cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 48 2.08k | cve_metrics dict | cve_references listlengths 1 138 | cve_configurations listlengths 1 39 | url stringlengths 37 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 56 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 37 62 | issue_github_id int64 104M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-9956 | 2019-03-24T00:29:00.213 | In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:q16:*:*:*:*:*:*",
"matchCriteriaId": "7D254272-9A50-4719-8FC1-3DB7E74B141F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1523 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | stack-buffer-overflow in PopHexPixel of ps.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1523/comments | 5 | 2019-03-22T10:37:33Z | 2019-03-26T09:38:55Z | https://github.com/ImageMagick/ImageMagick/issues/1523 | 424,144,480 | 1,523 |
CVE-2019-10649 | 2019-03-30T14:29:00.240 | In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://www.securityfocus.com/bid/107645"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1533"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*",
"matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1533 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | memory leak in SVGKeyValuePairs of coders/svg.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1533/comments | 5 | 2019-03-28T15:41:27Z | 2019-06-27T04:31:35Z | https://github.com/ImageMagick/ImageMagick/issues/1533 | 426,565,379 | 1,533 |
CVE-2019-10650 | 2019-03-30T14:29:00.303 | In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-36:q16:*:*:*:*:*:*",
"matchCriteriaId": "0DE4BD49-D481-47E8-B2E3-61482590D669",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1532 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in WriteTIFFImage of coders/tiff.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1532/comments | 5 | 2019-03-28T15:33:16Z | 2019-05-18T13:35:30Z | https://github.com/ImageMagick/ImageMagick/issues/1532 | 426,560,687 | 1,532 |
CVE-2019-1002100 | 2019-04-01T14:29:00.483 | In all Kubernetes versions prior to v1.11.8, v1.12.6, and v1.13.4, users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type "json-patch" (e.g. `kubectl patch --type json` or `"Content-Type: application/json-patch+json"`) that consumes excessive resources w... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "josh@bress.net",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107290"
},
{
"source": "josh@bress.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHS... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA71853-0F00-4D01-834F-63A8B24A27AB",
"versionEndExcluding": "1.11.8",
"versionEndIncluding": null,
"versionStart... | https://github.com/kubernetes/kubernetes/issues/74534 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) (6.5, medium)
Users that are authorized to make patch requests to the Kubernetes API Server can send a specially crafted patch of type “json-patch” (e.g. `kubectl patch --type json` o... | CVE-2019-1002100: json-patch requests can exhaust apiserver resources | https://api.github.com/repos/kubernetes/kubernetes/issues/74534/comments | 4 | 2019-02-25T19:39:09Z | 2022-05-16T21:57:19Z | https://github.com/kubernetes/kubernetes/issues/74534 | 414,272,146 | 74,534 |
CVE-2019-10714 | 2019-04-02T21:29:00.250 | LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78CC3088-3ED5-4CED-B051-2A3B58EDA881",
"versionEndExcluding": "6.9.10-32",
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1495 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Out-of-boundary in function LocaleLowercase of MagickCore/locale.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1495/comments | 2 | 2019-03-04T14:35:44Z | 2019-04-03T01:40:39Z | https://github.com/ImageMagick/ImageMagick/issues/1495 | 416,830,460 | 1,495 |
CVE-2019-11024 | 2019-04-08T23:29:00.790 | The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/85"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://research.loginsoft.com/bugs/15... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | https://github.com/saitoha/libsixel/issues/85 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | **Description** : we Observerd an infinite recursive loop at function load_pnm( ) at file frompnm.c which can lead to a denial of service attack.
**Command** : ./img2sixel -78eIkiugv -w 4 -h 8 -q auto -l force -o out $POC
**POC** : [REPRODUCER](https://github.com/SegfaultMasters/covering360/blob/master/libsexel/PO... | infinite recursive loop in load_pnm( ) | https://api.github.com/repos/saitoha/libsixel/issues/85/comments | 2 | 2019-03-29T05:47:49Z | 2019-12-18T20:34:07Z | https://github.com/saitoha/libsixel/issues/85 | 426,827,367 | 85 |
CVE-2019-11025 | 2019-04-08T23:29:00.853 | In clearFilter() in utilities.php in Cacti before 1.2.3, no escaping occurs before printing out the value of the SNMP community string (SNMP Options) in the View poller cache, leading to XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/Cacti/cacti/compare/6ea486a...99995bb"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1989C8-DBC3-4926-8AA3-245A0E8FE2DC",
"versionEndExcluding": "1.2.3",
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/Cacti/cacti/issues/2581 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
There's no escape being done before printing out the value of `SNMP community string` (SNMP Options) in the `View poller cache`.
**To Reproduce**
Steps to reproduce the behavior:
1. Login as normal user ( should have device creation explicitly enabled ).
2. Select create a new device from th... | When viewing poller cache, Device SNMP community is not properly escaped | https://api.github.com/repos/Cacti/cacti/issues/2581/comments | 2 | 2019-03-28T10:14:04Z | 2020-06-30T03:46:01Z | https://github.com/Cacti/cacti/issues/2581 | 426,407,384 | 2,581 |
CVE-2018-15631 | 2019-04-09T16:29:01.087 | Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "security@odoo.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32516"
},
{
"source": "security@odoo.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.excellium-services.com/cert-xlm-advisory/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/32516 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-3
Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.
**Affects**: Odoo Community 12.0 and e... | [SEC] ODOO-SA-2018-11-28-3 (CVE-2018-15631) - Improper access control in the... | https://api.github.com/repos/odoo/odoo/issues/32516/comments | 0 | 2019-04-08T13:40:55Z | 2019-04-08T13:40:57Z | https://github.com/odoo/odoo/issues/32516 | 430,458,377 | 32,516 |
CVE-2018-15635 | 2019-04-09T16:29:01.130 | Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "security@odoo.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32515"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "A958BCBB-C656-44A5-A9A9-66A66AEA67A0",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/32515 | [
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-2
Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on ... | [SEC] ODOO-SA-2018-11-28-2 (CVE-2018-15635) - Cross-site scripting vulnerabil... | https://api.github.com/repos/odoo/odoo/issues/32515/comments | 0 | 2019-04-08T13:40:52Z | 2019-04-08T13:40:54Z | https://github.com/odoo/odoo/issues/32515 | 430,458,345 | 32,515 |
CVE-2018-15640 | 2019-04-09T16:29:01.193 | Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "security@odoo.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32514"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "A4C406AC-8BCE-431E-9E09-7A793E3C750F",
"versionEndExcluding": null,
"versionEndIncluding": "12.0",
"versionStartExclu... | https://github.com/odoo/odoo/issues/32514 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-11-28-1
Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.
**Affects**: Odoo 10.0 Enterprise through 12.0 (Enterprise Editions only)
**Component**: Helpdesk
**Cre... | [SEC] ODOO-SA-2018-11-28-1 (CVE-2018-15640) - Improper access control in the... | https://api.github.com/repos/odoo/odoo/issues/32514/comments | 0 | 2019-04-08T13:40:48Z | 2019-04-08T13:40:50Z | https://github.com/odoo/odoo/issues/32514 | 430,458,311 | 32,514 |
CVE-2019-11221 | 2019-04-15T12:31:36.477 | GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1203"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1203 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | There is a buffer overflow issue in gf_import_message () function, media_import.c
szMsg overflow when srt file contains more than one txt line and the line is long enough.
GF_Err gf_import_message(GF_MediaImporter *import, GF_Err e, char *format, ...)
{
if (gf_log_tool_level_on(GF_LOG_AUTHOR, e ? GF_LOG_WARN... | buffer overflow issue 6# | https://api.github.com/repos/gpac/gpac/issues/1203/comments | 6 | 2019-02-12T03:44:32Z | 2019-04-19T09:00:55Z | https://github.com/gpac/gpac/issues/1203 | 409,106,668 | 1,203 |
CVE-2019-11222 | 2019-04-15T12:31:36.507 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1204 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file.
overflow occur when use a crafted key value.
root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box
(gdb) set args -crypt crafted_drm_file.xml overview.mp4 -out overview_encrypted.mp4
(gdb) r
Starting p... | buffer overflow issue 7# | https://api.github.com/repos/gpac/gpac/issues/1204/comments | 1 | 2019-02-13T07:12:39Z | 2019-04-19T08:50:59Z | https://github.com/gpac/gpac/issues/1204 | 409,659,238 | 1,204 |
CVE-2019-11222 | 2019-04-15T12:31:36.507 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/f3698bb1bce62402805c3fda96551a23101a32f9"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1205 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | there is a buffer overflow issue for crypt feature when use a crafted_drm_file.xml file.
overflow occur when use a crafted ID128 value.
root@ubuntu:/opt/niugx/cov_product/gpac/gpac-master/bin/gcc# gdb ./MP4Box
(gdb) set args -crypt drm_file.xml overview.mp4 -out overview_encrypted.mp4
(gdb) r
Starting program... | buffer overflow issue 8# | https://api.github.com/repos/gpac/gpac/issues/1205/comments | 1 | 2019-02-13T09:49:56Z | 2019-04-19T08:50:26Z | https://github.com/gpac/gpac/issues/1205 | 409,715,577 | 1,205 |
CVE-2019-11344 | 2019-04-19T19:29:00.233 | data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/72"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF082EE-B695-400E-BF54-FC8707FBBE3E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/pluck-cms/pluck/issues/72 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | Location: https://github.com/pluck-cms/pluck/blob/master/data/inc/files.php#L40
Code:
```php
<?php
// ......
$blockedExtentions = array('.php','php3','php4','php5','php6','php7','phtml');
if (in_array($lastfour, $blockedExtentions) or in_array($lastfive, $blockedExtentions) ){
if (!rename('files/'.l... | file-upload vulnerability in data/inc/files.php | https://api.github.com/repos/pluck-cms/pluck/issues/72/comments | 4 | 2019-04-09T14:45:54Z | 2019-05-29T16:19:45Z | https://github.com/pluck-cms/pluck/issues/72 | 431,009,393 | 72 |
CVE-2019-11243 | 2019-04-22T15:29:00.790 | In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credenti... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108053"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/7... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1909D3-D45E-4AD4-B773-51ADCFC63113",
"versionEndExcluding": null,
"versionEndIncluding": "1.12.4",
"versionStart... | https://github.com/kubernetes/kubernetes/issues/76797 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
The `rest.AnonymousClientConfig()` method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data).
In the following versions, `rest.AnonymousClientConfig()` did not effectively clear service acc... | CVE-2019-11243: v1.12.0-v1.12.4, v1.13.0: rest.AnonymousClientConfig() does not remove the serviceaccount credentials from config created by rest.InClusterConfig() | https://api.github.com/repos/kubernetes/kubernetes/issues/76797/comments | 2 | 2019-04-18T21:31:53Z | 2022-05-16T21:59:22Z | https://github.com/kubernetes/kubernetes/issues/76797 | 434,967,981 | 76,797 |
CVE-2019-11244 | 2019-04-22T15:29:00.837 | In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9000000000000001,
"confidentialityImpact"... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/108064"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3942"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A57F3AC4-5E09-4C16-91A7-80D54F8F968C",
"versionEndExcluding": null,
"versionEndIncluding": "1.14.1",
"versionStart... | https://github.com/kubernetes/kubernetes/issues/76676 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | In kubectl v1.8.0+, schema info is cached in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (rw-rw-rw-).
If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written files may be modified by... | CVE-2019-11244: `kubectl --http-cache=<world-accessible dir>` creates world-writeable cached schema files | https://api.github.com/repos/kubernetes/kubernetes/issues/76676/comments | 12 | 2019-04-16T20:14:25Z | 2022-10-14T02:06:00Z | https://github.com/kubernetes/kubernetes/issues/76676 | 433,964,918 | 76,676 |
CVE-2019-11470 | 2019-04-23T14:29:00.600 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE"... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-26:q16:*:*:*:*:*:*",
"matchCriteriaId": "64AB3C42-4698-4E94-9A4A-F75BA34C7213",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1472 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | Incorrect parsing Cineon causing `convert` to take ridiculous time | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1472/comments | 7 | 2019-02-05T04:29:35Z | 2019-04-23T16:45:43Z | https://github.com/ImageMagick/ImageMagick/issues/1472 | 406,625,350 | 1,472 |
CVE-2019-11472 | 2019-04-23T14:29:00.837 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*",
"matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1546 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | FPE errors when reading XWD images | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1546/comments | 2 | 2019-04-14T07:21:12Z | 2019-04-24T01:24:42Z | https://github.com/ImageMagick/ImageMagick/issues/1546 | 432,941,385 | 1,546 |
CVE-2019-11597 | 2019-04-29T16:29:00.407 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*",
"matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1555 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap_buffer_overflow in WriteTIFFImage of coders/tiff.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1555/comments | 2 | 2019-04-27T13:08:13Z | 2019-05-04T14:21:50Z | https://github.com/ImageMagick/ImageMagick/issues/1555 | 437,941,914 | 1,555 |
CVE-2019-11598 | 2019-04-29T16:29:00.470 | In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:q16:*:*:*:*:*:*",
"matchCriteriaId": "389645FC-93EE-430B-AFAB-108570F3857D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1540 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in WritePNMImage of coders/pnm.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1540/comments | 6 | 2019-04-08T03:10:13Z | 2019-05-12T11:30:48Z | https://github.com/ImageMagick/ImageMagick/issues/1540 | 430,236,223 | 1,540 |
CVE-2019-11632 | 2019-05-01T14:29:00.483 | In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5528"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/55... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817",
"versionEndExcluding": null,
"versionEndIncluding": "2019.3.1",
"versionSt... | https://github.com/OctopusDeploy/Issues/issues/5528 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | # Prerequisites
- [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy).
- [x] I have raised a CVE according to our [CVE process] (https://octopushq.atlassian.net/... | Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632) | https://api.github.com/repos/OctopusDeploy/Issues/issues/5528/comments | 3 | 2019-05-01T05:11:04Z | 2019-07-31T08:42:24Z | https://github.com/OctopusDeploy/Issues/issues/5528 | 439,070,509 | 5,528 |
CVE-2019-11632 | 2019-05-01T14:29:00.483 | In Octopus Deploy 2019.1.0 through 2019.3.1 and 2019.4.0 through 2019.4.5, an authenticated user with the VariableViewUnscoped or VariableEditUnscoped permission scoped to a specific project could view or edit unscoped variables from a different project. (These permissions are only used in custom User Roles and do not ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5528"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/55... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF5B5BF-E265-46DC-A509-3DC3B426D817",
"versionEndExcluding": null,
"versionEndIncluding": "2019.3.1",
"versionSt... | https://github.com/OctopusDeploy/Issues/issues/5529 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | This bug represents [this issue](https://github.com/OctopusDeploy/Issues/issues/5528) in LTS 2019.3 | Variable[View/Edit]Unscoped permissions don't comply with project scoping (CVE-2019-11632) | https://api.github.com/repos/OctopusDeploy/Issues/issues/5529/comments | 3 | 2019-05-01T05:15:06Z | 2019-07-31T08:42:27Z | https://github.com/OctopusDeploy/Issues/issues/5529 | 439,071,058 | 5,529 |
CVE-2019-11837 | 2019-05-09T14:29:00.510 | njs through 0.3.1, used in NGINX, has a segmentation fault in String.prototype.toBytes for negative arguments, related to nxt_utf8_next in nxt/nxt_utf8.h and njs_string_offset in njs/njs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/155"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/155 | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
>> "A".repeat(38).toBytes(-5)
ASAN:SIGSEGV
=================================================================
==16054==ERROR: AddressSanitizer: SEGV on unknown address 0x6090000168e0 (pc 0x00000042c455 bp 0x7fffa72fbb30 sp 0x7fffa72fbaf0 T0)
#0 0x42c454 in nxt_utf8_next nxt/nxt_utf8.h:44
#1 0x42c454 ... | Segfault in String.prototype.toBytes() for negative arguments. | https://api.github.com/repos/nginx/njs/issues/155/comments | 0 | 2019-05-07T18:38:36Z | 2019-05-31T12:13:12Z | https://github.com/nginx/njs/issues/155 | 441,389,038 | 155 |
CVE-2019-11838 | 2019-05-09T14:29:00.557 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/153"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/153 | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
var v0=[]
var x = new Array(10)
var i = 0
while (i < 100) {
v0.shift(v0.splice(0, "AAAA", "BBBB"))
i++;
}
```
```js
$ njs test.js
==21010==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c700 at pc 0x000000447d20 bp 0x7fffbdc99110 sp 0x7fffbdc99100
WRITE of size 16 at 0x... | heap-buffer-overflow in Array.prototype.splice() after resize. | https://api.github.com/repos/nginx/njs/issues/153/comments | 0 | 2019-05-07T17:43:35Z | 2019-05-14T17:37:45Z | https://github.com/nginx/njs/issues/153 | 441,355,829 | 153 |
CVE-2019-11839 | 2019-05-09T14:29:00.637 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/152"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/152 | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | ```js
var v0=[], i = 0;
while (i++ < 100) {
v0.push(v0.shift(0));
}
```
```sh
$ njs test.js
==13374==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60d00000c7d0 at pc 0x000000447165 bp 0x7ffd25e422b0 sp 0x7ffd25e422a
0
WRITE of size 16 at 0x60d00000c7d0 thread T0
#0 0x447164 in njs... | heap-buffer-overflow in Array.prototype.push() after resize. | https://api.github.com/repos/nginx/njs/issues/152/comments | 0 | 2019-05-07T17:30:56Z | 2019-05-08T22:22:13Z | https://github.com/nginx/njs/issues/152 | 441,350,927 | 152 |
CVE-2017-12805 | 2019-05-09T16:29:00.327 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/664"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*",
"matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/664 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ```
root@ubuntu:/home/hjy/Desktop# convert oom-ReadTIFFImage /dev/null
==27669==ERROR: AddressSanitizer failed to allocate 0x80002000 (-2147475456) bytes of LargeMmapAllocator: 12
==27669==Process memory map follows:
0x08048000-0x09714000 /usr/local/bin/magick
0x09714000-0x09715000 /usr/local/bin/magick
0x0971... | memory exhaustion in ReadTIFFImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/664/comments | 2 | 2017-08-10T05:00:53Z | 2019-05-10T01:41:54Z | https://github.com/ImageMagick/ImageMagick/issues/664 | 249,233,709 | 664 |
CVE-2017-12806 | 2019-05-09T16:29:00.373 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/660"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*",
"matchCriteriaId": "157776E9-D30D-48D2-B845-ED6315B8C5DC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/660 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ```
root@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null
==8638==ERROR: AddressSanitizer failed to allocate 0x72e8d000 (1927860224) bytes of LargeMmapAllocator: 12
==8638==Process memory map follows:
0x08048000-0x0971a000 /usr/local/bin/magick
0x0971a000-0x0971b000 /usr/local/bin/magick
0x0971b000-0... | memory exhaustion in format8BIM | https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments | 2 | 2017-08-08T03:28:18Z | 2019-05-10T01:41:26Z | https://github.com/ImageMagick/ImageMagick/issues/660 | 248,590,588 | 660 |
CVE-2019-11840 | 2019-05-09T16:29:00.607 | An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691529"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/golang/go/issues/30965"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:golang:crypto:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA1D5EA-C8A7-40C2-9D8E-7E1ECF8ADE80",
"versionEndExcluding": "2019-03-20",
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/golang/go/issues/30965 | [
"Third Party Advisory"
] | github.com | [
"golang",
"go"
] | If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to pre... | x/crypto/salsa20: keystream loop in amd64 implementation after 256GiB | https://api.github.com/repos/golang/go/issues/30965/comments | 3 | 2019-03-20T22:32:56Z | 2020-05-09T07:00:19Z | https://github.com/golang/go/issues/30965 | 423,501,989 | 30,965 |
CVE-2019-12086 | 2019-05-17T17:29:00.483 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a cra... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.secur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | https://github.com/FasterXML/jackson-databind/issues/2326 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | A new gadget type (see https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062) was reported, and CVE id allocated was `CVE-2019-12086`.
CVE description is available at: https://nvd.nist.gov/vuln/detail/CVE-2019-12086 for full details, but the specific variation (in addit... | Block one more gadget type (mysql, CVE-2019-12086) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2326/comments | 12 | 2019-05-11T17:31:34Z | 2019-10-16T04:36:08Z | https://github.com/FasterXML/jackson-databind/issues/2326 | 443,018,345 | 2,326 |
CVE-2019-12206 | 2019-05-20T14:29:00.697 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/162"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/162 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version
```
changeset: 965:e0fdef4eb478
tag: tip
user: Dmitry Volyntsev <xeioex@nginx.com>
date: Thu May 16 15:20:31 2019 +0300
summary: Fixed uninitialized-memory-access in Object.defineProperties().
```
JavaScript testcase:
```js
var v0="@褀+Qh"
while (((((((((((((v0)>>>v0.... | heap-buffer-overflow in nxt_utf8_encode (nxt_utf8.c:32) | https://api.github.com/repos/nginx/njs/issues/162/comments | 0 | 2019-05-20T08:18:34Z | 2019-05-30T14:15:14Z | https://github.com/nginx/njs/issues/162 | 445,981,633 | 162 |
CVE-2019-12207 | 2019-05-20T14:29:00.773 | njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/168"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/168 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Testcase (in base64):
```
bmV3IFJlZ0V4cChuZXcgUmVnRXhwKFJlZ0V4cCgobmV3IE9iamVjdCgiADs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7GDtzOzskOzs7OzsiLCAobmV3IEVycm9yKG5ldyBFcnJvcihuZXcgRXJyb3IobmV3IEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKG5ldyBJbnRlcm5hbEVycm9yKCgwLTApKSkpKSkpKSk8PTApKSswKSkpKQo=
``... | heap-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72 | https://api.github.com/repos/nginx/njs/issues/168/comments | 4 | 2019-05-20T09:01:01Z | 2019-06-20T12:24:14Z | https://github.com/nginx/njs/issues/168 | 446,000,306 | 168 |
CVE-2019-12208 | 2019-05-20T14:29:00.837 | njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/163"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F70BB50-E3EC-44F8-BC1A-D514EA261742",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/163 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version
```
changeset: 965:e0fdef4eb478
tag: tip
user: Dmitry Volyntsev <xeioex@nginx.com>
date: Thu May 16 15:20:31 2019 +0300
summary: Fixed uninitialized-memory-access in Object.defineProperties().
```
JavaScript testcase:
```js
var v0=Array()
while(v0.includes(v0.u,(Obje... | heap-buffer-overflow in njs_function_native_call njs/njs_function.c:623 | https://api.github.com/repos/nginx/njs/issues/163/comments | 1 | 2019-05-20T08:30:18Z | 2019-05-24T16:00:19Z | https://github.com/nginx/njs/issues/163 | 445,986,781 | 163 |
CVE-2019-12481 | 2019-05-30T23:29:00.267 | An issue was discovered in GPAC 0.7.1. There is a NULL pointer dereference in the function GetESD at isomedia/track.c in libgpac.a, as demonstrated by MP4Box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1249"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00030.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1249 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | 4 bugs found in gpac v0.7.1 release | https://api.github.com/repos/gpac/gpac/issues/1249/comments | 2 | 2019-05-27T07:11:13Z | 2019-07-10T08:47:22Z | https://github.com/gpac/gpac/issues/1249 | 448,700,419 | 1,249 |
CVE-2019-12814 | 2019-06-19T14:15:10.897 | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON messag... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2858"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2935"
},
{
"source"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | https://github.com/FasterXML/jackson-databind/issues/2341 | [
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Similar to other polymorphic types with no limits, but for XXE with `jdom2.jar`, tracked as `CVE-2019-12814`.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Fixed in:
* 2.9.10
* 2.8.11.4
* 2.7.9.6
* 2.6.7.3
| Block yet another gadget type (jdom, CVE-2019-12814) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2341/comments | 35 | 2019-06-04T04:08:07Z | 2019-10-16T04:53:30Z | https://github.com/FasterXML/jackson-databind/issues/2341 | 451,788,559 | 2,341 |
CVE-2018-16247 | 2019-06-20T16:15:11.087 | YzmCMS 5.1 has XSS via the admin/system_manage/user_config_add.html title parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A656260-E114-4D4D-A5E7-E56F6B97245C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/yzmcms/yzmcms/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | http://127.0.0.1/yzmcms/admin/system_manage/user_config_add.html
XSS, payload :<script>alert(1);</script>
POC:
POST /yzmcms/admin/system_manage/user_config_add.html HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Accept: application/json, text... | yzmcms v5.1 XSS | https://api.github.com/repos/yzmcms/yzmcms/issues/3/comments | 1 | 2018-08-16T05:18:39Z | 2020-01-02T07:59:45Z | https://github.com/yzmcms/yzmcms/issues/3 | 351,058,717 | 3 |
CVE-2019-12974 | 2019-06-26T18:15:10.167 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1515 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Null pointer deference in function ReadPANGOImage in coders/pango.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1515/comments | 3 | 2019-03-21T03:25:02Z | 2019-06-27T01:28:59Z | https://github.com/ImageMagick/ImageMagick/issues/1515 | 423,558,712 | 1,515 |
CVE-2019-12975 | 2019-06-26T18:15:10.213 | ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1517 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) is... | Possible but rare memory leak in function WriteDPXImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1517/comments | 2 | 2019-03-21T06:25:46Z | 2019-06-27T01:29:21Z | https://github.com/ImageMagick/ImageMagick/issues/1517 | 423,586,613 | 1,517 |
CVE-2019-12976 | 2019-06-26T18:15:10.277 | ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1520 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Memory leak in function ReadPCLImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1520/comments | 2 | 2019-03-21T07:25:10Z | 2019-06-27T01:29:46Z | https://github.com/ImageMagick/ImageMagick/issues/1520 | 423,598,777 | 1,520 |
CVE-2019-12977 | 2019-06-26T18:15:10.323 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1518 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Use-of-uninitialized-value in function WriteJP2Image | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1518/comments | 4 | 2019-03-21T06:44:34Z | 2019-06-27T01:30:10Z | https://github.com/ImageMagick/ImageMagick/issues/1518 | 423,590,022 | 1,518 |
CVE-2019-12978 | 2019-06-26T18:15:10.370 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://www.securityfocus.com/bid/108913"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1519 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Use-of-uninitialized-value in function ReadPANGOImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1519/comments | 2 | 2019-03-21T06:54:58Z | 2019-06-27T01:30:41Z | https://github.com/ImageMagick/ImageMagick/issues/1519 | 423,592,141 | 1,519 |
CVE-2019-12979 | 2019-06-26T18:15:10.417 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-34:*:*:*:*:*:*:*",
"matchCriteriaId": "F10870C6-6679-45A8-8F7F-8C3C295A4E29",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1522 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Use-of-uninitialized-value in function SyncImageSettings. | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1522/comments | 5 | 2019-03-21T11:58:29Z | 2019-08-10T06:30:27Z | https://github.com/ImageMagick/ImageMagick/issues/1522 | 423,694,012 | 1,522 |
CVE-2018-14867 | 2019-06-28T18:15:10.410 | Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32503"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32503 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-3
Incorrect access control in the portal messaging system in Odoo Community 9.0 and 10.0 and Odoo Enterprise 9.0 and 10.0 allows remote attackers to post messages on behalf of customers, and to guess document attribute values, via crafted parameters.
**Affects**: Odoo 9.0, 10.... | [SEC] ODOO-SA-2018-08-07-3 (CVE-2018-14867) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32503/comments | 0 | 2019-04-08T13:37:31Z | 2019-04-08T13:37:33Z | https://github.com/odoo/odoo/issues/32503 | 430,456,556 | 32,503 |
CVE-2018-14868 | 2019-06-28T18:15:10.473 | Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32507"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32507 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-7
Incorrect access control in the Password Encryption module in Odoo Community 9.0 and Odoo Enterprise 9.0 allows authenticated users to change the password of other users without knowing their current password via a crafted RPC call.
**Affects**: Odoo 9.0 (Community and Enter... | [SEC] ODOO-SA-2018-08-07-7 (CVE-2018-14868) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32507/comments | 0 | 2019-04-08T13:37:42Z | 2019-04-08T13:37:43Z | https://github.com/odoo/odoo/issues/32507 | 430,456,652 | 32,507 |
CVE-2018-14885 | 2019-06-28T18:15:10.520 | Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32512"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/odoo/odoo/issues/32512 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-12
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.
**Affects**: Odoo 10.0,... | [SEC] ODOO-SA-2018-08-07-12 (CVE-2018-14885) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32512/comments | 0 | 2019-04-08T13:37:55Z | 2019-04-08T13:37:57Z | https://github.com/odoo/odoo/issues/32512 | 430,456,776 | 32,512 |
CVE-2018-14886 | 2019-06-28T18:15:10.567 | The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32513"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32513 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-13
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
**Affects**: Odoo 9.0, 10.0... | [SEC] ODOO-SA-2018-08-07-13 (CVE-2018-14886) - The module-description renderer... | https://api.github.com/repos/odoo/odoo/issues/32513/comments | 0 | 2019-04-08T13:37:58Z | 2019-04-08T13:38:00Z | https://github.com/odoo/odoo/issues/32513 | 430,456,802 | 32,513 |
CVE-2018-14887 | 2019-06-28T18:15:10.613 | Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/commits/master"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32511 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-11
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
**Affects**: Odoo 9.0, 10... | [SEC] ODOO-SA-2018-08-07-11 (CVE-2018-14887) - Improper Host header sanitizati... | https://api.github.com/repos/odoo/odoo/issues/32511/comments | 0 | 2019-04-08T13:37:52Z | 2019-04-08T13:37:55Z | https://github.com/odoo/odoo/issues/32511 | 430,456,748 | 32,511 |
CVE-2019-13067 | 2019-06-30T00:15:11.283 | njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nginx/njs/issues/183"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.3",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/183 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | NJS version:
```
changeset: 1011:2fb43ddbce84
tag: tip
user: hongzhidao <hongzhidao@gmail.com>
date: Mon Jun 10 22:23:56 2019 -0400
summary: Added property getter/setter support in Object.defineProperty().
```
JS Testcase:
```js
(new InternalError(new Object(), RegExp().source.... | global-buffer-overflow in nxt_utf8_decode nxt/nxt_utf8.c:72 | https://api.github.com/repos/nginx/njs/issues/183/comments | 5 | 2019-06-20T12:23:30Z | 2019-07-02T14:04:00Z | https://github.com/nginx/njs/issues/183 | 458,626,122 | 183 |
CVE-2019-13072 | 2019-06-30T02:15:09.163 | Stored XSS in the Filters page (Name field) in ZoneMinder 1.32.3 allows a malicious user to embed and execute JavaScript code in the browser of any user who navigates to this page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ZoneMinder/zoneminder/issues/2642"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zoneminder:zoneminder:1.32.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A2481D-4A45-48A2-B7DE-86C7D161F6EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | https://github.com/ZoneMinder/zoneminder/issues/2642 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ZoneMinder",
"zoneminder"
] | - ZoneMinder version 1.32.3
- Installed from PPA (Ubuntu Xenial)
- Ubuntu 16.04 Xenial
The 'Filters' page in ZoneMinder 1.32.3 is vulnerable to stored cross site scripting due to improper input sanitation in the 'Name' field. This is the latest version available in the Ubuntu 16.04 PPA. Please see attached scree... | Stored Cross Site Scripting - Filters | https://api.github.com/repos/ZoneMinder/zoneminder/issues/2642/comments | 5 | 2019-06-18T00:07:40Z | 2019-12-26T10:04:57Z | https://github.com/ZoneMinder/zoneminder/issues/2642 | 457,200,985 | 2,642 |
CVE-2019-13108 | 2019-06-30T23:15:09.970 | An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/789"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/Exiv2/exiv2/pull/794"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding"... | https://github.com/Exiv2/exiv2/issues/789 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | There is a bug at [pngimage.cpp:469](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L469). If `iccOffset == 0`, which happens if `chunkLength == 0`, then Exiv2 crashes with a SIGSEGV.
Here is the PoC, which I have tested on master ([55dfdb9](https://github.com/Exiv2/exi... | SIGSEGV in PngImage::readMetadata() | https://api.github.com/repos/Exiv2/exiv2/issues/789/comments | 2 | 2019-04-24T15:24:45Z | 2019-07-01T08:58:12Z | https://github.com/Exiv2/exiv2/issues/789 | 436,761,517 | 789 |
CVE-2019-13109 | 2019-06-30T23:15:10.017 | An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a chunkLength - iccOffset subtraction. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/790"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/Exiv2/exiv2/pull... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding"... | https://github.com/Exiv2/exiv2/issues/790 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | This issue is closely related to #789, but the consequences of this bug are different. The calculation of `chunkLength - iccOffset` at [pngimage.cpp:472](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/pngimage.cpp#L472) can have a negative integer overflow which leads to an 8GB memory... | Integer overflow, leading to very large allocation in PngImage::readMetadata() | https://api.github.com/repos/Exiv2/exiv2/issues/790/comments | 1 | 2019-04-24T15:39:42Z | 2019-07-01T09:01:35Z | https://github.com/Exiv2/exiv2/issues/790 | 436,769,374 | 790 |
CVE-2019-13110 | 2019-06-30T23:15:10.067 | A CiffDirectory::readDirectory integer overflow and out-of-bounds read in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted CRW image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/843"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/pull/844"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding"... | https://github.com/Exiv2/exiv2/issues/843 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | The problem is that the calculation of `o+2` can overflow at [crwimage_int.cpp:284](https://github.com/Exiv2/exiv2/blob/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b/src/crwimage_int.cpp#L284).

Reprodu... | Integer overflow causes out-of-bounds read in CiffDirectory::readDirectory() | https://api.github.com/repos/Exiv2/exiv2/issues/843/comments | 2 | 2019-05-13T12:58:33Z | 2019-07-01T09:02:45Z | https://github.com/Exiv2/exiv2/issues/843 | 443,384,339 | 843 |
CVE-2019-13111 | 2019-06-30T23:15:10.113 | A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/Exiv2/exiv2/issues/791"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/Exiv2/exiv2/pull/797"
},
{
"source": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding"... | https://github.com/Exiv2/exiv2/issues/791 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"Exiv2",
"exiv2"
] | There is a bug at [webpimage.cpp:515](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/webpimage.cpp#L515). If `filesize < io_->tell()` then the subtraction overflows and the bounds check on `size` is ineffective.
There is an additional problem in this function, which is that the erro... | Integer overflow, leading to very large allocation in WebPImage::decodeChunks() | https://api.github.com/repos/Exiv2/exiv2/issues/791/comments | 1 | 2019-04-24T16:03:00Z | 2019-07-01T09:03:36Z | https://github.com/Exiv2/exiv2/issues/791 | 436,781,784 | 791 |
CVE-2019-13112 | 2019-06-30T23:15:10.160 | A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/845"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/pull/846"
},
{
"sour... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding"... | https://github.com/Exiv2/exiv2/issues/845 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | The attached file causes a `std::bad_alloc` exception in `exiv2`.

The bug is that there is no bounds check on the value of `length` at [pngchunk_int.cpp:669](https://github.com/Exiv2/exiv2/blob/f4... | Out of memory error due to unchecked allocation size in PngChunk::parseChunkContent() | https://api.github.com/repos/Exiv2/exiv2/issues/845/comments | 2 | 2019-05-13T13:42:43Z | 2019-07-01T09:04:40Z | https://github.com/Exiv2/exiv2/issues/845 | 443,405,977 | 845 |
CVE-2019-13113 | 2019-06-30T23:15:10.207 | Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to assertion failure) via an invalid data location in a CRW image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/841"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/pull/842"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding"... | https://github.com/Exiv2/exiv2/issues/841 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | The attached file causes an assertion failure in `exiv2`.

Reproducible on the 0.27-maintenance branch ([f4a37c6](https://github.com/Exiv2/exiv2/commit/f4a37c63f2f890c16ff7192fc89a75a7c34ae82b)):
... | Invalid data location in CRW image causes exiv2 to crash | https://api.github.com/repos/Exiv2/exiv2/issues/841/comments | 3 | 2019-05-13T11:53:23Z | 2019-07-01T09:05:47Z | https://github.com/Exiv2/exiv2/issues/841 | 443,356,775 | 841 |
CVE-2019-13114 | 2019-06-30T23:15:10.267 | http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/E... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFA28DF-4BFE-4CA7-A2F7-F471F91B856E",
"versionEndExcluding": null,
"versionEndIncluding": "0.27.1",
"versionStartExcluding"... | https://github.com/Exiv2/exiv2/issues/793 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | There is a null pointer deference bug at [http.cpp:364](https://github.com/Exiv2/exiv2/blob/55dfdb9ab007d6e6d1d06240048690eaac23b305/src/http.cpp#L364). If the http server sends back a reply that does not contain a space character, then `strchr` will return `NULL`, leading to a null pointer dereference in `atoi`.
To... | null pointer dereference in http.cpp | https://api.github.com/repos/Exiv2/exiv2/issues/793/comments | 4 | 2019-04-24T20:14:50Z | 2019-07-01T09:07:49Z | https://github.com/Exiv2/exiv2/issues/793 | 436,886,165 | 793 |
CVE-2019-13133 | 2019-07-01T20:15:11.180 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8AB2B06-598F-4F38-813C-B1E3E1E7EEE5",
"versionEndExcluding": "7.0.8-50",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/1600 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Memory leak in ReadBMPImage in coder/bmp.c and ReadVIFFImage in coder/viff.c. | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1600/comments | 2 | 2019-06-18T10:55:16Z | 2019-07-03T01:29:51Z | https://github.com/ImageMagick/ImageMagick/issues/1600 | 457,401,228 | 1,600 |
CVE-2019-13135 | 2019-07-01T20:15:11.337 | ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageM... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA",
"versionEndExcluding": "6.9.10-50",
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1599 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ y ] I have written a descriptive issue title
- [ y ] I have verified that I am using the latest version of ImageMagick
- [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Use of uninitialized value in function ReadCUTImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1599/comments | 2 | 2019-06-18T10:33:40Z | 2019-07-03T01:30:23Z | https://github.com/ImageMagick/ImageMagick/issues/1599 | 457,391,875 | 1,599 |
CVE-2019-13136 | 2019-07-01T20:15:11.417 | ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "024CF82C-BA9A-441D-80DD-BDA9FEC819A7",
"versionEndExcluding": "7.0.8-50",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/1602 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ y ] I have written a descriptive issue title
- [ y ] I have verified that I am using the latest version of ImageMagick
- [ y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Possible integer overflow in TIFFSeekCustomStream in coder/tiff.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1602/comments | 2 | 2019-06-18T11:47:50Z | 2019-07-03T01:30:44Z | https://github.com/ImageMagick/ImageMagick/issues/1602 | 457,432,764 | 1,602 |
CVE-2019-13137 | 2019-07-01T20:15:11.493 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageM... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF97F7CB-3E80-4DBB-8854-FF5C012BA0FA",
"versionEndExcluding": "6.9.10-50",
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1601 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [ Y ] I have written a descriptive issue title
- [ Y ] I have verified that I am using the latest version of ImageMagick
- [ Y ] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) iss... | Memory leak in ReadPSImage in coder/ps.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1601/comments | 2 | 2019-06-18T11:02:58Z | 2019-07-03T01:31:05Z | https://github.com/ImageMagick/ImageMagick/issues/1601 | 457,404,400 | 1,601 |
CVE-2018-14866 | 2019-07-03T18:15:10.317 | Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32509"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32509 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-9
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
**... | [SEC] ODOO-SA-2018-08-07-9 (CVE-2018-14866) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32509/comments | 0 | 2019-04-08T13:37:46Z | 2019-04-08T13:37:49Z | https://github.com/odoo/odoo/issues/32509 | 430,456,694 | 32,509 |
CVE-2018-14861 | 2019-07-03T19:15:10.503 | Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32506"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/odoo/odoo/issues/32506 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-6
Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users.
**Affects**: Odoo 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Od... | [SEC] ODOO-SA-2018-08-07-6 (CVE-2018-14861) - Improper data access control in... | https://api.github.com/repos/odoo/odoo/issues/32506/comments | 0 | 2019-04-08T13:37:39Z | 2019-04-08T13:37:41Z | https://github.com/odoo/odoo/issues/32506 | 430,456,630 | 32,506 |
CVE-2018-14862 | 2019-07-03T19:15:10.580 | Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32504"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32504 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-4
Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterp... | [SEC] ODOO-SA-2018-08-07-4 (CVE-2018-14862) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32504/comments | 0 | 2019-04-08T13:37:34Z | 2019-04-08T13:37:36Z | https://github.com/odoo/odoo/issues/32504 | 430,456,583 | 32,504 |
CVE-2018-14863 | 2019-07-03T19:15:10.643 | Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32508"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32508 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-8
Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
**Component**: Odoo Frame... | [SEC] ODOO-SA-2018-08-07-8 (CVE-2018-14863) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32508/comments | 0 | 2019-04-08T13:37:44Z | 2019-04-08T13:37:45Z | https://github.com/odoo/odoo/issues/32508 | 430,456,676 | 32,508 |
CVE-2018-14864 | 2019-07-03T19:15:10.707 | Incorrect access control in asset bundles in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32502"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:community:*:*:*",
"matchCriteriaId": "705E446A-98DC-43D6-905A-F52E3FDCAF48",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32502 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-2
Incorrect access control in asset bundles in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows remote authenticated users to inject arbitrary web script via a crafted attachment.
**Affects**: Odoo 8.0, 9.0, 10.0 (Community and Enterprise Editions)
*... | [SEC] ODOO-SA-2018-08-07-2 (CVE-2018-14864) - Incorrect access control in ass... | https://api.github.com/repos/odoo/odoo/issues/32502/comments | 0 | 2019-04-08T13:37:25Z | 2019-04-08T13:37:30Z | https://github.com/odoo/odoo/issues/32502 | 430,456,495 | 32,502 |
CVE-2018-14865 | 2019-07-03T19:15:10.767 | Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32501"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32501 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-1
Report engine in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
**Affects**: Odoo 9.0, 10.0, 11.0 (Community and Enterprise Editions)
*... | [SEC] ODOO-SA-2018-08-07-1 (CVE-2018-14865) - Report engine in Odoo Community... | https://api.github.com/repos/odoo/odoo/issues/32501/comments | 0 | 2019-04-08T13:37:23Z | 2019-04-08T13:37:25Z | https://github.com/odoo/odoo/issues/32501 | 430,456,471 | 32,501 |
CVE-2018-14859 | 2019-07-03T20:15:10.777 | Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32510"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/odoo/odoo/issues/32510 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-10
Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token.
**Affects**: Odoo 9.0, 10.0, 11... | [SEC] ODOO-SA-2018-08-07-10 (CVE-2018-14859) - Incorrect access control in the... | https://api.github.com/repos/odoo/odoo/issues/32510/comments | 0 | 2019-04-08T13:37:50Z | 2019-04-08T13:37:51Z | https://github.com/odoo/odoo/issues/32510 | 430,456,723 | 32,510 |
CVE-2018-14860 | 2019-07-03T20:15:10.837 | Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/odoo/odoo/issues/32505"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"matchCriteriaId": "D9126A1A-FA35-4127-91B3-A3FA8B26FABB",
"versionEndExcluding": null,
"versionEndIncluding": "11.0",
"versionStartExclud... | https://github.com/odoo/odoo/issues/32505 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"odoo",
"odoo"
] | # Security Advisory - ODOO-SA-2018-08-07-5
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system.
**Affects**: Odo... | [SEC] ODOO-SA-2018-08-07-5 (CVE-2018-14860) - Improper sanitization of dynami... | https://api.github.com/repos/odoo/odoo/issues/32505/comments | 0 | 2019-04-08T13:37:37Z | 2019-04-08T14:38:16Z | https://github.com/odoo/odoo/issues/32505 | 430,456,607 | 32,505 |
CVE-2019-13238 | 2019-07-04T14:15:10.853 | An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/396"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/396 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | A memory allocation failure unhandled in Ap4SdpAtom.cpp and leads to crashes.
`./mp42aac input_file /dev/null`
In file Source/C++/Core/Ap4SdpAtom.cpp
<img width="640" alt="image" src="https://user-images.githubusercontent.com/7632714/58334121-73c1dd80-7e71-11e9-88a2-c9fbd2129068.png">
AP4_SdpAtom allocate a n... | Exhaustive memory misunhandle | https://api.github.com/repos/axiomatic-systems/Bento4/issues/396/comments | 0 | 2019-05-24T14:17:26Z | 2019-08-25T16:31:09Z | https://github.com/axiomatic-systems/Bento4/issues/396 | 448,195,676 | 396 |
CVE-2019-13295 | 2019-07-05T01:15:09.907 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1608 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1608/comments | 2 | 2019-06-21T05:58:31Z | 2019-07-08T01:48:18Z | https://github.com/ImageMagick/ImageMagick/issues/1608 | 459,023,037 | 1,608 |
CVE-2019-13296 | 2019-07-05T01:15:09.983 | ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1604 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | Direct memory leaks in AcquireMagickMemory and indirect memory leaks | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1604/comments | 2 | 2019-06-18T17:22:26Z | 2019-07-08T01:48:39Z | https://github.com/ImageMagick/ImageMagick/issues/1604 | 457,603,906 | 1,604 |
CVE-2019-13297 | 2019-07-05T01:15:10.047 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1609 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow at MagickCore/threshold.c:328:11 in AdaptiveThresholdImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1609/comments | 2 | 2019-06-21T06:02:04Z | 2019-07-08T01:48:56Z | https://github.com/ImageMagick/ImageMagick/issues/1609 | 459,024,141 | 1,609 |
CVE-2019-13298 | 2019-07-05T01:15:10.110 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1611 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1611/comments | 2 | 2019-06-21T06:07:48Z | 2019-07-08T01:49:17Z | https://github.com/ImageMagick/ImageMagick/issues/1611 | 459,025,805 | 1,611 |
CVE-2019-13299 | 2019-07-05T01:15:10.187 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1610 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1610/comments | 6 | 2019-06-21T06:05:24Z | 2019-10-25T13:50:32Z | https://github.com/ImageMagick/ImageMagick/issues/1610 | 459,025,122 | 1,610 |
CVE-2019-13300 | 2019-07-05T01:15:10.250 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1586 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in MagickCore/statistic.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586/comments | 3 | 2019-06-10T15:57:48Z | 2019-07-08T01:49:56Z | https://github.com/ImageMagick/ImageMagick/issues/1586 | 454,242,285 | 1,586 |
CVE-2019-13301 | 2019-07-05T01:15:10.297 | ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1585 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | memory leaks in AcquireMagickMemory of MagickCore/memory.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1585/comments | 5 | 2019-06-10T14:34:22Z | 2019-10-05T02:53:40Z | https://github.com/ImageMagick/ImageMagick/issues/1585 | 454,202,041 | 1,585 |
CVE-2019-13301 | 2019-07-05T01:15:10.297 | ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1589 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-use-after-free in MagickCore/resize.c and double-free in RelinquishAlignedMemory of MagickCore/memory.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1589/comments | 11 | 2019-06-11T05:31:32Z | 2019-07-09T13:21:32Z | https://github.com/ImageMagick/ImageMagick/issues/1589 | 454,487,713 | 1,589 |
CVE-2019-13302 | 2019-07-05T01:15:10.373 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1597 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1597/comments | 2 | 2019-06-17T03:51:17Z | 2019-07-08T01:50:56Z | https://github.com/ImageMagick/ImageMagick/issues/1597 | 456,730,033 | 1,597 |
CVE-2019-13303 | 2019-07-05T01:15:10.437 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/d29148fa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1603 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1603/comments | 2 | 2019-06-18T17:08:25Z | 2019-07-08T01:51:18Z | https://github.com/ImageMagick/ImageMagick/issues/1603 | 457,598,033 | 1,603 |
CVE-2019-13304 | 2019-07-05T01:15:10.500 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1614 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1614/comments | 4 | 2019-06-21T06:36:50Z | 2019-08-10T11:27:40Z | https://github.com/ImageMagick/ImageMagick/issues/1614 | 459,035,202 | 1,614 |
CVE-2019-13305 | 2019-07-05T01:15:10.563 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1613 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | stack-buffer-overflow at coders/pnm.c:1906 in WritePNMImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1613/comments | 2 | 2019-06-21T06:23:44Z | 2019-07-08T01:52:06Z | https://github.com/ImageMagick/ImageMagick/issues/1613 | 459,030,453 | 1,613 |
CVE-2019-13306 | 2019-07-05T01:15:10.623 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1612 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | stack-buffer-overflow at coders/pnm.c:1902 in WritePNMImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1612/comments | 2 | 2019-06-21T06:13:39Z | 2019-07-08T01:52:26Z | https://github.com/ImageMagick/ImageMagick/issues/1612 | 459,027,438 | 1,612 |
CVE-2019-13307 | 2019-07-05T01:15:10.687 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1615 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow at MagickCore/statistic.c:559:43 in EvaluateImages | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1615/comments | 6 | 2019-06-22T02:11:22Z | 2019-08-10T11:30:08Z | https://github.com/ImageMagick/ImageMagick/issues/1615 | 459,421,750 | 1,615 |
CVE-2019-13308 | 2019-07-05T01:15:10.750 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/61135001... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1595 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in MagickCore/fourier.c:299:18 in ComplexImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1595/comments | 3 | 2019-06-17T02:21:01Z | 2019-08-13T11:59:01Z | https://github.com/ImageMagick/ImageMagick/issues/1595 | 456,713,579 | 1,595 |
CVE-2019-13309 | 2019-07-05T01:15:10.813 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/ImageMagick/Image... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1616 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | memory leaks is detected at AcquireMagickMemory | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1616/comments | 2 | 2019-06-23T08:45:54Z | 2019-07-08T01:55:00Z | https://github.com/ImageMagick/ImageMagick/issues/1616 | 459,551,673 | 1,616 |
CVE-2019-13311 | 2019-07-05T01:15:10.937 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1623 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | memory leaks is detected at AcquireMagickMemory | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1623/comments | 3 | 2019-07-01T18:19:43Z | 2019-07-08T10:31:06Z | https://github.com/ImageMagick/ImageMagick/issues/1623 | 462,846,647 | 1,623 |
CVE-2019-13391 | 2019-07-07T22:15:10.503 | In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-50:q16:*:*:*:*:*:*",
"matchCriteriaId": "25CCEA99-8329-46C6-9625-4FE15F24CF69",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1588 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in MagickCore/fourier.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1588/comments | 7 | 2019-06-11T03:25:05Z | 2019-07-08T01:55:44Z | https://github.com/ImageMagick/ImageMagick/issues/1588 | 454,462,914 | 1,588 |
CVE-2018-11307 | 2019-07-09T16:15:12.807 | An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0782"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1822"
},
{
"source"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | https://github.com/FasterXML/jackson-databind/issues/2032 | [
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | A new potential gadget type from MyBatis (https://github.com/mybatis/mybatis-3) has been reported. It may allow content exfiltration (remote access by sending contents over ftp) when untrusted content is deserialized with default typing enabled.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-w... | Block one more gadget type (mybatis, CVE-2018-11307) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2032/comments | 4 | 2018-05-10T04:23:03Z | 2020-12-02T04:03:22Z | https://github.com/FasterXML/jackson-databind/issues/2032 | 321,805,044 | 2,032 |
CVE-2019-13454 | 2019-07-09T17:15:11.850 | ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-54:q16:*:*:*:*:*:*",
"matchCriteriaId": "9A2BD25B-C7E9-4B57-BF88-0C86D9D3C318",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1629 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | Division by Zero at MagickCore/layer.c:1616 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1629/comments | 4 | 2019-07-07T02:34:55Z | 2019-08-18T16:37:24Z | https://github.com/ImageMagick/ImageMagick/issues/1629 | 464,908,207 | 1,629 |
CVE-2019-1010062 | 2019-07-16T13:15:11.410 | PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "josh@bress.net",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/commit/09f0ab871bf633973cfd9fc4fe59d4a912397cf8"
},
{
"source": "josh@bress.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluckcms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "864B3716-962D-4BC2-8A56-E483D47AB4B7",
"versionEndExcluding": null,
"versionEndIncluding": "4.7.4",
"versionStartExcl... | https://github.com/pluck-cms/pluck/issues/44 | [
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | Hi! I found a Unrestricted File Upload Vulnerability on PluckCMS 4.7.4.
I found i can bypass the filetype detection on background site by modifying the MIME type on HTTP request. And with uploading a PHP File, i can get a webshell.

Please fix it ASAP ... | [Vulnerability] Unrestricted File Upload in background site | https://api.github.com/repos/pluck-cms/pluck/issues/44/comments | 2 | 2017-04-11T17:52:00Z | 2018-09-03T08:40:42Z | https://github.com/pluck-cms/pluck/issues/44 | 221,030,477 | 44 |
CVE-2019-13617 | 2019-07-16T17:15:12.753 | njs through 0.3.3, used in NGINX, has a heap-based buffer over-read in nxt_vsprintf in nxt/nxt_sprintf.c during error handling, as demonstrated by an njs_regexp_literal call that leads to an njs_parser_lexer_error call and then an njs_parser_scope_error call. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15093"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A12AFA-F1E5-4E07-B86C-A6CC93CD2081",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.3",
"versionStartExcluding": null... | https://github.com/nginx/njs/issues/174 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nginx",
"njs"
] | Hello, I am shuoz of alpha lab of topsec. I fuzz njs and found a heap overflow bug.
./njs ./tmp.js
```
fuzz@fuzz:~/Desktop/fuzzproject/njs/build$ ./njs ./tmp.js
INFO: Seed: 2208882516
INFO: Loaded 1 modules (8780 guards): [0x8a15a0, 0x8a9ed0),
./njs: Running 1 inputs 1 time(s) each.
Running: crash-0c9fced77... | heap-buffer-overflow in nxt_sprintf.c:429 | https://api.github.com/repos/nginx/njs/issues/174/comments | 3 | 2019-06-03T14:46:39Z | 2019-08-26T16:01:44Z | https://github.com/nginx/njs/issues/174 | 451,525,498 | 174 |
CVE-2019-13618 | 2019-07-16T17:15:12.830 | In GPAC before 0.8.0, isomedia/isom_read.c in libgpac.a has a heap-based buffer over-read, as demonstrated by a crash in gf_m2ts_sync in media_tools/mpegts.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/compare/440d475...6b4ab40"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8",
"versionEndExcluding": "0.8.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1250 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | hello,I found a heap buffer overflow bug in gpac.
[bug details](http://blog.topsec.com.cn/gpac-heap-buffer-overflow-in-gf_m2ts_sync/)
[heap-over-flow.zip](https://github.com/gpac/gpac/files/3251236/heap-over-flow.zip)
| heap buffer overflow in gf_m2ts_sync | https://api.github.com/repos/gpac/gpac/issues/1250/comments | 1 | 2019-06-04T08:09:07Z | 2019-06-24T15:28:33Z | https://github.com/gpac/gpac/issues/1250 | 451,854,770 | 1,250 |
CVE-2019-13959 | 2019-07-18T19:15:11.520 | In Bento4 1.5.1-627, AP4_DataBuffer::SetDataSize does not handle reallocation failures, leading to a memory copy into a NULL pointer. This is different from CVE-2018-20186. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/394"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*",
"matchCriteriaId": "F87642DF-B939-4195-A2AE-F0F1D39CD16D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/394 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | Hi, recently when I experience the new version of bento4. I find an NPD bug in program "mp42aac".
`./mp42acc inputs`
The bug logic is that when the data size is not large enough and apply reallocation, the reallocation does not check whether the new buffer is successfully allocated.
This is the execution trace.
... | Null Pointer Dereference(npd) Bug | https://api.github.com/repos/axiomatic-systems/Bento4/issues/394/comments | 1 | 2019-05-14T06:23:56Z | 2019-08-25T16:30:37Z | https://github.com/axiomatic-systems/Bento4/issues/394 | 443,731,009 | 394 |
CVE-2019-1010176 | 2019-07-25T14:15:11.623 | JerryScript commit 4e58ccf68070671e1fff5cd6673f0c1d5b80b166 is affected by: Buffer Overflow. The impact is: denial of service and possibly arbitrary code execution. The component is: function lit_char_to_utf8_bytes (jerry-core/lit/lit-char-helpers.c:377). The attack vector is: executing crafted javascript code. The fix... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "josh@bress.net",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/2476"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9175A295-03A6-4FB2-8F80-11BCB454D8A6",
"versionEndExcluding": "2.0",
"versionEndIncluding": null,
"versionStartE... | https://github.com/jerryscript-project/jerryscript/issues/2476 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | Version:
4e58ccf68070671e1fff5cd6673f0c1d5b80b166
Build command:
`python3 ./tools/build.py --clean --jerry-libc=off --system-allocator=on --profile=es2015-subset --compile-flag=-m32 --compile-flag=-fsanitize=address --strip=OFF`
Testcase:
`cat testcase | ./jerry`
Where testcase is as following:
```
0
/ð/... | Heap buffer overflow in lit_char_to_utf8_bytes | https://api.github.com/repos/jerryscript-project/jerryscript/issues/2476/comments | 0 | 2018-08-16T15:19:04Z | 2018-08-21T04:53:56Z | https://github.com/jerryscript-project/jerryscript/issues/2476 | 351,251,936 | 2,476 |
CVE-2019-14268 | 2019-07-25T16:15:13.260 | In Octopus Deploy versions 3.0.19 to 2019.7.2, when a web request proxy is configured, an authenticated user (in certain limited circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 2019.7.3. The fix was back-ported to LTS 2019.6.5 as ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/5739"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17BFCFB1-B174-4F17-BD8A-D8664AF4B397",
"versionEndExcluding": null,
"versionEndIncluding": "2019.7.2",
"versionSt... | https://github.com/OctopusDeploy/Issues/issues/5739 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | Relates to: OctopusDeploy/OctopusDeploy#4112.
# Prerequisites
- [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy).
- [x] I have raised a CVE according to ou... | Proxy password may be logged in clear text in certain circumstances | https://api.github.com/repos/OctopusDeploy/Issues/issues/5739/comments | 3 | 2019-07-25T01:42:06Z | 2019-10-24T00:11:58Z | https://github.com/OctopusDeploy/Issues/issues/5739 | 472,623,907 | 5,739 |
CVE-2019-14295 | 2019-07-27T19:15:12.050 | An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/issues/286"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/upx/upx/issues/286 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | <!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## What's the problem (or question)?
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggest... | Integer-overflow in function getElfSections at p_vmlinx.cpp:119 | https://api.github.com/repos/upx/upx/issues/286/comments | 7 | 2019-07-19T06:15:54Z | 2022-09-14T06:46:05Z | https://github.com/upx/upx/issues/286 | 470,156,643 | 286 |
CVE-2019-14296 | 2019-07-27T19:15:12.097 | canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00003.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00007.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*",
"matchCriteriaId": "7986910F-E5B0-488F-813B-D6B4367F16F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/upx/upx/issues/287 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | <!---
IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE.
Just read it and fill in the details we're asking, it saves so much of our time. Thanks!
-->
## What's the problem (or question)?
<!--- If describing a bug, tell us what happens instead of the expected behavior -->
<!--- If suggest... | canUnpack@p_vmlinx.cpp:583___buffer-overflow | https://api.github.com/repos/upx/upx/issues/287/comments | 2 | 2019-07-19T06:25:38Z | 2019-07-30T09:33:45Z | https://github.com/upx/upx/issues/287 | 470,159,542 | 287 |
CVE-2019-14368 | 2019-07-28T19:15:10.903 | Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in rafimage.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/952"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/Exiv2/exiv2/issues/952 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
in my research , a heap overflow found in RafImage::readMetadata rafimage.cpp:296.
**To Reproduce**
exiv2 -pv $poc
[exiv2poc.zip](https://github.com/Exiv2/exiv2/files/3384707/exiv2poc.zip)
**Expected behavior**
```
root@ubuntu:~/fuzz/exiv2# /home/tim/exiv2-asan/build/bin/exiv2 /home/t... | AddressSanitizer: heap-buffer-overflow in RafImage::readMetadata | https://api.github.com/repos/Exiv2/exiv2/issues/952/comments | 4 | 2019-07-12T02:22:41Z | 2019-07-29T16:51:35Z | https://github.com/Exiv2/exiv2/issues/952 | 467,188,161 | 952 |
CVE-2019-14369 | 2019-07-28T19:15:10.983 | Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/953"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/Exiv2/exiv2/issues/953 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
in my research , a heap overflow found in Exiv2::readChunk(Exiv2::DataBuf&, Exiv2::BasicIo&) /src/pngimage.cpp:410.
**To Reproduce**
exiv2 -pv $poc
[poc.zip](https://github.com/Exiv2/exiv2/files/3384823/poc.zip)
**Expected behavior**
```
=============================================... | AddressSanitizer: heap-buffer-overflow in PngImage::readMetadata() pngimage.cpp:438 | https://api.github.com/repos/Exiv2/exiv2/issues/953/comments | 8 | 2019-07-12T03:07:03Z | 2019-07-22T09:21:12Z | https://github.com/Exiv2/exiv2/issues/953 | 467,198,124 | 953 |
CVE-2019-14370 | 2019-07-28T19:15:11.030 | In Exiv2 0.27.99.0, there is an out-of-bounds read in Exiv2::MrwImage::readMetadata() in mrwimage.cpp. It could result in denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Exiv2/exiv2/issues/954"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:exiv2:exiv2:0.27.99.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5688A15-F378-451E-9D5B-44082AC687E3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/Exiv2/exiv2/issues/954 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Exiv2",
"exiv2"
] | **Describe the bug**
in my research , a heap overflow found in Exiv2::MrwImage::readMetadata() /home/tim/exiv2-asan/src/mrwimage.cpp:131.
**To Reproduce**
exiv2 -pv $poc
[poc1.zip](https://github.com/Exiv2/exiv2/files/3385271/poc1.zip)
**Expected behavior**
```
asan output
rASAN:DEADLYSIGNAL
==========... | heap-buffer-overflow in Exiv2::MrwImage::readMetadata() | https://api.github.com/repos/Exiv2/exiv2/issues/954/comments | 4 | 2019-07-12T06:36:56Z | 2019-07-22T09:36:16Z | https://github.com/Exiv2/exiv2/issues/954 | 467,246,598 | 954 |
CVE-2019-14379 | 2019-07-29T12:15:16.633 | SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Mar/23"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHBA-2019:2824"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD",
"versionEndExcluding": "2.6.7.3",
"versionEndIncluding": null,
"versio... | https://github.com/FasterXML/jackson-databind/issues/2387 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type reported regarding a class of ehcache package.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
-----
Fixed in:
* 2.9.10
* 2.8.11.4
* 2.7.9.6
* 2.6.7.3
| Block one more gadget type (ehcache, CVE-2019-14379) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2387/comments | 4 | 2019-07-23T06:28:01Z | 2019-10-16T04:54:58Z | https://github.com/FasterXML/jackson-databind/issues/2387 | 471,508,431 | 2,387 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.