cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
48
2.08k
cve_metrics
dict
cve_references
listlengths
1
138
cve_configurations
listlengths
1
39
url
stringlengths
37
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
56
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
37
62
issue_github_id
int64
104M
2.09B
issue_number
int64
1
122k
CVE-2019-14439
2019-07-30T11:15:11.123
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ff...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2389
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type report regarding logback/JNDI. Mitre id: CVE-2019-14439 Reporter: xiexq@knownsec.com (Badcode of Knownsec 404 Team) ----- Fixed in: * 2.9.10 * 2.8.11.4 * 2.7.9.6 * 2.6.7.3
Block one more gadget type (logback, CVE-2019-14439)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2389/comments
8
2019-07-24T18:19:41Z
2019-10-16T04:55:27Z
https://github.com/FasterXML/jackson-databind/issues/2389
472,427,288
2,389
CVE-2019-14525
2019-08-05T12:15:11.957
In Octopus Deploy 2019.4.0 through 2019.6.x before 2019.6.6, and 2019.7.x before 2019.7.6, an authenticated system administrator is able to view sensitive values by visiting a server configuration page or making an API call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5753" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5754" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5A2242-AD63-4351-88F3-3126F21481F0", "versionEndExcluding": "2019.6.6", "versionEndIncluding": null, "versionSt...
https://github.com/OctopusDeploy/Issues/issues/5753
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# The bug A couple of values aren't being correctly handled as sensitive on one of the server configuration APIs/pages. Relates to OctopusDeploy/OctopusDeploy#4178
Fix some sensitive value handling in the server config API/portal UI - LTS
https://api.github.com/repos/OctopusDeploy/Issues/issues/5753/comments
2
2019-08-02T02:16:28Z
2020-05-18T06:38:28Z
https://github.com/OctopusDeploy/Issues/issues/5753
475,964,410
5,753
CVE-2019-14525
2019-08-05T12:15:11.957
In Octopus Deploy 2019.4.0 through 2019.6.x before 2019.6.6, and 2019.7.x before 2019.7.6, an authenticated system administrator is able to view sensitive values by visiting a server configuration page or making an API call.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5753" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5754" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A5A2242-AD63-4351-88F3-3126F21481F0", "versionEndExcluding": "2019.6.6", "versionEndIncluding": null, "versionSt...
https://github.com/OctopusDeploy/Issues/issues/5754
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# The bug A couple of values aren't being correctly handled as sensitive on one of the server configuration APIs/pages. Relates to OctopusDeploy/OctopusDeploy#4178
Fix some sensitive value handling in the server config API/portal UI
https://api.github.com/repos/OctopusDeploy/Issues/issues/5754/comments
4
2019-08-02T02:34:17Z
2019-11-04T01:34:26Z
https://github.com/OctopusDeploy/Issues/issues/5754
475,968,258
5,754
CVE-2019-14981
2019-08-12T23:15:11.600
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "26AC6455-68F9-418E-B71A-3E9A35155603", "versionEndExcluding": "6.9.10-41", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1552
[ "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
MagickCore/feature.c In line 2259, it assgin 'count=0', the code make a loop as 'for (v=(-((ssize_t) height/2)); v <= (((ssize_t) height/2)); v++)' , the 'count++' in this loop and the 'gamma=1.0/count' in line 2291. But the count is 0 in some cases. It may happen DIVIDE_BY_ZERO bug if the code don't get in this l...
DIVIDE_BY_ZERO in feature.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1552/comments
2
2019-04-18T06:16:56Z
2019-08-18T16:30:47Z
https://github.com/ImageMagick/ImageMagick/issues/1552
434,607,141
1,552
CVE-2019-14982
2019-08-12T23:15:11.663
In Exiv2 before v0.27.2, there is an integer overflow vulnerability in the WebPImage::getHeaderOffset function in webpimage.cpp. It can lead to a buffer overflow vulnerability and a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/compare/v0.27.2-RC2...v0.27.2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A0D0423-EA55-4C2F-8CC8-25E5B9F875A6", "versionEndExcluding": "0.27.2", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Exiv2/exiv2/issues/960
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**Describe the bug** I found a buffer overflow bugs in exiv2/src/webpimage.cpp:837 due to integer overflow. **To Reproduce** Steps to reproduce the behaviour: exiv2/build/bin/exiv2 exiv2_getHeaderOffset.poc **Expected behavior** In Exiv2::WebPImage::getHeaderOffset, integer overflow occurs when data_size is les...
buffer overflow in exiv2/src/webpimage.cpp
https://api.github.com/repos/Exiv2/exiv2/issues/960/comments
4
2019-07-15T02:53:48Z
2019-10-28T11:28:20Z
https://github.com/Exiv2/exiv2/issues/960
467,920,688
960
CVE-2019-14809
2019-08-13T21:15:11.427
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBD0F192-5A67-48E9-9C1E-4A23148A3837", "versionEndExcluding": "1.11.13", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/golang/go/issues/29098
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
<!-- Please answer these questions before submitting your issue. Thanks! --> ### What version of Go are you using (`go version`)? <pre> $ go version go version go1.11.2 windows/amd64 </pre> ### Does this issue reproduce with the latest release? Yes ### What operating system and processor architecture ...
net/url: URL.Parse Multiple Parsing Issues
https://api.github.com/repos/golang/go/issues/29098/comments
36
2018-12-04T17:21:41Z
2022-06-23T06:24:09Z
https://github.com/golang/go/issues/29098
387,395,190
29,098
CVE-2019-15058
2019-08-14T21:15:13.687
stb_image.h (aka the stb image loader) 2.23 has a heap-based buffer over-read in stbi__tga_load, leading to Information Disclosure or Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934973" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/790" }, { "source": "cve@mitr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stb_project:stb:2.23:*:*:*:*:*:*:*", "matchCriteriaId": "FAC51233-5119-4F4E-B6DF-E29385B6E5D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/nothings/stb/issues/790
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
I find heap-buffer-overflow in stbi__tga_load with lastest version: 2.23 POC: ``` #define STBI_WINDOWS_UTF8 #define STB_IMAGE_WRITE_IMPLEMENTATION #include "stb_image_write.h" #define STB_IMAGE_IMPLEMENTATION #include "stb_image.h" #define STB_DEFINE #include "stb.h" #include<stdio.h> #include<stdlib.h> uns...
heap-buffer-overflow and denial-of-service in stbi__tga_load with version: 2.23
https://api.github.com/repos/nothings/stb/issues/790/comments
4
2019-08-13T08:52:36Z
2021-07-03T04:54:20Z
https://github.com/nothings/stb/issues/790
480,036,373
790
CVE-2019-15139
2019-08-18T19:15:09.637
The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-41:q16:*:*:*:*:*:*", "matchCriteriaId": "34C2A939-19C7-4BC0-8DE5-E3D612C99B0E", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1553
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
AddressSanitizer: Invalid read at xwd.c:573
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1553/comments
2
2019-04-20T13:04:54Z
2019-08-19T11:08:05Z
https://github.com/ImageMagick/ImageMagick/issues/1553
435,396,971
1,553
CVE-2019-15140
2019-08-18T19:15:09.700
coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1554
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
AddressSanitizer: heap-use-after-free at constitute.c:659
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1554/comments
2
2019-04-27T07:14:42Z
2019-08-19T11:07:29Z
https://github.com/ImageMagick/ImageMagick/issues/1554
437,915,586
1,554
CVE-2019-15141
2019-08-18T19:15:09.760
WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1560
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
AddressSanitizer: heap-buffer-overflow at coders/tiff.c:4324
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1560/comments
2
2019-04-28T11:01:35Z
2019-09-17T04:41:56Z
https://github.com/ImageMagick/ImageMagick/issues/1560
438,043,984
1,560
CVE-2019-15228
2019-08-20T00:15:10.050
FUEL CMS 1.4.4 has XSS in the Create Blocks section of the Admin console. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/536" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.sevenlayers.com/in...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF0C1B1B-6CDB-4E57-9F75-DE409B61F69F", "versionEndExcluding": null, "versionEndIncluding": "1.4.4", "versionS...
https://github.com/daylightstudio/FUEL-CMS/issues/536
[ "Exploit", "Third Party Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
![image001](https://user-images.githubusercontent.com/54193091/63215529-d6c3b900-c0dc-11e9-841d-040f7b4923cb.jpg) ![image002](https://user-images.githubusercontent.com/54193091/63215531-dcb99a00-c0dc-11e9-8a6b-2ccdc4ff1ee1.jpg) ![image003](https://user-images.githubusercontent.com/54193091/63215533-e17e4e00-c0dc-...
XSS and CSRF in Blocks
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/536/comments
0
2019-08-17T17:52:01Z
2021-05-14T14:00:24Z
https://github.com/daylightstudio/FUEL-CMS/issues/536
481,910,543
536
CVE-2019-15507
2019-08-23T06:15:10.443
In Octopus Deploy versions 2018.8.4 to 2019.7.6, when a web request proxy is configured, an authenticated user (in certain limited special-characters circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 2019.7.7. The fix was back-porte...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5761" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDFC4407-48AB-48BB-A88B-B33E82D6A47C", "versionEndExcluding": null, "versionEndIncluding": "2019.7.6", "versionStartExclu...
https://github.com/OctopusDeploy/Issues/issues/5761
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [ ] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
TentacleProxyPassword logged in clear text if $env:HTTP_PROXY is printed and password contains special characters
https://api.github.com/repos/OctopusDeploy/Issues/issues/5761/comments
1
2019-08-06T00:33:17Z
2019-11-21T06:34:39Z
https://github.com/OctopusDeploy/Issues/issues/5761
477,113,059
5,761
CVE-2019-15508
2019-08-23T06:15:10.540
In Octopus Tentacle versions 3.0.8 to 5.0.0, when a web request proxy is configured, an authenticated user (in certain limited OctopusPrintVariables circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 5.0.1. The fix was back-ported to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5750" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A4E0CD9-F285-47B0-9CAF-426FAE6570CF", "versionEndExcluding": null, "versionEndIncluding": "2019.7.6", "versionStartExclu...
https://github.com/OctopusDeploy/Issues/issues/5750
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
Tentacle TentacleProxyPassword logged in clear text when OctopusPrintVariables is set
https://api.github.com/repos/OctopusDeploy/Issues/issues/5750/comments
1
2019-08-01T23:06:46Z
2020-01-28T11:14:29Z
https://github.com/OctopusDeploy/Issues/issues/5750
475,925,843
5,750
CVE-2019-15698
2019-08-27T17:15:11.210
In Octopus Deploy 2019.7.3 through 2019.7.9, in certain circumstances, an authenticated user with VariableView permissions could view sensitive values. This is fixed in 2019.7.10.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5810" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "728B7DEA-1D45-48B2-89BF-CEBE84D9C208", "versionEndExcluding": null, "versionEndIncluding": "2019.7.9", "versionSt...
https://github.com/OctopusDeploy/Issues/issues/5810
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
Sensitive values may be exposed in some circumstances via variable preview - CVE-2019-15698
https://api.github.com/repos/OctopusDeploy/Issues/issues/5810/comments
3
2019-08-27T06:16:15Z
2019-11-26T00:34:27Z
https://github.com/OctopusDeploy/Issues/issues/5810
485,605,484
5,810
CVE-2019-11245
2019-08-29T01:15:11.147
In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit runAsUser attempt to run as uid 0 (root) on container restart, or if the image was previously pulled to the node. If the pod specified mustRunAsNonRoot: true, the kubelet will refuse to start the container as root. If the pod did not sp...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/78308" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20190919-000...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.13.6:*:*:*:*:*:*:*", "matchCriteriaId": "91091DC9-FC24-41B5-BABC-0578CFC6ACBC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/78308
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
[CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L), 4.9 (medium) In kubelet v1.13.6 and v1.14.2, containers for pods that do not specify an explicit `runAsUser` attempt to run as uid 0 (root) on container restart, or if the image was...
CVE-2019-11245: v1.14.2, v1.13.6: container uid changes to root after first restart or if image is already pulled to the node
https://api.github.com/repos/kubernetes/kubernetes/issues/78308/comments
18
2019-05-24T16:14:49Z
2022-10-14T02:07:10Z
https://github.com/kubernetes/kubernetes/issues/78308
448,249,782
78,308
CVE-2019-11247
2019-08-29T01:15:11.287
The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resourc...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2816" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2824" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A582FE75-D84B-4C8F-B836-95FB15F68EBA", "versionEndExcluding": null, "versionEndIncluding": "1.12.10", "versionStar...
https://github.com/kubernetes/kubernetes/issues/80983
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
[CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) The API server mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in th...
CVE-2019-11247: API server allows access to custom resources via wrong scope
https://api.github.com/repos/kubernetes/kubernetes/issues/80983/comments
10
2019-08-05T12:44:08Z
2022-05-16T21:58:20Z
https://github.com/kubernetes/kubernetes/issues/80983
476,838,684
80,983
CVE-2019-11248
2019-08-29T01:15:11.367
The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. The go pprof endpoint is exposed over the Kubelet's healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "jordan@liggitt.net", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/81023" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.go...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF491B76-31AF-401F-BDCA-2B825BD00B18", "versionEndExcluding": "1.12.10", "versionEndIncluding": null, "versionStar...
https://github.com/kubernetes/kubernetes/issues/81023
[ "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
The debugging endpoint `/debug/pprof` is exposed over the unauthenticated Kubelet healthz port. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration. If you are exposed we recommend upgrading to at least one of the versions lis...
CVE-2019-11248: /debug/pprof exposed on kubelet's healthz port
https://api.github.com/repos/kubernetes/kubernetes/issues/81023/comments
3
2019-08-06T14:34:33Z
2022-05-16T21:58:38Z
https://github.com/kubernetes/kubernetes/issues/81023
477,418,481
81,023
CVE-2019-11249
2019-08-29T01:15:11.443
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2794" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHBA-2019:2816" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABCFC052-EAAD-4964-8B50-1D8A04A73D75", "versionEndExcluding": null, "versionEndIncluding": "1.12.10", "versionStar...
https://github.com/kubernetes/kubernetes/issues/80984
[ "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
[CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N) A third issue was discovered with the Kubernetes `kubectl cp` command that could enable a directory traversal such that a malicious container could replace or create files on a user’...
CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal
https://api.github.com/repos/kubernetes/kubernetes/issues/80984/comments
3
2019-08-05T12:44:23Z
2022-05-16T21:57:50Z
https://github.com/kubernetes/kubernetes/issues/80984
476,838,777
80,984
CVE-2019-11250
2019-08-29T01:15:11.523
The Kubernetes client-go library logs request headers at verbosity levels of 7 or higher. This can disclose credentials to unauthorized users via logs or command output. Kubernetes components (such as kube-apiserver) prior to v1.16.0, which make use of basic or bearer token authentication, and run at high verbosity lev...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2020/10/16/2" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4052" }, { "source": "jordan@ligg...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "470C9C75-4582-4D15-8B34-07889BF9C24F", "versionEndExcluding": "1.15.3", "versionEndIncluding": null, "versionStart...
https://github.com/kubernetes/kubernetes/issues/81114
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
This issue was reported in the [Kubernetes Security Audit Report](https://github.com/kubernetes/community/blob/master/wg-security-audit/findings/Kubernetes%20Final%20Report.pdf) **Description** Kubernetes requires an authentication mechanism to enforce users’ privileges. One method of authentication, bearer tokens,...
CVE-2019-11250: TOB-K8S-001: Bearer tokens are revealed in logs
https://api.github.com/repos/kubernetes/kubernetes/issues/81114/comments
15
2019-08-08T02:03:04Z
2023-09-21T12:52:47Z
https://github.com/kubernetes/kubernetes/issues/81114
478,213,865
81,114
CVE-2019-15758
2019-08-29T02:15:10.553
An issue was discovered in Binaryen 1.38.32. Missing validation rules in asmjs/asmangle.cpp can lead to an Assertion Failure at wasm/wasm.cpp in wasm::asmangle. A crafted input can cause denial-of-service, as demonstrated by wasm2js.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/2288" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1776B8E-3B03-42D6-BBFF-13332315B947", "versionEndExcluding": "89", "versionEndIncluding": null, "versionStartExclu...
https://github.com/WebAssembly/binaryen/issues/2288
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
Hi, I observed two crash and assertion failed in wasm2js (based on commit 777342684f5af51105be710c06591513433ed879). The poc files are attached. How to reproduce: ``` wasm2js poc ``` [poc.zip](https://github.com/WebAssembly/binaryen/files/3479031/poc.zip) Report of backtrace in `gdb` Assertaion failed...
Crash and Assertion failed in wasm2js
https://api.github.com/repos/WebAssembly/binaryen/issues/2288/comments
1
2019-08-07T21:48:28Z
2019-08-20T23:36:12Z
https://github.com/WebAssembly/binaryen/issues/2288
478,154,657
2,288
CVE-2019-16113
2019-09-08T21:15:10.617
Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155295/Bludit-Directory-Traversal-Image-File-Upload.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/bludit/bludit/issues/1081
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### A Code Execution Vulnerability in Bludit v3.9.2 Hi, For CVE ID,so I open a new issue,sorry about that.And I think you haven't completely fixed the bug. There is a new Code Execution Vulnerability which allow to get server permissions,the path is /bl-kernel/admin/ajax/upload-images.php #### 1, login wit...
Bludit v3.9.2 Code Execution Vulnerability in "Upload function"
https://api.github.com/repos/bludit/bludit/issues/1081/comments
6
2019-09-07T11:40:38Z
2023-10-24T07:42:28Z
https://github.com/bludit/bludit/issues/1081
490,625,895
1,081
CVE-2019-14540
2019-09-15T22:15:10.277
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0159" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2410
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding `HikariConfig`, via `HikariDataSource` Mitre id: CVE-2019-14540 Reporter: iSafeBlue / blue at ixsec.org (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for more on general problem type Fixed in: * 2.9.10...
Block one more gadget type (HikariCP, CVE-2019-14540)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2410/comments
8
2019-08-06T02:03:28Z
2020-02-10T22:11:47Z
https://github.com/FasterXML/jackson-databind/issues/2410
477,131,144
2,410
CVE-2019-14540
2019-09-15T22:15:10.277
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0159" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2449
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding `HikariConfig` (sub-class of `HikariDataSource`) Mitre id: CVE-2019-14439 Reporter: kingkk Fixed in: * 2.9.10 * 2.8.11.5 * 2.6.7.3 * does not affect 2.10.0 and later ----- (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-nee...
Block one more gadget type (HikariCP, CVE-2019-14439 / CVE-2019-16335)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2449/comments
3
2019-09-10T17:06:52Z
2020-02-10T22:12:16Z
https://github.com/FasterXML/jackson-databind/issues/2449
491,794,946
2,449
CVE-2019-16334
2019-09-15T22:15:10.527
In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1078" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "10A81FA4-0E1B-4680-A04F-E4D2267A98E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/bludit/bludit/issues/1078
[ "Exploit", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Vulnerability Bludit v3.9.2 is vulnerable to a stored XSS vulnerability in Categories -> Add New Category -> Name Parameter ### Steps to reproduce the problem Go to Categories -> Add New Category and insert the following payload in [Name] Parameter: <svg onload=alert(document.location)> ![image](https:...
Stored XSS in bludit v3.9.2
https://api.github.com/repos/bludit/bludit/issues/1078/comments
2
2019-08-29T06:40:10Z
2023-10-20T17:37:48Z
https://github.com/bludit/bludit/issues/1078
486,767,363
1,078
CVE-2018-21015
2019-09-16T13:15:11.417
AVC_DuplicateConfig() at isomedia/avc_ext.c in GPAC 0.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. There is "cfg_new->AVCLevelIndication = cfg->AVCLevelIndication;" but cfg could be NULL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1179" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1179
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master 94ad872) Compile cmd `$ ./configure --extra-cflags=-g"` `$ make` Triggered by `$ MP4Box -diso $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/gpac/poc12-SEGV gdb info: ``` Program received signal SIGSEGV, Segmentation fault. A...
SEGV in AVC_DuplicateConfig() at avc_ext.c:847
https://api.github.com/repos/gpac/gpac/issues/1179/comments
2
2018-12-15T06:54:00Z
2019-09-21T12:25:09Z
https://github.com/gpac/gpac/issues/1179
391,351,147
1,179
CVE-2018-21016
2019-09-16T13:15:11.510
audio_sample_entry_AddBox() at isomedia/box_code_base.c in GPAC 0.7.1 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1180" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-an...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1180
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master 94ad872) Compile cmd: `$ ./configure --extra-cflags="-fsanitize=address,undefined -g" --extra-ldflags="-fsanitize=address,undefined -ldl -g"` `$ make` Triggered by `$ MP4Box -diso $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/gpac/p...
AddressSanitizer: heap-buffer-overflow in audio_sample_entry_AddBox() at box_code_base.c:3934
https://api.github.com/repos/gpac/gpac/issues/1180/comments
7
2018-12-15T07:16:20Z
2019-09-21T07:29:30Z
https://github.com/gpac/gpac/issues/1180
391,352,422
1,180
CVE-2018-21017
2019-09-16T13:15:11.573
GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2CC18384-9350-47D7-A07D-C7D29622AE9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/gpac/gpac/issues/1183
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Tested in Ubuntu 18.04, 64bit, gcc 7.3.0, gpac (master d1c4bc3) Compile cmd: `$ ./configure --extra-cflags="-fsanitize=address,undefined -g" --extra-ldflags="-fsanitize=address,undefined -ldl -g"` `$ make` Triggered by `$ MP4Box -diso $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/gpac/p...
AddressSanitizer: memory leaks of dref_New()
https://api.github.com/repos/gpac/gpac/issues/1183/comments
2
2018-12-17T15:51:57Z
2019-09-20T21:34:54Z
https://github.com/gpac/gpac/issues/1183
391,773,951
1,183
CVE-2019-16349
2019-09-16T13:15:12.043
Bento4 1.5.1-628 has a NULL pointer dereference in AP4_ByteStream::ReadUI32 in Core/Ap4ByteStream.cpp when called from the AP4_TrunAtom class.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1-628:*:*:*:*:*:*:*", "matchCriteriaId": "27A2EAA1-1740-4A14-BFFC-BD4406E9BD87", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/422
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
Tested in Ubuntu 14.04, 64bit, Bento4(master cbebcc9) Triggered by cmd: `$ ./mp4tag --list-symbols --list-keys --show-tags $POC` POC file: https://github.com/Marsman1996/pocs/blob/master/bento4/poc19-ReadUI32-SEGV ASAN info: ``` ==14819== WARNING: AddressSanitizer failed to allocate 0x000ff00000c0 ...
NULL Pointer Dereference in AP4_ByteStream::ReadUI32() at Ap4ByteStream.cpp:243
https://api.github.com/repos/axiomatic-systems/Bento4/issues/422/comments
0
2019-08-18T06:57:23Z
2019-08-25T16:20:06Z
https://github.com/axiomatic-systems/Bento4/issues/422
481,961,506
422
CVE-2019-16350
2019-09-16T13:15:12.107
ffjpeg before 2019-08-18 has a NULL pointer dereference in idct2d8x8() at dct.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030", "versionEndExcluding": "2019-08-18", "versionEndIncluding": null, "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
## Test Environment Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9) ## How to trigger 1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6 2. `$ ./ffjpeg -d $POC` ## POC file https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc20-idct2d8x8-SEGV ## Details ### Asan report ...
NULL Pointer Dereference in idct2d8x8() at dct.c:201
https://api.github.com/repos/rockcarry/ffjpeg/issues/10/comments
2
2019-08-18T08:03:41Z
2019-08-19T03:27:30Z
https://github.com/rockcarry/ffjpeg/issues/10
481,966,251
10
CVE-2019-16351
2019-09-16T13:15:12.183
ffjpeg before 2019-08-18 has a NULL pointer dereference in huffman_decode_step() at huffman.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030", "versionEndExcluding": "2019-08-18", "versionEndIncluding": null, "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
## Test Environment Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9) ## How to trigger 1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6 2. `$ ./ffjpeg -d $POC` ## POC file https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc21-huffman_decode_step-SEGV ## Details ### Asa...
SEGV in huffman_decode_step() at huffman.c:371
https://api.github.com/repos/rockcarry/ffjpeg/issues/11/comments
2
2019-08-18T08:04:59Z
2019-08-19T03:27:21Z
https://github.com/rockcarry/ffjpeg/issues/11
481,966,330
11
CVE-2019-16352
2019-09-16T13:15:12.247
ffjpeg before 2019-08-21 has a heap-based buffer overflow in jfif_load() at jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B30E308-95EC-4B21-99B6-F731AF463030", "versionEndExcluding": "2019-08-18", "versionEndIncluding": null, "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
## Test Environment Ubuntu 14.04, 64bit, ffjpeg(master 627c8a9) ## How to trigger 1. compile ffjpeg with cmake file from https://github.com/rockcarry/ffjpeg/issues/6 2. `$ ./ffjpeg -d $POC` ## POC file https://github.com/Marsman1996/pocs/blob/master/ffjpeg/poc22-jfif_load-heapoverflow ## Details ### Asan ...
AddressSanitizer: heap-buffer-overflow in jfif_load() at jfif.c:187
https://api.github.com/repos/rockcarry/ffjpeg/issues/12/comments
10
2019-08-18T08:07:01Z
2019-08-21T09:02:45Z
https://github.com/rockcarry/ffjpeg/issues/12
481,966,458
12
CVE-2019-16366
2019-09-16T17:15:14.293
In XS 9.0.0 in Moddable SDK OS180329, there is a heap-based buffer overflow in fxBeginHost in xsAPI.c when called from fxRunDefine in xsRun.c, as demonstrated by crafted JavaScript code to xst.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/235" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:os180329:*:*:*:*:*:*:*", "matchCriteriaId": "34E757B1-02EE-4725-9610-056F3D11F904", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
https://github.com/Moddable-OpenSource/moddable/issues/235
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
Hello, We find a heap-buffer-overflow vulnerability in XS 9.0.0, which is reported by Address Sanitizer. We compile and run the xs in linux 64. The simplified js code: ``` function opt(arg1, arg2, arg3, arg4, arg5) { var sb = [arg2]; var test_bitor = function() { return 0; }; ...
XS: Heap-Buffer-Overflow
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/235/comments
10
2019-07-25T07:08:13Z
2019-09-24T16:45:53Z
https://github.com/Moddable-OpenSource/moddable/issues/235
472,701,074
235
CVE-2019-16678
2019-09-21T20:15:10.603
admin/urlrule/add.html in YzmCMS 5.3 allows CSRF with a resultant denial of service by adding a superseding route.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "20455270-91A2-45CE-9647-FCAF1055A188", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Hello, I found a vulnerability in your application. I call it a denial of service attack caused by CSRF. The point of vulnerability is the URL rule configuration. When I use CSRF to configure an illegal rule for administrators, the access routing of the whole station will be changed. That is to say, it is totally inacc...
Denial of service attack caused by CSRF(CSRF造成的拒绝服务攻击)
https://api.github.com/repos/yzmcms/yzmcms/issues/27/comments
6
2019-09-20T08:57:08Z
2020-01-10T14:36:11Z
https://github.com/yzmcms/yzmcms/issues/27
496,231,791
27
CVE-2019-16705
2019-09-23T05:15:10.260
Ming (aka libming) 0.4.8 has an out of bounds read vulnerability in the function OpCode() in the decompile.c file in libutil.a.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/178" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/178
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
# Description An out of bound read was found in function OpCode(file util/decompile.c 957). # Details: ``` ==30829==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61400000f5d0 at pc 0x000000413ddb bp 0x7ffeb39e6460 sp 0x7ffeb39e6450 READ of size 1 at 0x61400000f5d0 thread T0 #0 0x413dda in OpC...
Heap Buffer Overflow (OOB Read) in function OpCode decompile.c 957
https://api.github.com/repos/libming/libming/issues/178/comments
0
2019-02-28T08:05:46Z
2019-08-29T09:18:26Z
https://github.com/libming/libming/issues/178
415,495,144
178
CVE-2019-16708
2019-09-23T12:15:10.423
ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*", "matchCriteriaId": "5D3D09FA-AD5C-4BE2-BDF5-746DD70AA733", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1531
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks in XCreateImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1531/comments
3
2019-03-27T08:51:13Z
2019-10-29T09:31:09Z
https://github.com/ImageMagick/ImageMagick/issues/1531
425,832,104
1,531
CVE-2019-16710
2019-09-23T12:15:10.580
ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-35:*:*:*:*:*:*:*", "matchCriteriaId": "5D3D09FA-AD5C-4BE2-BDF5-746DD70AA733", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1528
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1528/comments
4
2019-03-25T09:50:16Z
2019-10-29T09:32:23Z
https://github.com/ImageMagick/ImageMagick/issues/1528
424,808,689
1,528
CVE-2019-16711
2019-09-23T12:15:10.643
ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:*:*:*:*:*:*:*", "matchCriteriaId": "2EA99C30-C4DA-4E3A-85F6-72F0B879EEBE", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1542
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leak in Huffman2DEncodeImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1542/comments
2
2019-04-11T02:03:07Z
2019-10-29T09:33:03Z
https://github.com/ImageMagick/ImageMagick/issues/1542
431,795,900
1,542
CVE-2019-16712
2019-09-23T12:15:10.707
ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:*:*:*:*:*:*:*", "matchCriteriaId": "98A09968-FA06-4217-82A0-802531283B4F", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1557
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks in WritePS3Image
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1557/comments
2
2019-04-28T04:35:49Z
2020-10-30T02:44:04Z
https://github.com/ImageMagick/ImageMagick/issues/1557
438,012,692
1,557
CVE-2019-16713
2019-09-23T12:15:10.783
ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:*:*:*:*:*:*:*", "matchCriteriaId": "98A09968-FA06-4217-82A0-802531283B4F", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1558
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
memory leaks in PingImage
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1558/comments
2
2019-04-28T04:48:48Z
2019-09-24T07:16:29Z
https://github.com/ImageMagick/ImageMagick/issues/1558
438,013,444
1,558
CVE-2019-16723
2019-09-23T15:15:10.903
In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0267BFF-D5A6-4457-8F00-EA7CB6EE96C8", "versionEndExcluding": null, "versionEndIncluding": "1.2.6", "versionStartExcluding":...
https://github.com/Cacti/cacti/issues/2964
[ "Patch", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
I have created a user with no group membership. Graph permission default is DENY and I have selected all graphs Restricted instead of 1. I have device params default DENY and only set to specific one. Template perm is set to DENY. Tree Perms is also default DENY and I set to access only a specific one. When I login wit...
Security issue allows to view all graphs
https://api.github.com/repos/Cacti/cacti/issues/2964/comments
21
2019-09-22T16:37:05Z
2020-06-30T12:55:29Z
https://github.com/Cacti/cacti/issues/2964
496,802,384
2,964
CVE-2019-16868
2019-09-25T13:15:11.220
emlog through 6.0.0beta has an arbitrary file deletion vulnerability via an admin/data.php?action=dell_all_bak request with directory traversal sequences in the bak[] parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/48" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8424BFC-9EC3-4610-9B51-8746F0153223", "versionEndExcluding": null, "versionEndIncluding": "5.3.1", "versionStartExcluding":...
https://github.com/emlog/emlog/issues/48
[ "Exploit", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
vulnerability in admin/data.php line 139: ``` if ($action == 'dell_all_bak') { if (!isset($_POST['bak'])) { emDirect('./data.php?error_a=1'); } else{ foreach ($_POST['bak'] as $val) { unlink($val); } emDirect('./data.php?active_del=1'); } } ``` post a...
emlog has any file deletion vulnerability
https://api.github.com/repos/emlog/emlog/issues/48/comments
2
2019-09-25T05:43:34Z
2022-01-10T04:11:39Z
https://github.com/emlog/emlog/issues/48
498,060,740
48
CVE-2019-16890
2019-09-25T21:15:12.407
Halo 1.1.0 has XSS via a crafted authorUrl in JSON data to api/content/posts/comments.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/311" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7657D7F-3464-4AE2-8F1F-E52E279C4166", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/halo-dev/halo/issues/311
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
Enter at the Write Comments Screenshots : ![1](https://user-images.githubusercontent.com/55778895/65579558-8b89a980-dfaa-11e9-8c99-3600fa5eb0de.jpg) After the request is successful. View in the background. For the comment list, click jack01. <img width="1197" alt="2" src="https://user-images.githubuserc...
Storage XSS vulnerabilities in article reviews
https://api.github.com/repos/halo-dev/halo/issues/311/comments
3
2019-09-25T08:14:17Z
2019-09-26T14:20:40Z
https://github.com/halo-dev/halo/issues/311
498,123,126
311
CVE-2015-9410
2019-09-26T00:15:10.273
The Blubrry PowerPress Podcasting plugin 6.0.4 for WordPress has XSS via the tab parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9410-blubrry.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blubrry:powerpress:6.0.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "3640C623-0E43-45C6-AC66-23B2CE960547", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/cybersecurityworks/Disclosed/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details Word Press Product Bugs Report Bug Name Cross Site Scripting (XSS) Software: Blubrry PowerPress Podcasting plugin Version: 6.0.4 Last Updated: 27-08-2015 Homepage: https://wordpress.org/plugins/powerpress/developers/ Compatible Up to Wordpress 4.3.0 Version (Requires: 3.6 or higher) Severity High Des...
XSS Vulnerability in Blubrry PowerPress Podcasting plugin Version 6.0.4
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/7/comments
0
2015-09-14T11:48:53Z
2015-09-14T12:33:09Z
https://github.com/cybersecurityworks/Disclosed/issues/7
106,324,861
7
CVE-2019-16532
2019-09-26T16:15:11.533
An HTTP Host header injection vulnerability exists in YzmCMS V5.3. A malicious user can poison a web cache or trigger redirections.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/28" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "20455270-91A2-45CE-9647-FCAF1055A188", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/yzmcms/yzmcms/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Host header injection vulnerability found on YzmCMS V5.3, Using this attack, a malicious user can poison the web cache or arbitrary user re-direction. PoC: Test Environment: Windows 7 SP1(64bit) XAMPP: 7.3.9 YzmCMS V5.3 Access Path: 192.168.30.169/yzmcms/ root@kali:~# curl http://192.168.30.169/yzmcms/membe...
About YzmCMS V5.3- 'Host' Header Injection
https://api.github.com/repos/yzmcms/yzmcms/issues/28/comments
0
2019-09-22T05:40:02Z
2019-09-22T05:59:09Z
https://github.com/yzmcms/yzmcms/issues/28
496,736,469
28
CVE-2019-16276
2019-09-30T19:15:08.790
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "780FC85E-2CAD-4605-8DA2-CE16EB2034A5", "versionEndExcluding": "1.12.10", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/golang/go/issues/34540
[ "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
net/http (through net/textproto) used to accept and normalize invalid HTTP/1.1 headers with a space before the colon, in violation of RFC 7230. If a Go server is used behind a reverse proxy that accepts and forwards but doesn't normalize such invalid headers, the reverse proxy and the server can interpret the headers d...
net/http: invalid headers are normalized, allowing request smuggling
https://api.github.com/repos/golang/go/issues/34540/comments
9
2019-09-25T21:40:44Z
2022-06-23T07:34:53Z
https://github.com/golang/go/issues/34540
498,537,818
34,540
CVE-2019-16942
2019-10-01T17:15:10.323
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpo...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3901" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0159" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2478
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another 2 gadget (*) types reported regarding classes of `commons-dbcp` and `p6spy` packages. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2019-16942 (commons-dbcp) Mitre id: CVE-2019-16943 (p6spy) ...
Block two more gadget types (commons-dbcp, p6spy, CVE-2019-16942 / CVE-2019-16943)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2478/comments
14
2019-09-27T15:44:21Z
2020-02-10T22:13:39Z
https://github.com/FasterXML/jackson-databind/issues/2478
499,518,554
2,478
CVE-2019-17073
2019-10-01T20:15:11.213
emlog through 6.0.0beta allows remote authenticated users to delete arbitrary files via admin/template.php?action=del&tpl=../ directory traversal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/emlog/emlog/issues/49" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8424BFC-9EC3-4610-9B51-8746F0153223", "versionEndExcluding": null, "versionEndIncluding": "5.3.1", "versionStartExcluding":...
https://github.com/emlog/emlog/issues/49
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "emlog", "emlog" ]
vulnerability in admin/template.php line 67: `if ($action == 'del') { LoginAuth::checkToken(); $tplName = isset($_GET['tpl']) ? addslashes($_GET['tpl']) : ''; $nonce_templet = Option::get('nonce_templet'); if ($tplName === $nonce_templet) { emMsg('您不能删除正在使用的模板'); } if (...
emlog discover any file deletion vulnerability again!
https://api.github.com/repos/emlog/emlog/issues/49/comments
0
2019-09-30T01:32:34Z
2022-01-10T15:16:37Z
https://github.com/emlog/emlog/issues/49
500,005,869
49
CVE-2019-17267
2019-10-07T00:15:10.490
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3200" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0159" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "5101FEB1-D47B-4AFF-89A1-22F77AE13819", "versionEndExcluding": "2.8.11.5", "versionEndIncluding": null, "versi...
https://github.com/FasterXML/jackson-databind/issues/2460
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget (*) type report regarding a class of `ehcache` package (follow up for #2387) Mitre id: CVE-2019-17267 Reporter: lufeirider Fix included in: * 2.9.10 * 2.8.11.5 * does not affect 2.10.0 and later ----- (*) See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-n...
Block one more gadget type (ehcache, CVE-2019-17267)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2460/comments
3
2019-09-17T06:34:14Z
2020-02-10T22:11:26Z
https://github.com/FasterXML/jackson-databind/issues/2460
494,429,276
2,460
CVE-2019-17402
2019-10-09T19:15:14.337
Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getULong in types.cpp when called from Exiv2::Internal::CiffDirectory::readDirectory in crwimage_int.cpp, because there is no validation of the relationship of the total size to the offset and size.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1019" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:0.27.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E9A8822-0F6F-4561-81B3-38235F52116E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Exiv2/exiv2/issues/1019
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
We found vulnerability in exiv2 binary and exiv2 is complied with clang enabling ASAN. **Machine Setup** ``` Machine : Ubuntu 16.04.3 LTS gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11) Commit : 401e658 exiv2 : 0.27.99.0 Command : exiv2 -pv $POC ``` **ASAN Output** ``` fuzzer@fuzzer:~/victim/...
Overflow in exiv2
https://api.github.com/repos/Exiv2/exiv2/issues/1019/comments
4
2019-10-06T09:21:25Z
2019-10-07T22:13:16Z
https://github.com/Exiv2/exiv2/issues/1019
503,074,622
1,019
CVE-2019-17452
2019-10-10T17:15:17.780
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListInspector::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::InspectFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4dump.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/434" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/434
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
**System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 File Dumper - Version 1.2 (Bento4 Version 1.5.1.0) **Command** mp4dump --verbosity 2 POC-file **ASAN Output** ``` ASAN:DEADLYSIGNAL ================================================================= ==12343==ERROR: AddressSanitize...
SEGV in mp4dump
https://api.github.com/repos/axiomatic-systems/Bento4/issues/434/comments
4
2019-09-29T17:37:28Z
2022-02-28T03:29:23Z
https://github.com/axiomatic-systems/Bento4/issues/434
499,946,487
434
CVE-2019-17453
2019-10-10T17:15:17.843
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::WriteFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4encrypt or mp4compact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/436" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/436
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
**System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 Compacter - Version 1.0 (Bento4 Version 1.5.1.0) **Command** mp4compact POC /dev/null **ASAN Output** ``` ASAN:DEADLYSIGNAL ================================================================= ==5286==ERROR: AddressSanitizer: SEGV o...
SEGV in mp4compact
https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments
0
2019-09-30T07:47:11Z
2019-10-08T05:14:45Z
https://github.com/axiomatic-systems/Bento4/issues/436
500,109,805
436
CVE-2019-17453
2019-10-10T17:15:17.843
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::WriteFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4encrypt or mp4compact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/436" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/437
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
**System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 Encrypter - Version 1.6 (Bento4 Version 1.5.1.0) **Command** mp4encrypt --method OMA-PDCF-CBC --show-progress POC /dev/null **ASAN Output** ``` fuzzer@thickfuzzer:~/victim/Bento4$ ./mp4encrypt --method OMA-PDCF-CBC --show-progress ...
SEGV in mp4encrypt
https://api.github.com/repos/axiomatic-systems/Bento4/issues/437/comments
0
2019-09-30T16:31:42Z
2019-10-08T05:14:30Z
https://github.com/axiomatic-systems/Bento4/issues/437
500,387,590
437
CVE-2019-17454
2019-10-10T17:15:17.907
Bento4 1.5.1.0 has a NULL pointer dereference in AP4_Descriptor::GetTag in Core/Ap4Descriptor.h, related to AP4_StsdAtom::GetSampleDescription in Core/Ap4StsdAtom.cpp, as demonstrated by mp4info.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/435" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/435
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
**System Details** Commit ID: bc1b02a Test Machine : Ubuntu 16.04.3 LTS MP4 File Info - Version 1.3.4 (Bento4 Version 1.5.1.0) **Command** mp4info --show-samples POC-file **ASAN Output** ``` ASAN:DEADLYSIGNAL ================================================================= ==17894==ERROR: AddressSanitiz...
SEGV in mp4info
https://api.github.com/repos/axiomatic-systems/Bento4/issues/435/comments
2
2019-09-29T20:00:36Z
2020-10-17T21:37:46Z
https://github.com/axiomatic-systems/Bento4/issues/435
499,963,127
435
CVE-2019-17528
2019-10-12T20:15:11.487
An issue was discovered in Bento4 1.5.1.0. There is a SEGV in the function AP4_TfhdAtom::SetDefaultSampleSize at Core/Ap4TfhdAtom.h when called from AP4_Processor::ProcessFragments in Core/Ap4Processor.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/bento4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/432
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# bento4 ## version bento4 1.5.1.0 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## AP4_TfhdAtom::SetDefaultSampleSize@Ap4TfhdAtom.h-80___SEGV_UNKNOW ### descr...
SEGV_UNKNOW was discovered in AP4_TfhdAtom::SetDefaultSampleSize in Ap4TfhdAtom.h-
https://api.github.com/repos/axiomatic-systems/Bento4/issues/432/comments
0
2019-09-23T02:21:12Z
2019-10-08T05:15:45Z
https://github.com/axiomatic-systems/Bento4/issues/432
496,867,693
432
CVE-2019-17529
2019-10-12T20:15:11.567
An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in AP4_CencSampleEncryption::DoInspectFields in Core/Ap4CommonEncryption.cpp when called from AP4_Atom::Inspect in Core/Ap4Atom.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/bento4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/430
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# bento4 ## version bento4 1.5.1.0 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## AP4_CencSampleEncryption::DoInspectFields@Ap4CommonEncryption.cpp-3437___heap-...
A heap-buffer-overflow was discovered in AP4_CencSampleEncryption::DoInspectFields in Ap4CommonEncryption.cpp
https://api.github.com/repos/axiomatic-systems/Bento4/issues/430/comments
0
2019-09-23T02:16:44Z
2019-10-08T05:16:10Z
https://github.com/axiomatic-systems/Bento4/issues/430
496,866,994
430
CVE-2019-17530
2019-10-12T20:15:11.643
An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in AP4_PrintInspector::AddField in Core/Ap4Atom.cpp when called from AP4_CencSampleEncryption::DoInspectFields in Core/Ap4CommonEncryption.cpp, when called from AP4_Atom::Inspect in Core/Ap4Atom.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TeamSeri0us/pocs/tree/master/bento4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/axiomatic-systems/Bento4/issues/431
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# bento4 ## version bento4 1.5.1.0 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## AP4_PrintInspector::AddField@Ap4Atom.cpp-974___heap-buffer-overflow ### des...
A heap-buffer-overflow was discoverad in AP4_PrintInspector::AddField at Ap4Atom.cpp-974
https://api.github.com/repos/axiomatic-systems/Bento4/issues/431/comments
0
2019-09-23T02:19:02Z
2019-10-08T05:15:57Z
https://github.com/axiomatic-systems/Bento4/issues/431
496,867,352
431
CVE-2019-17531
2019-10-12T21:15:08.570
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4192" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0159" }, { "source"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036DA13-110D-40B3-8494-E361BBF4AFCD", "versionEndExcluding": "2.6.7.3", "versionEndIncluding": null, "versio...
https://github.com/FasterXML/jackson-databind/issues/2498
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type reported regarding a class of apache-log4j-extras package. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2019-17531 Reporter: 张先辉 Zhangxianhui Fix will be included in: * 2.9...
Block one more gadget type (apache-log4j-extras/1.2, CVE-2019-17531)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2498/comments
1
2019-10-12T17:42:27Z
2020-02-10T22:14:00Z
https://github.com/FasterXML/jackson-databind/issues/2498
506,216,163
2,498
CVE-2019-17541
2019-10-14T02:15:10.703
ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15827" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB264CB7-AFF2-45C4-A12E-9C65BD7DDD76", "versionEndExcluding": "6.9.10-55", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1641
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow at MagickCore/string.c:853 in DestroyStringInfo
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1641/comments
2
2019-07-18T09:43:55Z
2020-01-15T10:53:24Z
https://github.com/ImageMagick/ImageMagick/issues/1641
469,671,879
1,641
CVE-2016-11014
2019-10-16T11:15:13.380
NETGEAR JNR1010 devices before 1.0.0.32 have Incorrect Access Control because the ok value of the auth cookie is a special case.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2016-11014-netgear.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ED4DBD1-9957-45C8-A5D1-257069D065E1", "versionEndExcluding": "1.0.0.32", "versionEndIncluding": null, "version...
https://github.com/cybersecurityworks/Disclosed/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details Product Vendor: Netgear Bug Name: Authentication Bypass in Netgear Router JNR1010 Version 1.0.0.24 Software: Netgear Router JNR1010 Firmware Version: 1.0.0.24 Last Updated: <a href="http://kb.netgear.com/app/answers/detail/a_id/29270/~/jnr1010-firmware-version-1.0.0.24">10-06-2015</a> Homepage: http:/...
Authentication Bypass in Netgear Router JNR1010 Version 1.0.0.24
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/14/comments
1
2016-01-11T07:53:05Z
2023-03-01T10:00:26Z
https://github.com/cybersecurityworks/Disclosed/issues/14
125,890,287
14
CVE-2016-11015
2019-10-16T11:15:13.847
NETGEAR JNR1010 devices before 1.0.0.32 allow cgi-bin/webproc CSRF via the :InternetGatewayDevice.X_TWSZ-COM_URL_Filter.BlackList.1.URL parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2016-11015-netgear.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ED4DBD1-9957-45C8-A5D1-257069D065E1", "versionEndExcluding": "1.0.0.32", "versionEndIncluding": null, "version...
https://github.com/cybersecurityworks/Disclosed/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details # Product Vendor: Netgear # Bug Name: Cross Site Request Forgery in Netgear Router JNR1010 Version 1.0.0.24 # Software: Netgear Router Firmware # Version: 1.0.0.24 # Last Updated: <a href="http://kb.netgear.com/app/answers/detail/a_id/29270/~/jnr1010-firmware-version-1.0.0.24">10-06-2015</a> # Homepage: htt...
Cross Site Request Forgery in Netgear Router JNR1010 Version 1.0.0.24
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/13/comments
0
2016-01-11T05:52:35Z
2016-01-11T11:14:41Z
https://github.com/cybersecurityworks/Disclosed/issues/13
125,878,416
13
CVE-2016-11016
2019-10-16T11:15:13.987
NETGEAR JNR1010 devices before 1.0.0.32 allow webproc?getpage= XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://007software.net/multiple-cross-site-scripting-in-netgear-router-version1-0-0-24/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cyber...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0ED4DBD1-9957-45C8-A5D1-257069D065E1", "versionEndExcluding": "1.0.0.32", "versionEndIncluding": null, "version...
https://github.com/cybersecurityworks/Disclosed/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details # Product Vendor: Netgear # Bug Name: Cross Site Scripting in Netgear Router Version 1.0.0.24 # Software: Netgear Router Firmware # Version: 1.0.0.24 # Last Updated: <a href="http://kb.netgear.com/app/answers/detail/a_id/29270/~/jnr1010-firmware-version-1.0.0.24">10-06-2015</a> # Homepage: http://netgear.co...
Multiple Cross Site Scripting in Netgear Router Version 1.0.0.24
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/12/comments
0
2016-01-09T12:31:10Z
2016-01-09T12:31:10Z
https://github.com/cybersecurityworks/Disclosed/issues/12
125,756,407
12
CVE-2019-11253
2019-10-17T16:15:10.443
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3239" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3811" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0820894-56B7-4CB8-AE5C-29639FA59718", "versionEndExcluding": null, "versionEndIncluding": "1.12.10", "versionStar...
https://github.com/kubernetes/kubernetes/issues/83253
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVE-2019-11253 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML or JSON payloads to cause kube-apiserver to consume excessive CPU or memory, potentially crashing and becoming unavailable. This vulnerability has been given an initial severity of High, with a sc...
CVE-2019-11253: Kubernetes API Server JSON/YAML parsing vulnerable to resource exhaustion attack
https://api.github.com/repos/kubernetes/kubernetes/issues/83253/comments
17
2019-09-27T16:53:31Z
2022-10-14T02:09:16Z
https://github.com/kubernetes/kubernetes/issues/83253
499,548,171
83,253
CVE-2019-17596
2019-10-24T22:15:10.407
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1987156-2D29-4F5D-ADCC-0F9DA2C7C0CF", "versionEndExcluding": "1.12.11", "versionEndIncluding": null, "versionStartExcluding":...
https://github.com/golang/go/issues/34960
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
Invalid DSA public keys can cause a panic in dsa.Verify. In particular, using crypto/x509.Verify on a crafted X.509 certificate chain can lead to a panic, even if the certificates don’t chain to a trusted root. The chain can be delivered via a crypto/tls connection to a client, or to a server that accepts and verifies ...
crypto/dsa: invalid public key causes panic in dsa.Verify
https://api.github.com/repos/golang/go/issues/34960/comments
6
2019-10-17T18:43:01Z
2020-11-04T20:23:14Z
https://github.com/golang/go/issues/34960
508,654,280
34,960
CVE-2019-19084
2019-11-18T16:15:12.370
In Octopus Deploy 3.3.0 through 2019.10.4, an authenticated user with PackagePush permission to upload packages could upload a maliciously crafted package, triggering an exception that exposes underlying operating system details.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5971" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "1621F446-4AB3-45D5-AF0A-845BA5BA5A21", "versionEndExcluding": null, "versionEndIncluding": "2019.10.4", "versionS...
https://github.com/OctopusDeploy/Issues/issues/5971
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
_Note: affects customers on Octopus Cloud hosted instances. For all other customers this was fixed in https://github.com/OctopusDeploy/Issues/issues/5956_ An authenticated user could upload a maliciously crafted package, triggering an exception that discloses details of the underlying operating system. CVE: `CVE...
(Hosted only) Local path configuration disclosed when uploading maliciously crafted package
https://api.github.com/repos/OctopusDeploy/Issues/issues/5971/comments
4
2019-11-05T04:10:15Z
2020-02-16T23:36:40Z
https://github.com/OctopusDeploy/Issues/issues/5971
517,537,845
5,971
CVE-2019-19085
2019-11-18T16:15:12.497
A persistent cross-site scripting (XSS) vulnerability in Octopus Server 3.4.0 through 2019.10.5 allows remote authenticated attackers to inject arbitrary web script or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5961" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:server:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B92955C-E874-43E4-B043-3DE908250A01", "versionEndExcluding": null, "versionEndIncluding": "2019.10.5", "versionStartExcl...
https://github.com/OctopusDeploy/Issues/issues/5961
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
An authenticated user with edit permissions could upload a maliciously crafted file, allowing attackers to inject arbitrary web script or HTML. CVE: CVE-2019-19085 Relates to https://github.com/OctopusDeploy/OctopusDeploy/issues/4642
XSS vulnerability
https://api.github.com/repos/OctopusDeploy/Issues/issues/5961/comments
3
2019-11-04T04:11:46Z
2020-02-16T23:36:30Z
https://github.com/OctopusDeploy/Issues/issues/5961
516,951,481
5,961
CVE-2015-9537
2019-11-26T15:15:11.190
The NextGEN Gallery plugin before 2.1.10 for WordPress has multiple XSS issues involving thumbnail_width, thumbnail_height, thumbwidth, thumbheight, wmXpos, and wmYpos, and template.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9537-nextgen.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F6FF0678-1E8F-4693-AE22-4AFEF12528BB", "versionEndExcluding": "2.1.10", "versionEndIncluding": null, "ve...
https://github.com/cybersecurityworks/Disclosed/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details Word Press Product Bugs Report Bug Name XSS (Cross Site Scripting) Software: NextGen Gallery Version: 2.1.7 Last Updated: 12-08-2015 Homepage: https://wordpress.org/plugins/nextgen-gallery/download/ Compatible Up to Wordpress 4.3.0 Version (Requires: 3.6.1 or higher) Severity High Description: Multip...
Multiple XSS in NextGEN Gallery by Photocrati Version 2.1.7
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/1/comments
1
2015-08-27T13:22:02Z
2024-05-10T04:43:44Z
https://github.com/cybersecurityworks/Disclosed/issues/1
103,507,915
1
CVE-2015-9538
2019-11-26T15:15:11.253
The NextGEN Gallery plugin before 2.1.15 for WordPress allows ../ Directory Traversal in path selection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cxsecurity.com/issue/WLB-2015080165" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "5E4A9794-77D2-4813-B40A-B7D784E77A9B", "versionEndExcluding": "2.1.15", "versionEndIncluding": null, "ve...
https://github.com/cybersecurityworks/Disclosed/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
Word Press Product Bugs Report Bug Name LFI (Local File Inclusion) Area Path NextGEN Gallery by Photocrati Version 2.1.7 (Plugin) Last Updated 12-08-2015 Compatible Up to Wordpress 4.3.0 Version (Requires: 3.6.1 or higher) Severity High Reported by Sathish from <a href="http://www.cybersecurityworks.com">Cyber Security...
Traversal Attack / Local File Inclusion (LFI) in NextGEN Gallery by Photocrati Version 2.1.7
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/2/comments
0
2015-08-28T11:58:55Z
2015-11-25T11:23:59Z
https://github.com/cybersecurityworks/Disclosed/issues/2
103,705,424
2
CVE-2015-9539
2019-11-26T15:15:11.347
The Fast Secure Contact Form plugin before 4.0.38 for WordPress allows fs_contact_form1[welcome] XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2015-9539-fastsecure.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/amansaini/fa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fast_secure_contact_form_project:fast_secure_contact_form:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "94936F04-9861-47BF-9F06-F5B7F29E124A", "versionEndExcluding": "4.0.38", "versionEn...
https://github.com/cybersecurityworks/Disclosed/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details Word Press Product Bugs Report Bug Name XSS (Cross Site Scripting) Software: Fast Secure Contact Form plugin Version: 4.0.37 Last Updated: 21-08-2015 Homepage: https://wordpress.org/plugins/si-contact-form/ Compatible Up to Wordpress 4.3.0 Version (Requires: 3.4.2 or higher) Severity High Descriptio...
XSS Vulnerability in Fast Secure Contact form version 4.0.37
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/4/comments
0
2015-09-14T10:50:07Z
2015-09-14T10:58:55Z
https://github.com/cybersecurityworks/Disclosed/issues/4
106,317,022
4
CVE-2019-19306
2019-11-26T15:15:13.377
The Zoho CRM Lead Magnet plugin 1.6.9.1 for WordPress allows XSS via module, EditShortcode, or LayoutName.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cybersecurityworks.com/zerodays/cve-2019-19306-zoho.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoho:lead_magnet:1.6.9.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "CF9D5215-A5D4-4616-8D29-7C225C9E39D2", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/cybersecurityworks/Disclosed/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cybersecurityworks", "Disclosed" ]
# Details ZOHO CRM Lead Magnet version 1.6.9.1 Bug Name: Reflected Cross Site Scripting (XSS) in WordPress Plugin Product: ZOHO CRM Lead Magnet version 1.6.9.1 Version: 1.6.9.1 Last Updated: 14-10-2019 Homepage: http://localhost/wordpress/ Severity: High Status: Fixed Exploitation Requires Authentication?: ...
ZOHO CRM Lead Magnet version 1.6.9.1
https://api.github.com/repos/cybersecurityworks/Disclosed/issues/16/comments
0
2019-10-16T11:06:22Z
2019-10-16T13:31:02Z
https://github.com/cybersecurityworks/Disclosed/issues/16
507,779,866
16
CVE-2019-19375
2019-11-28T17:15:12.383
In Octopus Deploy before 2019.10.7, in a configuration where SSL offloading is enabled, the CSRF cookie was sometimes sent without the secure attribute. (The fix for this was backported to LTS versions 2019.6.14 and 2019.9.8.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/5998" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:-:*:*:*", "matchCriteriaId": "70EDE3D5-F20F-4921-8D92-A22ADB705325", "versionEndExcluding": "2019.10.7", "versionEndIncluding": null, "versionS...
https://github.com/OctopusDeploy/Issues/issues/5998
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
When Octopus is configured to behind a load balancer, and SSL offloading is configured, Octopus will sometimes send the CSRF cookie without the `secure` attribute. CVE: `CVE-2019-19375` Relates to https://github.com/OctopusDeploy/OctopusDeploy/issues/4763
CSRF cookie sometimes missing secure attribute
https://api.github.com/repos/OctopusDeploy/Issues/issues/5998/comments
2
2019-11-14T02:15:57Z
2020-02-28T07:02:35Z
https://github.com/OctopusDeploy/Issues/issues/5998
522,581,170
5,998
CVE-2019-19376
2019-11-28T17:15:12.777
In Octopus Deploy before 2019.10.6, an authenticated user with TeamEdit permission could send a malformed Team API request that bypasses input validation and causes an application level denial of service condition. (The fix for this was also backported to LTS 2019.9.8 and LTS 2019.6.14.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6005" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:-:*:*:*", "matchCriteriaId": "70EDE3D5-F20F-4921-8D92-A22ADB705325", "versionEndExcluding": "2019.10.7", "versionEndIncluding": null, "versionS...
https://github.com/OctopusDeploy/Issues/issues/6005
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
If a malformed request is submitted to the Team API, for either create or modify, the save is successful. However, the code that reads the team data isn't expecting the invalid data and hits a null reference exception. Without that cache the server APIs cannot load permissions and return an error for all incoming re...
Invalid request submitted to Team API can cause denial of service
https://api.github.com/repos/OctopusDeploy/Issues/issues/6005/comments
2
2019-11-14T05:14:54Z
2020-02-28T07:01:59Z
https://github.com/OctopusDeploy/Issues/issues/6005
522,629,758
6,005
CVE-2019-19590
2019-12-05T02:15:19.337
In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a d...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/15543" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lis...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F2CC41D-F155-4528-AB57-DD94A54A0CE4", "versionEndExcluding": null, "versionEndIncluding": "4.0.0", "versionStartExcludin...
https://github.com/radareorg/radare2/issues/15543
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | None | Architecture/b...
Integer Overflow in `r_asm_massemble` at libr/asm/asm.c
https://api.github.com/repos/radareorg/radare2/issues/15543/comments
10
2019-12-04T09:29:34Z
2019-12-09T10:40:58Z
https://github.com/radareorg/radare2/issues/15543
532,555,686
15,543
CVE-2019-19602
2019-12-05T14:15:09.257
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "COMPLE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.kernel.org/show_bug.cgi?id=205663" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDA2DEC6-C9B1-4CBB-99ED-EF1EB2832A99", "versionEndExcluding": "5.4.2", "versionEndIncluding": null, "versionStartExcl...
https://github.com/golang/go/issues/35777#issuecomment-561935388
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
We've had several reports of memory corruption on Linux 5.3.x (or later) kernels from people running tip since asynchronous preemption was committed. This is a super-bug to track these issues. I suspect they all have one root cause. Typically these are "runtime error: invalid memory address or nil pointer dereferenc...
runtime: memory corruption on Linux 5.2+
https://api.github.com/repos/golang/go/issues/35777/comments
93
2019-11-22T15:24:36Z
2022-06-23T07:42:24Z
https://github.com/golang/go/issues/35777
527,259,718
35,777
CVE-2018-1002102
2019-12-05T16:15:10.427
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authe...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/85867" }, { "source": "jordan@liggitt.net", "tags": null, "url": "https://lists.fedoraproject.org/archives/l...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1774C3E1-5BE8-4DC0-8A61-39B183C36F96", "versionEndExcluding": null, "versionEndIncluding": "1.13.13", "versionStar...
https://github.com/kubernetes/kubernetes/issues/85867
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F (Low)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F) An attacker-controlled Kubelet can return an arbitrary redirect when responding to certain apiserver requests. Impacted kube-apiservers will follow the red...
CVE-2018-1002102: Unvalidated redirect
https://api.github.com/repos/kubernetes/kubernetes/issues/85867/comments
3
2019-12-03T22:58:37Z
2021-12-02T22:56:35Z
https://github.com/kubernetes/kubernetes/issues/85867
532,323,568
85,867
CVE-2019-11255
2019-12-05T16:15:10.567
Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, resto...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4054" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4096" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:external-provisioner:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A78A50B-5286-400D-A54A-49F1023D97D6", "versionEndExcluding": null, "versionEndIncluding": "0.4.2", "ver...
https://github.com/kubernetes/kubernetes/issues/85233
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
<!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks! If the matter is security related, please disclose it privately via https://kubernetes.io/security/ --> **Am I vulnerable?** CSI snapsho...
CVE-2019-11255: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation
https://api.github.com/repos/kubernetes/kubernetes/issues/85233/comments
5
2019-11-13T20:57:31Z
2022-10-14T02:00:55Z
https://github.com/kubernetes/kubernetes/issues/85233
522,468,661
85,233
CVE-2019-19625
2019-12-06T16:15:11.247
SROS 2 0.8.1 (which provides the tools that generate and distribute keys for Robot Operating System 2 and uses the underlying security plugins of DDS from ROS 2) leaks node information due to a leaky default configuration as indicated in the policy/defaults/dds/governance.xml document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/922" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ros2/sros2/pull/171" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ros:sros2:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2332494-1342-4DDB-8C8F-FC27B3292728", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
https://github.com/aliasrobotics/RVD/issues/922
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml cve: CVE-2019-19625 cwe: CWE-200 (Information Exposure) description: We found that SROS 2, the tools to generate and distribute keys for ROS 2 and use the underlying security plugins of DDS from ROS 2 leak node information due to a leaky default configuration as inidicated at https://github.com/ros2/sr...
RVD#922: SROS2 leaks node information
https://api.github.com/repos/aliasrobotics/RVD/issues/922/comments
2
2019-12-05T21:44:23Z
2020-06-23T14:25:37Z
https://github.com/aliasrobotics/RVD/issues/922
533,616,302
922
CVE-2019-19630
2019-12-08T02:15:10.030
HTMLDOC 1.9.7 allows a stack-based buffer overflow in the hd_strlcpy() function in string.c (when called from render_contents in ps-pdf.cxx) via a crafted HTML document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/370" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "htt...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F993E-D4F5-4ED1-B93C-71EAEFFFF408", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/michaelrsweet/htmldoc/issues/370
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hi, While fuzzing htmldoc with Honggfuzz, I found a stack-based buffer overflow in the hd_strlcpy() function, in string.c. Attaching a reproducer (gzipped so GitHub accepts it): [test01.html.gz](https://github.com/michaelrsweet/htmldoc/files/3933370/test01.html.gz) Issue can be reproduced by running: ``` ...
Stack-based buffer overflow in the hd_strlcpy() function
https://api.github.com/repos/michaelrsweet/htmldoc/issues/370/comments
4
2019-12-06T17:57:51Z
2019-12-08T19:02:42Z
https://github.com/michaelrsweet/htmldoc/issues/370
534,181,098
370
CVE-2019-19635
2019-12-08T03:15:10.897
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function sixel_decode_raw_impl at fromsixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/103" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/103
[ "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
# libsixel ## version libsixel 1.8.2 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## sixel_decode_raw_impl@fromsixel.c:608-41___heap-buffer-overflow ### descr...
A heap-buffer-overflow in function sixel_decode_raw_impl at fromsixel.c:608-4, due to integer overflow
https://api.github.com/repos/saitoha/libsixel/issues/103/comments
2
2019-12-02T10:49:48Z
2019-12-17T12:05:50Z
https://github.com/saitoha/libsixel/issues/103
531,046,092
103
CVE-2019-19636
2019-12-08T03:15:10.973
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_encode_body at tosixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/104" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/104
[ "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
# libsixel ## version libsixel 1.8.2 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## sixel_encode_body@tosixel.c:562-38___SEGV_UNKNOW ### description An ...
An integer overflow in function sixel_encode_body at tosixel.c:562-38
https://api.github.com/repos/saitoha/libsixel/issues/104/comments
2
2019-12-02T10:51:14Z
2019-12-17T12:05:34Z
https://github.com/saitoha/libsixel/issues/104
531,046,886
104
CVE-2019-19637
2019-12-08T03:15:11.020
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/105" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/105
[ "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
# libsixel ## version libsixel 1.8.2 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## sixel_decode_raw_impl@fromsixel.c:650_integer_overflow ### description ...
An integer overflow in function sixel_decode_raw_impl at fromsixel.c:650
https://api.github.com/repos/saitoha/libsixel/issues/105/comments
2
2019-12-02T10:52:00Z
2019-12-17T12:05:12Z
https://github.com/saitoha/libsixel/issues/105
531,047,331
105
CVE-2019-19638
2019-12-08T03:15:11.100
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/102" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/102
[ "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
# libsixel ## version libsixel 1.8.2 ## description ```txt None ``` ## download link None ## others please send email to teamseri0us360@gmail.com if you have any questions. --------------------- ## load_pnm@frompnm.c:289-50___heap-buffer-overflow ### description ...
A heap-buffer-overflow found in function load_pnm at frompnm.c:289-50, due to integer overflow
https://api.github.com/repos/saitoha/libsixel/issues/102/comments
2
2019-12-02T10:47:41Z
2019-12-17T12:06:25Z
https://github.com/saitoha/libsixel/issues/102
531,044,924
102
CVE-2019-19647
2019-12-09T01:15:10.280
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/issues/15545" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraprojec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F2CC41D-F155-4528-AB57-DD94A54A0CE4", "versionEndExcluding": null, "versionEndIncluding": "4.0.0", "versionStartExcludin...
https://github.com/radareorg/radare2/issues/15545
[ "Exploit", "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu x86 64 | File format of the file you reverse (mandatory) | None | Architecture/bi...
Lack of Validation Check for `r_asm_pseudo_incbin` at `libr/asm/asm.c`
https://api.github.com/repos/radareorg/radare2/issues/15545/comments
1
2019-12-06T07:49:36Z
2019-12-15T22:38:41Z
https://github.com/radareorg/radare2/issues/15545
533,802,860
15,545
CVE-2019-17358
2019-12-12T14:15:16.133
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE"...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00001.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00005.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4F5AE29-35EB-4B0E-8304-F5520AAE998B", "versionEndExcluding": null, "versionEndIncluding": "1.2.7", "versionStartExcluding":...
https://github.com/Cacti/cacti/issues/3026
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** As reported by Eldar Marcussen of xen1thLabs, Cacti's unserialization of form data does not properly validate the form input which can result in unsafe unserialization operations. **Expected behavior** Cacti should always check serialized data for expected formatting, or utilize JSON data with...
When deserializating data, ensure basic sanitization has been performed
https://api.github.com/repos/Cacti/cacti/issues/3026/comments
2
2019-10-12T19:52:09Z
2020-06-30T12:54:19Z
https://github.com/Cacti/cacti/issues/3026
506,230,365
3,026
CVE-2019-19777
2019-12-13T02:15:10.893
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/109
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.2 There is a heap-buffer-overflow in stbi__load_main at stb_image.h:5580 please run following cmd to reproduce it. ``` img2sixel --monochrome $PoC ``` [poc](https://drive.google.com/file/d/1KHIYy8gfuMFHKVyb_dpOPVKSpPVeikUK/view?usp=sharing) ASAN LOG ``` ==9030==ERROR: AddressSanitize...
heap-buffer-overflow in stbi__load_main at stb_image.h:5580
https://api.github.com/repos/saitoha/libsixel/issues/109/comments
3
2019-12-12T14:03:22Z
2019-12-18T05:20:36Z
https://github.com/saitoha/libsixel/issues/109
536,997,354
109
CVE-2019-19778
2019-12-13T02:15:10.940
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/110" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "BAFCC979-2F4E-46A5-AC18-B6452E752D90", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/saitoha/libsixel/issues/110
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
version : img2sixel 1.8.2 There is a heap-buffer-overflow in load_sixel at loader.c:629 please run following cmd to reproduce it. ``` img2sixel --high-color $PoC ``` [poc](https://drive.google.com/file/d/1siMEF20AcBJhV_RDuNrgnHZz5EvYlGMT/view?usp=sharing) ASAN LOG ``` ==36913==ERROR: AddressSanitizer: heap-b...
heap-buffer-overflow in load_sixel at loader.c:629
https://api.github.com/repos/saitoha/libsixel/issues/110/comments
2
2019-12-12T15:11:41Z
2019-12-15T15:40:23Z
https://github.com/saitoha/libsixel/issues/110
537,037,845
110
CVE-2019-19887
2019-12-18T19:15:11.843
bitstr_tell at bitstr.c in ffjpeg through 2019-08-21 has a NULL pointer dereference related to jfif_encode.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D9E7EB6-DB1F-4806-AFFE-531905453943", "versionEndExcluding": null, "versionEndIncluding": "2019-08-21", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
run `ffjpeg -e poc.bmp` in linux result in gdb. ``` Stopped reason: SIGSEGV 0x0000000000401968 in bitstr_tell (stream=0x0) at bitstr.c:221 221 int type = *(int*)stream; gdb-peda$ ``` steam is a pointer which is null in this case. Dereferencing null pointer cause segment fault. fix: ``` long bitstr...
SegmentFault in jfif_encode at jfif.c:842
https://api.github.com/repos/rockcarry/ffjpeg/issues/14/comments
1
2019-12-17T15:58:08Z
2020-02-24T07:35:00Z
https://github.com/rockcarry/ffjpeg/issues/14
539,157,799
14
CVE-2019-19888
2019-12-18T19:15:11.937
jfif_decode in jfif.c in ffjpeg through 2019-08-21 has a divide-by-zero error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D9E7EB6-DB1F-4806-AFFE-531905453943", "versionEndExcluding": null, "versionEndIncluding": "2019-08-21", "versionStartE...
https://github.com/rockcarry/ffjpeg/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
file: jfif.c function: jfif_decode line: 425 mcuw = sfh_max * 8; mcuh = sfv_max * 8; jw = ALIGN(jfif->width , mcuw); jh = ALIGN(jfif->height, mcuh); mcuc = jw / mcuw; <------- mcuw can be zero mcur = jh / mcuh; //-- calculate mcu info
Deny of Service caused by dividing zero without sanity check in jfif.c
https://api.github.com/repos/rockcarry/ffjpeg/issues/13/comments
3
2019-12-17T06:48:47Z
2020-07-27T06:47:58Z
https://github.com/rockcarry/ffjpeg/issues/13
538,872,327
13
CVE-2019-11780
2019-12-19T16:16:42.370
Improper access control in the computed fields system of the framework of Odoo Community 13.0 and Odoo Enterprise 13.0 allows remote authenticated attackers to access sensitive information via crafted RPC requests, which could lead to privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "security@odoo.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/odoo/odoo/issues/42196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:odoo:odoo:13.0:*:*:*:community:*:*:*", "matchCriteriaId": "4CE8B4A3-0EA3-4813-A511-16FB7D2B06AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/odoo/odoo/issues/42196
[ "Patch", "Third Party Advisory" ]
github.com
[ "odoo", "odoo" ]
# Security Advisory - ODOO-SA-2019-10-25-1 Improper access control in the computed fields system of the framework of Odoo Community 13.0 and Odoo Enterprise 13.0 allows remote authenticated attackers to access sensitive information via crafted RPC requests, which could lead to privilege escalation. **Affects**: Odoo ...
[SEC] ODOO-SA-2019-10-25-1 (CVE-2019-11780) - Improper access control in the computed fiel...
https://api.github.com/repos/odoo/odoo/issues/42196/comments
0
2019-12-19T15:42:28Z
2019-12-19T15:42:29Z
https://github.com/odoo/odoo/issues/42196
540,393,344
42,196
CVE-2019-19922
2019-12-22T20:15:10.823
kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expir...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "72AC7518-B872-42E3-A43B-F2D010211A8D", "versionEndExcluding": "5.3.9", "versionEndIncluding": null, "versionStartExcl...
https://github.com/kubernetes/kubernetes/issues/67577
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
> /kind bug This is not a bug in Kubernets per se, it's more of a heads-up. I've read this great blog post: * https://kubernetes.io/blog/2018/07/24/feature-highlight-cpu-manager/ From the blog post I learned that k8s is using cfs quotas to enforce CPU limits. Unfortunately, those can lead to unnecessary thr...
CFS quotas can lead to unnecessary throttling
https://api.github.com/repos/kubernetes/kubernetes/issues/67577/comments
146
2018-08-20T04:06:20Z
2023-01-16T14:53:22Z
https://github.com/kubernetes/kubernetes/issues/67577
351,978,078
67,577
CVE-2019-19948
2019-12-24T01:15:11.247
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*", "matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9", "versionEndExcluding": null, "versionEndIncluding": null, "versi...
https://github.com/ImageMagick/ImageMagick/issues/1562
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WriteSGIImage of coders/sgi.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1562/comments
2
2019-04-29T03:08:25Z
2020-02-07T01:34:56Z
https://github.com/ImageMagick/ImageMagick/issues/1562
438,134,907
1,562
CVE-2019-19949
2019-12-24T01:15:11.327
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "78819D62-25B5-4F9E-8291-2C1FD9803531", "versionEndExcluding": "6.9.10-43", "versionEndIncluding": null, "version...
https://github.com/ImageMagick/ImageMagick/issues/1561
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in WritePNGImage of png.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1561/comments
3
2019-04-29T02:55:44Z
2019-12-26T12:39:58Z
https://github.com/ImageMagick/ImageMagick/issues/1561
438,133,289
1,561
CVE-2019-19952
2019-12-24T01:15:11.527
In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/1791" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "857D548F-3DED-4D35-B2AD-4003378032DA", "versionEndExcluding": "7.0.9-7", "versionEndIncluding": null, "versionSt...
https://github.com/ImageMagick/ImageMagick/issues/1791
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [X] I have written a descriptive issue title - [X] I have verified that I am using the latest version of ImageMagick - [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-use-after-free in MngInfoDiscardObject of coders/png.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1791/comments
8
2019-11-27T06:48:11Z
2020-03-08T20:06:50Z
https://github.com/ImageMagick/ImageMagick/issues/1791
529,151,827
1,791
CVE-2019-19999
2019-12-26T04:15:10.923
Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/compare/v1.1.3-beta.2...v1.2.0-beta.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD55ABB0-278F-4658-A126-C9D20F58B59E", "versionEndExcluding": null, "versionEndIncluding": "1.1.1", "versionStartExcluding": n...
https://github.com/halo-dev/halo/issues/419
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **I am sure I have checked** - [x] [Halo User Guide Documentation ](https://halo.run/docs) - [x] [Halo BBS](https://bbs.halo.run) - [x] [Github Wiki ](https://github.com/halo-dev/halo/wiki/4.-%...
A Server-Side Freemarker template injection vulnerability could cause remote command execution
https://api.github.com/repos/halo-dev/halo/issues/419/comments
1
2019-12-11T10:44:41Z
2019-12-12T17:27:08Z
https://github.com/halo-dev/halo/issues/419
536,287,817
419
CVE-2019-19999
2019-12-26T04:15:10.923
Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/compare/v1.1.3-beta.2...v1.2.0-beta.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD55ABB0-278F-4658-A126-C9D20F58B59E", "versionEndExcluding": null, "versionEndIncluding": "1.1.1", "versionStartExcluding": n...
https://github.com/halo-dev/halo/issues/440
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [ ] [Halo 使用文档](https://halo.run/docs) - [ ] [Halo 论坛](https://bbs.halo.run) - [ ] [Github Wiki 常见问题](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%8...
unsafe template file permissions edit cause Server Side Template Injection(SSTI)
https://api.github.com/repos/halo-dev/halo/issues/440/comments
6
2019-12-24T15:49:53Z
2019-12-25T13:37:00Z
https://github.com/halo-dev/halo/issues/440
542,163,626
440
CVE-2019-20009
2019-12-27T01:15:13.257
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/176
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
CVE-2019-20009
2019-12-27T01:15:13.257
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/176#issue-541977765
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
CVE-2019-20010
2019-12-27T01:15:13.320
An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
CVE-2019-20011
2019-12-27T01:15:13.383
An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
CVE-2019-20012
2019-12-27T01:15:13.460
An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176
CVE-2019-20013
2019-12-27T01:15:13.523
An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2", "versionEndExcluding": "0.9.3", "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: dwg2dxf $PoC **1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)** PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2...
Several bugs found by fuzzing
https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments
24
2019-12-24T03:44:32Z
2020-01-16T12:12:03Z
https://github.com/LibreDWG/libredwg/issues/176
541,977,765
176