019-04-08T13:37:42Z
2019-04-08T13:37:43Z
https://github.com/odoo/odoo/issues/32507
430,456,652
32,507
CVE-2018-14885
2019-06-28T18:15:10.520
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32512" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/odoo/odoo/issues/32512
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-12 Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds. **Affects**: Odoo 10.0,...
[SEC] ODOO-SA-2018-08-07-12 (CVE-2018-14885) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32512/comments
0
2019-04-08T13:37:55Z
2019-04-08T13:37:57Z
https://github.com/odoo/odoo/issues/32512
430,456,776
32,512
CVE-2018-14886
2019-06-28T18:15:10.567
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32513" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32513
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-13 The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description. **Affects**: Odoo 9.0, 10.0...
[SEC] ODOO-SA-2018-08-07-13 (CVE-2018-14886) - The module-description renderer...
https://api.github.com/repos/odoo/odoo/issues/32513/comments
0
2019-04-08T13:37:58Z
2019-04-08T13:38:00Z
https://github.com/odoo/odoo/issues/32513
430,456,802
32,513
CVE-2018-14887
2019-06-28T18:15:10.613
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/commits/master" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32511
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-11 Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request. **Affects**: Odoo 9.0, 10...
[SEC] ODOO-SA-2018-08-07-11 (CVE-2018-14887) - Improper Host header sanitizati...
https://api.github.com/repos/odoo/odoo/issues/32511/comments
0
2019-04-08T13:37:52Z
2019-04-08T13:37:55Z
https://github.com/odoo/odoo/issues/32511
430,456,748
32,511
CVE-2019-13067
2019-06-30T00:15:11.283
njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nginx/njs/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081", "versionEndExcluding": null, "versionEndIncluding": "0.3.3", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/183
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
NJS version: ``` changeset: 1011:2fb43ddbce84 tag: tip user: hongzhidao <hongzhidao@gmail.com> date: Mon Jun 10 22:23:56 2019 -0400 summary: Added property getter/setter support in Object.defineProperty(). ``` JS Testcase: ```js (new InternalError(new Object(), RegExp().source....
global-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72
https://api.github.com/repos/nginx/njs/issues/183/comments
5
2019-06-20T12:23:30Z
2019-07-02T14:04:00Z
https://github.com/nginx/njs/issues/183
458,626,122
183
CVE-2019-13072
2019-06-30T02:15:09.163
Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ZoneMinder/zoneminder/issues/2642" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoneminder:zoneminder:1.32.3:*:*:*:*:*:*:*", "matchCriteriaId": "E5A2481D-4A45-48A2-B7DE-86C7D161F6EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/ZoneMinder/zoneminder/issues/2642
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ZoneMinder", "zoneminder" ]
- ZoneMinder version 1.32.3 - Installed from PPA (Ubuntu Xenial) - Ubuntu 16.04 Xenial The 'Filters' page in ZoneMinder 1.32.3 is vulnerable to stored cross site scripting due to improper input sanitation in the 'Name' field. This is the latest version available in the Ubuntu 16.04 PPA. Please see attached scree...
Stored Cross Site Scripting - Filters
https://api.github.com/repos/ZoneMinder/zoneminder/issues/2642/comments
5
2019-06-18T00:07:40Z
2019-12-26T10:04:57Z
https://github.com/ZoneMinder/zoneminder/issues/2642
457,200,985
2,642
CVE-2019-13108
2019-06-30T23:15:09.970
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/789" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/Exiv2/exiv2/pull/794" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/789
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a bug at [pngimage.cpp:469](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L469). If `iccOffset == 0`, which happens if `chunkLength == 0`, then Exiv2 crashes with a SIGSEGV. Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exi...
SIGSEGV in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/789/comments
2
2019-04-24T15:24:45Z
2019-07-01T08:58:12Z
https://github.com/Exiv2/exiv2/issues/789
436,761,517
789
CVE-2019-13109
2019-06-30T23:15:10.017
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/790" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/790
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
This issue is closely related to #789, but the consequences of this bug are different. The calculation of `chunkLength - iccOffset` at [pngimage.cpp:472](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L472) can have a negative integer overflow which leads to an 8GB memory...
Integer overflow, leading to very large allocation in PngImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/790/comments
1
2019-04-24T15:39:42Z
2019-07-01T09:01:35Z
https://github.com/Exiv2/exiv2/issues/790
436,769,374
790
CVE-2019-13110
2019-06-30T23:15:10.067
A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/843" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/844" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/843
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
The problem is that the calculation of `o+2` can overflow at [crwimage_int.cpp:284](https://github.com/Exiv2/exiv2/blob/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b/src/crwimage_int.cpp#L284). ![issue_843_poc](https://user-images.githubusercontent.com/4358136/57623256-52b2e000-7587-11e9-9696-70483a645830.jpg) Reprodu...
Integer overflow causes out-of-bounds read in CiffDirectory::readDirectory()
https://api.github.com/repos/Exiv2/exiv2/issues/843/comments
2
2019-05-13T12:58:33Z
2019-07-01T09:02:45Z
https://github.com/Exiv2/exiv2/issues/843
443,384,339
843
CVE-2019-13111
2019-06-30T23:15:10.113
A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/Exiv2/exiv2/issues/791" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Exiv2/exiv2/pull/797" }, { "source": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/791
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "Exiv2", "exiv2" ]
There is a bug at [webpimage.cpp:515](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/webpimage.cpp#L515). If `filesize < io_->tell()` then the subtraction overflows and the bounds check on `size` is ineffective. There is an additional problem in this function, which is that the erro...
Integer overflow, leading to very large allocation in WebPImage::decodeChunks()
https://api.github.com/repos/Exiv2/exiv2/issues/791/comments
1
2019-04-24T16:03:00Z
2019-07-01T09:03:36Z
https://github.com/Exiv2/exiv2/issues/791
436,781,784
791
CVE-2019-13112
2019-06-30T23:15:10.160
A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/845" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/846" }, { "sour...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/845
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
The attached file causes a `std::bad_alloc` exception in `exiv2`. ![issue_845_poc](https://user-images.githubusercontent.com/4358136/57626292-7e38c900-758d-11e9-99aa-85d538eea630.png) The bug is that there is no bounds check on the value of `length` at [pngchunk_int.cpp:669](https://github.com/Exiv2/exiv2/blob/f4...
Out of memory error due to unchecked allocation size in PngChunk::parseChunkContent()
https://api.github.com/repos/Exiv2/exiv2/issues/845/comments
2
2019-05-13T13:42:43Z
2019-07-01T09:04:40Z
https://github.com/Exiv2/exiv2/issues/845
443,405,977
845
CVE-2019-13113
2019-06-30T23:15:10.207
Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/841" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/842" }...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/841
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
The attached file causes an assertion failure in `exiv2`. ![issue_841_poc](https://user-images.githubusercontent.com/4358136/57619635-45452800-757e-11e9-8496-9e198b7f53f4.jpg) Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)): ...
Invalid data location in CRW image causes exiv2 to crash
https://api.github.com/repos/Exiv2/exiv2/issues/841/comments
3
2019-05-13T11:53:23Z
2019-07-01T09:05:47Z
https://github.com/Exiv2/exiv2/issues/841
443,356,775
841
CVE-2019-13114
2019-06-30T23:15:10.267
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/E...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E", "versionEndExcluding": null, "versionEndIncluding": "0.27.1", "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/793
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
There is a null pointer deference bug at [http.cpp:364](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L364). If the http server sends back a reply that does not contain a space character, then `strchr` will return `NULL`, leading to a null pointer dereference in `atoi`. To...
null pointer dereference in http.cpp
https://api.github.com/repos/Exiv2/exiv2/issues/793/comments
4
2019-04-24T20:14:50Z
2019-07-01T09:07:49Z
https://github.com/Exiv2/exiv2/issues/793
436,886,165
793
CVE-2019-13133
2019-07-01T20:15:11.180
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1600
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c.
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1600/comments
2
2019-06-18T10:55:16Z
2019-07-03T01:29:51Z
https://github.com/ImageMagick/ImageMagick/issues/1600
457,401,228
1,600
CVE-2019-13135
2019-07-01T20:15:11.337
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1599
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Use of uninitialized value in function ReadCUTImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1599/comments
2
2019-06-18T10:33:40Z
2019-07-03T01:30:23Z
https://github.com/ImageMagick/ImageMagick/issues/1599
457,391,875
1,599
CVE-2019-13136
2019-07-01T20:15:11.417
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "024CF82C-BA9A-441D-80DD-BDA9FEC819A7", "versionEndExcluding": "7.0.8-50", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1602
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ y ] I have written a descriptive issue title - [ y ] I have verified that I am using the latest version of ImageMagick - [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Possible integer overflow in TIFFSeekCustomStream in coder/tiff.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1602/comments
2
2019-06-18T11:47:50Z
2019-07-03T01:30:44Z
https://github.com/ImageMagick/ImageMagick/issues/1602
457,432,764
1,602
CVE-2019-13137
2019-07-01T20:15:11.493
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA", "versionEndExcluding": "6.9.10-50", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1601
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [ Y ] I have written a descriptive issue title - [ Y ] I have verified that I am using the latest version of ImageMagick - [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss...
Memory leak in ReadPSImage in coder/ps.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1601/comments
2
2019-06-18T11:02:58Z
2019-07-03T01:31:05Z
https://github.com/ImageMagick/ImageMagick/issues/1601
457,404,400
1,601
CVE-2018-14866
2019-07-03T18:15:10.317
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32509" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32509
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-9 Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. **...
[SEC] ODOO-SA-2018-08-07-9 (CVE-2018-14866) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32509/comments
0
2019-04-08T13:37:46Z
2019-04-08T13:37:49Z
https://github.com/odoo/odoo/issues/32509
430,456,694
32,509
CVE-2018-14861
2019-07-03T19:15:10.503
Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32506" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/odoo/odoo/issues/32506
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-6 Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. **Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions) **Component**: Od...
[SEC] ODOO-SA-2018-08-07-6 (CVE-2018-14861) - Improper data access control in...
https://api.github.com/repos/odoo/odoo/issues/32506/comments
0
2019-04-08T13:37:39Z
2019-04-08T13:37:41Z
https://github.com/odoo/odoo/issues/32506
430,456,630
32,506
CVE-2018-14862
2019-07-03T19:15:10.580
Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32504" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32504
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-4 Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterp...
[SEC] ODOO-SA-2018-08-07-4 (CVE-2018-14862) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32504/comments
0
2019-04-08T13:37:34Z
2019-04-08T13:37:36Z
https://github.com/odoo/odoo/issues/32504
430,456,583
32,504
CVE-2018-14863
2019-07-03T19:15:10.643
Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32508" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32508
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-8 Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) **Component**: Odoo Frame...
[SEC] ODOO-SA-2018-08-07-8 (CVE-2018-14863) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32508/comments
0
2019-04-08T13:37:44Z
2019-04-08T13:37:45Z
https://github.com/odoo/odoo/issues/32508
430,456,676
32,508
CVE-2018-14864
2019-07-03T19:15:10.707
Incorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32502" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32502
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-2 Incorrect access control in asset bundles in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. **Affects**: Odoo 8.0, 9.0, 10.0 (Community and Enterprise Editions) *...
[SEC] ODOO-SA-2018-08-07-2 (CVE-2018-14864) - Incorrect access control in ass...
https://api.github.com/repos/odoo/odoo/issues/32502/comments
0
2019-04-08T13:37:25Z
2019-04-08T13:37:30Z
https://github.com/odoo/odoo/issues/32502
430,456,495
32,502
CVE-2018-14865
2019-07-03T19:15:10.767
Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32501" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32501
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-1 Report engine in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. **Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions) *...
[SEC] ODOO-SA-2018-08-07-1 (CVE-2018-14865) - Report engine in Odoo Community...
https://api.github.com/repos/odoo/odoo/issues/32501/comments
0
2019-04-08T13:37:23Z
2019-04-08T13:37:25Z
https://github.com/odoo/odoo/issues/32501
430,456,471
32,501
CVE-2018-14859
2019-07-03T20:15:10.777
Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32510" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/odoo/odoo/issues/32510
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-10 Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token. **Affects**: Odoo 9.0, 10.0, 11...
[SEC] ODOO-SA-2018-08-07-10 (CVE-2018-14859) - Incorrect access control in the...
https://api.github.com/repos/odoo/odoo/issues/32510/comments
0
2019-04-08T13:37:50Z
2019-04-08T13:37:51Z
https://github.com/odoo/odoo/issues/32510
430,456,723
32,510
CVE-2018-14860
2019-07-03T20:15:10.837
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/32505" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*", "matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB", "versionEndExcluding": null, "versionEndIncluding": "11.0", "versionStartExclud...
https://github.com/odoo/odoo/issues/32505
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2018-08-07-5 Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system. **Affects**: Odo...
[SEC] ODOO-SA-2018-08-07-5 (CVE-2018-14860) - Improper sanitization of dynami...
https://api.github.com/repos/odoo/odoo/issues/32505/comments
0
2019-04-08T13:37:37Z
2019-04-08T14:38:16Z
https://github.com/odoo/odoo/issues/32505
430,456,607
32,505
CVE-2019-13238
2019-07-04T14:15:10.853
An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/396" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/396
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
A memory allocation failure unhandled in Ap4SdpAtom.cpp and leads to crashes. `./mp42aac input_file /dev/null` In file Source/C++/Core/Ap4SdpAtom.cpp <img width="640" alt="image" src="https://user-images.githubusercontent.com/7632714/58334121-73c1dd80-7e71-11e9-88a2-c9fbd2129068.png"> AP4_SdpAtom allocate a n...
Exhaustive memory misunhandle
https://api.github.com/repos/axiomatic-systems/Bento4/issues/396/comments
0
2019-05-24T14:17:26Z
2019-08-25T16:31:09Z
https://github.com/axiomatic-systems/Bento4/issues/396
448,195,676
396
CVE-2019-13295
2019-07-05T01:15:09.907
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1608
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1608/comments
2
2019-06-21T05:58:31Z
2019-07-08T01:48:18Z
https://github.com/ImageMagick/ImageMagick/issues/1608
459,023,037
1,608
CVE-2019-13296
2019-07-05T01:15:09.983
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1604
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Direct memory leaks in AcquireMagickMemory and indirect memory leaks
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1604/comments
2
2019-06-18T17:22:26Z
2019-07-08T01:48:39Z
https://github.com/ImageMagick/ImageMagick/issues/1604
457,603,906
1,604
CVE-2019-13297
2019-07-05T01:15:10.047
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1609
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1609/comments
2
2019-06-21T06:02:04Z
2019-07-08T01:48:56Z
https://github.com/ImageMagick/ImageMagick/issues/1609
459,024,141
1,609
CVE-2019-13298
2019-07-05T01:15:10.110
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1611
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1611/comments
2
2019-06-21T06:07:48Z
2019-07-08T01:49:17Z
https://github.com/ImageMagick/ImageMagick/issues/1611
459,025,805
1,611
CVE-2019-13299
2019-07-05T01:15:10.187
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1610
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1610/comments
6
2019-06-21T06:05:24Z
2019-10-25T13:50:32Z
https://github.com/ImageMagick/ImageMagick/issues/1610
459,025,122
1,610
CVE-2019-13300
2019-07-05T01:15:10.250
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1586
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/statistic.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586/comments
3
2019-06-10T15:57:48Z
2019-07-08T01:49:56Z
https://github.com/ImageMagick/ImageMagick/issues/1586
454,242,285
1,586
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1585
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks in AcquireMagickMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1585/comments
5
2019-06-10T14:34:22Z
2019-10-05T02:53:40Z
https://github.com/ImageMagick/ImageMagick/issues/1585
454,202,041
1,585
CVE-2019-13301
2019-07-05T01:15:10.297
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1589
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free in MagickCore/resize.c and double-free in RelinquishAlignedMemory of MagickCore/memory.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1589/comments
11
2019-06-11T05:31:32Z
2019-07-09T13:21:32Z
https://github.com/ImageMagick/ImageMagick/issues/1589
454,487,713
1,589
CVE-2019-13302
2019-07-05T01:15:10.373
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1597
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1597/comments
2
2019-06-17T03:51:17Z
2019-07-08T01:50:56Z
https://github.com/ImageMagick/ImageMagick/issues/1597
456,730,033
1,597
CVE-2019-13303
2019-07-05T01:15:10.437
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/d29148fa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1603
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1603/comments
2
2019-06-18T17:08:25Z
2019-07-08T01:51:18Z
https://github.com/ImageMagick/ImageMagick/issues/1603
457,598,033
1,603
CVE-2019-13304
2019-07-05T01:15:10.500
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1614
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1614/comments
4
2019-06-21T06:36:50Z
2019-08-10T11:27:40Z
https://github.com/ImageMagick/ImageMagick/issues/1614
459,035,202
1,614
CVE-2019-13305
2019-07-05T01:15:10.563
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1613
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
stack-buffer-overflow at coders/pnm.c:1906 in WritePNMImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1613/comments
2
2019-06-21T06:23:44Z
2019-07-08T01:52:06Z
https://github.com/ImageMagick/ImageMagick/issues/1613
459,030,453
1,613
CVE-2019-13306
2019-07-05T01:15:10.623
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1612
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
stack-buffer-overflow at coders/pnm.c:1902 in WritePNMImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1612/comments
2
2019-06-21T06:13:39Z
2019-07-08T01:52:26Z
https://github.com/ImageMagick/ImageMagick/issues/1612
459,027,438
1,612
CVE-2019-13307
2019-07-05T01:15:10.687
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1615
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/statistic.c:559:43 in EvaluateImages
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1615/comments
6
2019-06-22T02:11:22Z
2019-08-10T11:30:08Z
https://github.com/ImageMagick/ImageMagick/issues/1615
459,421,750
1,615
CVE-2019-13308
2019-07-05T01:15:10.750
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/61135001...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1595
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/fourier.c:299:18 in ComplexImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1595/comments
3
2019-06-17T02:21:01Z
2019-08-13T11:59:01Z
https://github.com/ImageMagick/ImageMagick/issues/1595
456,713,579
1,595
CVE-2019-13309
2019-07-05T01:15:10.813
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/ImageMagick/Image...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1616
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks is detected at AcquireMagickMemory
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1616/comments
2
2019-06-23T08:45:54Z
2019-07-08T01:55:00Z
https://github.com/ImageMagick/ImageMagick/issues/1616
459,551,673
1,616
CVE-2019-13311
2019-07-05T01:15:10.937
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1623
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks is detected at AcquireMagickMemory
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1623/comments
3
2019-07-01T18:19:43Z
2019-07-08T10:31:06Z
https://github.com/ImageMagick/ImageMagick/issues/1623
462,846,647
1,623
CVE-2019-13391
2019-07-07T22:15:10.503
In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*", "matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1588
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in MagickCore/fourier.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1588/comments
7
2019-06-11T03:25:05Z
2019-07-08T01:55:44Z
https://github.com/ImageMagick/ImageMagick/issues/1588
454,462,914
1,588
CVE-2018-11307
2019-07-09T16:15:12.807
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0782" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1822" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2032
[ "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
A new potential gadget type from MyBatis (https://github.com/mybatis/mybatis-3) has been reported. It may allow content exfiltration (remote access by sending contents over ftp) when untrusted content is deserialized with default typing enabled. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-w...
Block one more gadget type (mybatis, CVE-2018-11307)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2032/comments
4
2018-05-10T04:23:03Z
2020-12-02T04:03:22Z
https://github.com/FasterXML/jackson-databind/issues/2032
321,805,044
2,032
CVE-2019-13454
2019-07-09T17:15:11.850
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-54:q16:*:*:*:*:*:*", "matchCriteriaId": "9A2BD25B-C7E9-4B57-BF88-0C86D9D3C318", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1629
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Division by Zero at MagickCore/layer.c:1616
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1629/comments
4
2019-07-07T02:34:55Z
2019-08-18T16:37:24Z
https://github.com/ImageMagick/ImageMagick/issues/1629
464,908,207
1,629
CVE-2019-1010062
2019-07-16T13:15:11.410
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "josh@bress.net", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/commit/09f0ab871bf633973cfd9fc4fe59d4a912397cf8" }, { "source": "josh@bress.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluckcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "864B3716-962D-4BC2-8A56-E483D47AB4B7", "versionEndExcluding": null, "versionEndIncluding": "4.7.4", "versionStartExcl...
https://github.com/pluck-cms/pluck/issues/44
[ "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
Hi! I found a Unrestricted File Upload Vulnerability on PluckCMS 4.7.4. I found i can bypass the filetype detection on background site by modifying the MIME type on HTTP request. And with uploading a PHP File, i can get a webshell. ![](http://ony7wielg.bkt.clouddn.com/20170412149193291619562.png) Please fix it ASAP ...
[Vulnerability] Unrestricted File Upload in background site
https://api.github.com/repos/pluck-cms/pluck/issues/44/comments
2
2017-04-11T17:52:00Z
2018-09-03T08:40:42Z
https://github.com/pluck-cms/pluck/issues/44
221,030,477
44
CVE-2019-13617
2019-07-16T17:15:12.753
njs through 0.3.3, used in NGINX, has a heap-based buffer over-read in nxt_vsprintf in nxt/nxt_sprintf.c during error handling, as demonstrated by an njs_regexp_literal call that leads to an njs_parser_lexer_error call and then an njs_parser_scope_error call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15093" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081", "versionEndExcluding": null, "versionEndIncluding": "0.3.3", "versionStartExcluding": null...
https://github.com/nginx/njs/issues/174
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nginx", "njs" ]
Hello, I am shuoz of alpha lab of topsec. I fuzz njs and found a heap overflow bug. ./njs ./tmp.js ``` fuzz@fuzz:~/Desktop/fuzzproject/njs/build$ ./njs ./tmp.js INFO: Seed: 2208882516 INFO: Loaded 1 modules (8780 guards): [0x8a15a0, 0x8a9ed0), ./njs: Running 1 inputs 1 time(s) each. Running: crash-0c9fced77...
heap-buffer-overflow in nxt_sprintf.c:429
https://api.github.com/repos/nginx/njs/issues/174/comments
3
2019-06-03T14:46:39Z
2019-08-26T16:01:44Z
https://github.com/nginx/njs/issues/174
451,525,498
174
CVE-2019-13618
2019-07-16T17:15:12.830
In GPAC before 0.8.0, isomedia/isom_read.c in libgpac.a has a heap-based buffer over-read, as demonstrated by a crash in gf_m2ts_sync in media_tools/mpegts.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/compare/440d475...6b4ab40" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/1250
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
hello,I found a heap buffer overflow bug in gpac. [bug details](http://blog.topsec.com.cn/gpac-heap-buffer-overflow-in-gf_m2ts_sync/) [heap-over-flow.zip](https://github.com/gpac/gpac/files/3251236/heap-over-flow.zip)
heap buffer overflow in gf_m2ts_sync
https://api.github.com/repos/gpac/gpac/issues/1250/comments
1
2019-06-04T08:09:07Z
2019-06-24T15:28:33Z
https://github.com/gpac/gpac/issues/1250
451,854,770
1,250
CVE-2019-13959
2019-07-18T19:15:11.520
In Bento4 1.5.1-627, AP4_DataBuffer::SetDataSize does not handle reallocation failures, leading to a memory copy into a NULL pointer. This is different from CVE-2018-20186.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/394" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*", "matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/394
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Hi, recently when I experience the new version of bento4. I find an NPD bug in program "mp42aac". `./mp42acc inputs` The bug logic is that when the data size is not large enough and apply reallocation, the reallocation does not check whether the new buffer is successfully allocated. This is the execution trace. ...
Null Pointer Dereference(npd) Bug
https://api.github.com/repos/axiomatic-systems/Bento4/issues/394/comments
1
2019-05-14T06:23:56Z
2019-08-25T16:30:37Z
https://github.com/axiomatic-systems/Bento4/issues/394
443,731,009
394
CVE-2019-1010176
2019-07-25T14:15:11.623
JerryScript commit 4e58ccf68070671e1fff5cd6673f0c1d5b80b166 is affected by: Buffer Overflow. The impact is: denial of service and possibly arbitrary code execution. The component is: function lit_char_to_utf8_bytes (jerry-core/lit/lit-char-helpers.c:377). The attack vector is: executing crafted javascript code. The fix...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "josh@bress.net", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/2476" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "9175A295-03A6-4FB2-8F80-11BCB454D8A6", "versionEndExcluding": "2.0", "versionEndIncluding": null, "versionStartE...
https://github.com/jerryscript-project/jerryscript/issues/2476
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
Version: 4e58ccf68070671e1fff5cd6673f0c1d5b80b166 Build command: `python3 ./tools/build.py --clean --jerry-libc=off --system-allocator=on --profile=es2015-subset --compile-flag=-m32 --compile-flag=-fsanitize=address --strip=OFF` Testcase: `cat testcase | ./jerry` Where testcase is as following: ``` 0 /ð/...
Heap buffer overflow in lit_char_to_utf8_bytes
https://api.github.com/repos/jerryscript-project/jerryscript/issues/2476/comments
0
2018-08-16T15:19:04Z
2018-08-21T04:53:56Z
https://github.com/jerryscript-project/jerryscript/issues/2476
351,251,936
2,476
CVE-2019-14268
2019-07-25T16:15:13.260
In Octopus Deploy versions 3.0.19 to 2019.7.2, when a web request proxy is configured, an authenticated user (in certain limited circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 2019.7.3. The fix was back-ported to LTS 2019.6.5 as ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5739" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BFCFB1-B174-4F17-BD8A-D8664AF4B397", "versionEndExcluding": null, "versionEndIncluding": "2019.7.2", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/5739
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
Relates to: OctopusDeploy/OctopusDeploy#4112. # Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to ou...
Proxy password may be logged in clear text in certain circumstances
https://api.github.com/repos/OctopusDeploy/Issues/issues/5739/comments
3
2019-07-25T01:42:06Z
2019-10-24T00:11:58Z
https://github.com/OctopusDeploy/Issues/issues/5739
472,623,907
5,739
CVE-2019-14295
2019-07-27T19:15:12.050
An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/286" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/286
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggest...
Integer-overflow in function getElfSections at p_vmlinx.cpp:119
https://api.github.com/repos/upx/upx/issues/286/comments
7
2019-07-19T06:15:54Z
2022-09-14T06:46:05Z
https://github.com/upx/upx/issues/286
470,156,643
286
CVE-2019-14296
2019-07-27T19:15:12.097
canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*", "matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/upx/upx/issues/287
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggest...
canUnpack@p_vmlinx.cpp:583___buffer-overflow
https://api.github.com/repos/upx/upx/issues/287/comments
2
2019-07-19T06:25:38Z
2019-07-30T09:33:45Z
https://github.com/upx/upx/issues/287
470,159,542
287
CVE-2019-14368
2019-07-28T19:15:10.903
Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in rafimage.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/952" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/Exiv2/exiv2/issues/952
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** in my research , a heap overflow found in RafImage::readMetadata rafimage.cpp:296. **To Reproduce** exiv2 -pv $poc [exiv2poc.zip](https://github.com/Exiv2/exiv2/files/3384707/exiv2poc.zip) **Expected behavior** ``` root@ubuntu:~/fuzz/exiv2# /home/tim/exiv2-asan/build/bin/exiv2 /home/t...
AddressSanitizer: heap-buffer-overflow in RafImage::readMetadata
https://api.github.com/repos/Exiv2/exiv2/issues/952/comments
4
2019-07-12T02:22:41Z
2019-07-29T16:51:35Z
https://github.com/Exiv2/exiv2/issues/952
467,188,161
952
CVE-2019-14369
2019-07-28T19:15:10.983
Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/953" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/Exiv2/exiv2/issues/953
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** in my research , a heap overflow found in Exiv2::readChunk(Exiv2::DataBuf&, Exiv2::BasicIo&) /src/pngimage.cpp:410. **To Reproduce** exiv2 -pv $poc [poc.zip](https://github.com/Exiv2/exiv2/files/3384823/poc.zip) **Expected behavior** ``` =============================================...
AddressSanitizer: heap-buffer-overflow in PngImage::readMetadata() pngimage.cpp:438
https://api.github.com/repos/Exiv2/exiv2/issues/953/comments
8
2019-07-12T03:07:03Z
2019-07-22T09:21:12Z
https://github.com/Exiv2/exiv2/issues/953
467,198,124
953
CVE-2019-14370
2019-07-28T19:15:11.030
In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It could result in denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/954" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/Exiv2/exiv2/issues/954
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** in my research , a heap overflow found in Exiv2::MrwImage::readMetadata() /home/tim/exiv2-asan/src/mrwimage.cpp:131. **To Reproduce** exiv2 -pv $poc [poc1.zip](https://github.com/Exiv2/exiv2/files/3385271/poc1.zip) **Expected behavior** ``` asan output rASAN:DEADLYSIGNAL ==========...
heap-buffer-overflow in Exiv2::MrwImage::readMetadata()
https://api.github.com/repos/Exiv2/exiv2/issues/954/comments
4
2019-07-12T06:36:56Z
2019-07-22T09:36:16Z
https://github.com/Exiv2/exiv2/issues/954
467,246,598
954
CVE-2019-14379
2019-07-29T12:15:16.633
SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Mar/23" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2824" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2387
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type reported regarding a class of ehcache package. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. ----- Fixed in: * 2.9.10 * 2.8.11.4 * 2.7.9.6 * 2.6.7.3
Block one more gadget type (ehcache, CVE-2019-14379)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2387/comments
4
2019-07-23T06:28:01Z
2019-10-16T04:54:58Z
https://github.com/FasterXML/jackson-databind/issues/2387
471,508,431
2,387