cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 1.07k | cve_metrics dict | cve_references listlengths 1 34 | cve_configurations listlengths 1 5 | url stringlengths 39 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 58 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 39 62 | issue_github_id int64 128M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-16711 | 2019-09-23T12:15:10.643 | ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-40:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA99C30-C4DA-4E3A-85F6-72F0B879EEBE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1542 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | memory leak in Huffman2DEncodeImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1542/comments | 2 | 2019-04-11T02:03:07Z | 2019-10-29T09:33:03Z | https://github.com/ImageMagick/ImageMagick/issues/1542 | 431,795,900 | 1,542 |
CVE-2019-16712 | 2019-09-23T12:15:10.707 | ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:*:*:*:*:*:*:*",
"matchCriteriaId": "98A09968-FA06-4217-82A0-802531283B4F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1557 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | memory leaks in WritePS3Image | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1557/comments | 2 | 2019-04-28T04:35:49Z | 2020-10-30T02:44:04Z | https://github.com/ImageMagick/ImageMagick/issues/1557 | 438,012,692 | 1,557 |
CVE-2019-16713 | 2019-09-23T12:15:10.783 | ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:*:*:*:*:*:*:*",
"matchCriteriaId": "98A09968-FA06-4217-82A0-802531283B4F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1558 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | memory leaks in PingImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1558/comments | 2 | 2019-04-28T04:48:48Z | 2019-09-24T07:16:29Z | https://github.com/ImageMagick/ImageMagick/issues/1558 | 438,013,444 | 1,558 |
CVE-2019-17452 | 2019-10-10T17:15:17.780 | Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListInspector::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::InspectFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4dump. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/434"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/434 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | **System Details**
Commit ID: bc1b02a
Test Machine : Ubuntu 16.04.3 LTS
MP4 File Dumper - Version 1.2
(Bento4 Version 1.5.1.0)
**Command**
mp4dump --verbosity 2 POC-file
**ASAN Output**
```
ASAN:DEADLYSIGNAL
=================================================================
==12343==ERROR: AddressSanitize... | SEGV in mp4dump | https://api.github.com/repos/axiomatic-systems/Bento4/issues/434/comments | 4 | 2019-09-29T17:37:28Z | 2022-02-28T03:29:23Z | https://github.com/axiomatic-systems/Bento4/issues/434 | 499,946,487 | 434 |
CVE-2019-17453 | 2019-10-10T17:15:17.843 | Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::WriteFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4encrypt or mp4compact. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/436"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/436 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | **System Details**
Commit ID: bc1b02a
Test Machine : Ubuntu 16.04.3 LTS
MP4 Compacter - Version 1.0
(Bento4 Version 1.5.1.0)
**Command**
mp4compact POC /dev/null
**ASAN Output**
```
ASAN:DEADLYSIGNAL
=================================================================
==5286==ERROR: AddressSanitizer: SEGV o... | SEGV in mp4compact | https://api.github.com/repos/axiomatic-systems/Bento4/issues/436/comments | 0 | 2019-09-30T07:47:11Z | 2019-10-08T05:14:45Z | https://github.com/axiomatic-systems/Bento4/issues/436 | 500,109,805 | 436 |
CVE-2019-17453 | 2019-10-10T17:15:17.843 | Bento4 1.5.1.0 has a NULL pointer dereference in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, related to AP4_IodsAtom::WriteFields in Core/Ap4IodsAtom.cpp, as demonstrated by mp4encrypt or mp4compact. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/436"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/437 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | **System Details**
Commit ID: bc1b02a
Test Machine : Ubuntu 16.04.3 LTS
MP4 Encrypter - Version 1.6
(Bento4 Version 1.5.1.0)
**Command**
mp4encrypt --method OMA-PDCF-CBC --show-progress POC /dev/null
**ASAN Output**
```
fuzzer@thickfuzzer:~/victim/Bento4$ ./mp4encrypt --method OMA-PDCF-CBC --show-progress ... | SEGV in mp4encrypt | https://api.github.com/repos/axiomatic-systems/Bento4/issues/437/comments | 0 | 2019-09-30T16:31:42Z | 2019-10-08T05:14:30Z | https://github.com/axiomatic-systems/Bento4/issues/437 | 500,387,590 | 437 |
CVE-2019-17454 | 2019-10-10T17:15:17.907 | Bento4 1.5.1.0 has a NULL pointer dereference in AP4_Descriptor::GetTag in Core/Ap4Descriptor.h, related to AP4_StsdAtom::GetSampleDescription in Core/Ap4StsdAtom.cpp, as demonstrated by mp4info. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/435"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/435 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | **System Details**
Commit ID: bc1b02a
Test Machine : Ubuntu 16.04.3 LTS
MP4 File Info - Version 1.3.4
(Bento4 Version 1.5.1.0)
**Command**
mp4info --show-samples POC-file
**ASAN Output**
```
ASAN:DEADLYSIGNAL
=================================================================
==17894==ERROR: AddressSanitiz... | SEGV in mp4info | https://api.github.com/repos/axiomatic-systems/Bento4/issues/435/comments | 2 | 2019-09-29T20:00:36Z | 2020-10-17T21:37:46Z | https://github.com/axiomatic-systems/Bento4/issues/435 | 499,963,127 | 435 |
CVE-2019-17528 | 2019-10-12T20:15:11.487 | An issue was discovered in Bento4 1.5.1.0. There is a SEGV in the function AP4_TfhdAtom::SetDefaultSampleSize at Core/Ap4TfhdAtom.h when called from AP4_Processor::ProcessFragments in Core/Ap4Processor.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/bento4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/432 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | # bento4
## version
bento4 1.5.1.0
## description
```txt
None
```
## download link
None
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## AP4_TfhdAtom::SetDefaultSampleSize@Ap4TfhdAtom.h-80___SEGV_UNKNOW
### descr... | SEGV_UNKNOW was discovered in AP4_TfhdAtom::SetDefaultSampleSize in Ap4TfhdAtom.h- | https://api.github.com/repos/axiomatic-systems/Bento4/issues/432/comments | 0 | 2019-09-23T02:21:12Z | 2019-10-08T05:15:45Z | https://github.com/axiomatic-systems/Bento4/issues/432 | 496,867,693 | 432 |
CVE-2019-17529 | 2019-10-12T20:15:11.567 | An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in AP4_CencSampleEncryption::DoInspectFields in Core/Ap4CommonEncryption.cpp when called from AP4_Atom::Inspect in Core/Ap4Atom.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/bento4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/430 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | # bento4
## version
bento4 1.5.1.0
## description
```txt
None
```
## download link
None
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## AP4_CencSampleEncryption::DoInspectFields@Ap4CommonEncryption.cpp-3437___heap-... | A heap-buffer-overflow was discovered in AP4_CencSampleEncryption::DoInspectFields in Ap4CommonEncryption.cpp | https://api.github.com/repos/axiomatic-systems/Bento4/issues/430/comments | 0 | 2019-09-23T02:16:44Z | 2019-10-08T05:16:10Z | https://github.com/axiomatic-systems/Bento4/issues/430 | 496,866,994 | 430 |
CVE-2019-17530 | 2019-10-12T20:15:11.643 | An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in AP4_PrintInspector::AddField in Core/Ap4Atom.cpp when called from AP4_CencSampleEncryption::DoInspectFields in Core/Ap4CommonEncryption.cpp, when called from AP4_Atom::Inspect in Core/Ap4Atom.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TeamSeri0us/pocs/tree/master/bento4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/431 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | # bento4
## version
bento4 1.5.1.0
## description
```txt
None
```
## download link
None
## others
please send email to teamseri0us360@gmail.com if you have any questions.
---------------------
## AP4_PrintInspector::AddField@Ap4Atom.cpp-974___heap-buffer-overflow
### des... | A heap-buffer-overflow was discoverad in AP4_PrintInspector::AddField at Ap4Atom.cpp-974 | https://api.github.com/repos/axiomatic-systems/Bento4/issues/431/comments | 0 | 2019-09-23T02:19:02Z | 2019-10-08T05:15:57Z | https://github.com/axiomatic-systems/Bento4/issues/431 | 496,867,352 | 431 |
CVE-2019-17541 | 2019-10-14T02:15:10.703 | ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15827"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB264CB7-AFF2-45C4-A12E-9C65BD7DDD76",
"versionEndExcluding": "6.9.10-55",
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1641 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow at MagickCore/string.c:853 in DestroyStringInfo | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1641/comments | 2 | 2019-07-18T09:43:55Z | 2020-01-15T10:53:24Z | https://github.com/ImageMagick/ImageMagick/issues/1641 | 469,671,879 | 1,641 |
CVE-2019-11253 | 2019-10-17T16:15:10.443 | Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3239"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3811"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0820894-56B7-4CB8-AE5C-29639FA59718",
"versionEndExcluding": null,
"versionEndIncluding": "1.12.10",
"versionStar... | https://github.com/kubernetes/kubernetes/issues/83253 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVE-2019-11253 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML or JSON payloads to cause kube-apiserver to consume excessive CPU or memory, potentially crashing and becoming unavailable. This vulnerability has been given an initial severity of High, with a sc... | CVE-2019-11253: Kubernetes API Server JSON/YAML parsing vulnerable to resource exhaustion attack | https://api.github.com/repos/kubernetes/kubernetes/issues/83253/comments | 17 | 2019-09-27T16:53:31Z | 2022-10-14T02:09:16Z | https://github.com/kubernetes/kubernetes/issues/83253 | 499,548,171 | 83,253 |
CVE-2019-19011 | 2019-11-17T18:15:10.987 | MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/miniupnp/ngiflib/issues/16"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ngiflib_project:ngiflib:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EEFD7EDE-41CD-4646-BBC8-6500AFC1985E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/miniupnp/ngiflib/issues/16 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"miniupnp",
"ngiflib"
] | We found Segmentation Fault issue in gif2tga binary and gif2tga is complied with clang enabling ASAN.
**Machine Setup**
Machine : Ubuntu 16.04.3 LTS
gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.11)
Commit : 992d272
Command : ./gif2tga $POC
POC :- [GifIndexToTrueColor-SEGV.zip](https://github.com/mi... | Segmentation Fault in ngiflib.c | https://api.github.com/repos/miniupnp/ngiflib/issues/16/comments | 0 | 2019-10-30T18:20:15Z | 2019-11-09T13:10:39Z | https://github.com/miniupnp/ngiflib/issues/16 | 514,884,667 | 16 |
CVE-2018-1002102 | 2019-12-05T16:15:10.427 | Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authe... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/85867"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/l... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1774C3E1-5BE8-4DC0-8A61-39B183C36F96",
"versionEndExcluding": null,
"versionEndIncluding": "1.13.13",
"versionStar... | https://github.com/kubernetes/kubernetes/issues/85867 | [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F (Low)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N/E:F)
An attacker-controlled Kubelet can return an arbitrary redirect when responding to certain apiserver requests. Impacted kube-apiservers will follow the red... | CVE-2018-1002102: Unvalidated redirect | https://api.github.com/repos/kubernetes/kubernetes/issues/85867/comments | 3 | 2019-12-03T22:58:37Z | 2021-12-02T22:56:35Z | https://github.com/kubernetes/kubernetes/issues/85867 | 532,323,568 | 85,867 |
CVE-2019-11255 | 2019-12-05T16:15:10.567 | Improper input validation in Kubernetes CSI sidecar containers for external-provisioner (<v0.4.3, <v1.0.2, v1.1, <v1.2.2, <v1.3.1), external-snapshotter (<v0.4.2, <v1.0.2, v1.1, <1.2.2), and external-resizer (v0.1, v0.2) could result in unauthorized PersistentVolume data access or volume mutation during snapshot, resto... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4054"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4096"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:external-provisioner:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A78A50B-5286-400D-A54A-49F1023D97D6",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.2",
"ver... | https://github.com/kubernetes/kubernetes/issues/85233 | [
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | <!-- Please use this template while reporting a bug and provide as much info as possible. Not doing so may result in your bug not being addressed in a timely manner. Thanks!
If the matter is security related, please disclose it privately via https://kubernetes.io/security/
-->
**Am I vulnerable?**
CSI snapsho... | CVE-2019-11255: CSI volume snapshot, cloning and resizing features can result in unauthorized volume data access or mutation | https://api.github.com/repos/kubernetes/kubernetes/issues/85233/comments | 5 | 2019-11-13T20:57:31Z | 2022-10-14T02:00:55Z | https://github.com/kubernetes/kubernetes/issues/85233 | 522,468,661 | 85,233 |
CVE-2019-19922 | 2019-12-22T20:15:10.823 | kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expir... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72AC7518-B872-42E3-A43B-F2D010211A8D",
"versionEndExcluding": "5.3.9",
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/kubernetes/kubernetes/issues/67577 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | > /kind bug
This is not a bug in Kubernets per se, it's more of a heads-up.
I've read this great blog post:
* https://kubernetes.io/blog/2018/07/24/feature-highlight-cpu-manager/
From the blog post I learned that k8s is using cfs quotas to enforce CPU limits. Unfortunately, those can lead to unnecessary thr... | CFS quotas can lead to unnecessary throttling | https://api.github.com/repos/kubernetes/kubernetes/issues/67577/comments | 146 | 2018-08-20T04:06:20Z | 2023-01-16T14:53:22Z | https://github.com/kubernetes/kubernetes/issues/67577 | 351,978,078 | 67,577 |
CVE-2019-19948 | 2019-12-24T01:15:11.247 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.8-43:q16:*:*:*:*:*:*",
"matchCriteriaId": "2EDF50C4-9FFE-4EBF-A5BE-44AF7E6988D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versi... | https://github.com/ImageMagick/ImageMagick/issues/1562 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in WriteSGIImage of coders/sgi.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1562/comments | 2 | 2019-04-29T03:08:25Z | 2020-02-07T01:34:56Z | https://github.com/ImageMagick/ImageMagick/issues/1562 | 438,134,907 | 1,562 |
CVE-2019-19949 | 2019-12-24T01:15:11.327 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78819D62-25B5-4F9E-8291-2C1FD9803531",
"versionEndExcluding": "6.9.10-43",
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1561 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in WritePNGImage of png.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1561/comments | 3 | 2019-04-29T02:55:44Z | 2019-12-26T12:39:58Z | https://github.com/ImageMagick/ImageMagick/issues/1561 | 438,133,289 | 1,561 |
CVE-2019-19952 | 2019-12-24T01:15:11.527 | In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1791"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "857D548F-3DED-4D35-B2AD-4003378032DA",
"versionEndExcluding": "7.0.9-7",
"versionEndIncluding": null,
"versionSt... | https://github.com/ImageMagick/ImageMagick/issues/1791 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [X] I have written a descriptive issue title
- [X] I have verified that I am using the latest version of ImageMagick
- [X] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-use-after-free in MngInfoDiscardObject of coders/png.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1791/comments | 8 | 2019-11-27T06:48:11Z | 2020-03-08T20:06:50Z | https://github.com/ImageMagick/ImageMagick/issues/1791 | 529,151,827 | 1,791 |
CVE-2019-20009 | 2019-12-27T01:15:13.257 | An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/LibreDWG/libredwg/issues/176 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20009 | 2019-12-27T01:15:13.257 | An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_SPLINE_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/LibreDWG/libredwg/issues/176#issue-541977765 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20010 | 2019-12-27T01:15:13.320 | An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643383 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20011 | 2019-12-27T01:15:13.383 | An issue was discovered in GNU LibreDWG 0.92. There is a heap-based buffer over-read in decode_R13_R2000 in decode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643439 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20012 | 2019-12-27T01:15:13.460 | An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_HATCH_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643088 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20013 | 2019-12-27T01:15:13.523 | An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20014 | 2019-12-27T01:15:13.587 | An issue was discovered in GNU LibreDWG before 0.93. There is a double-free in dwg_free in free.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09B5D2C4-D4B2-4226-AA34-A346E6064FA2",
"versionEndExcluding": "0.9.3",
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643172 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20015 | 2019-12-27T01:15:13.647 | An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6967607-F26E-477A-8D60-8B0D55594EC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: dwg2dxf $PoC
**1.Crafted input will lead to Memory allocation failed in dwg_decode_SPLINE_private (src/dwg.spec:1639)**
PoC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG/id:000000%2Csig:06%2Csrc:000000%2... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/176/comments | 24 | 2019-12-24T03:44:32Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/176 | 541,977,765 | 176 |
CVE-2019-20090 | 2019-12-30T04:15:11.030 | An issue was discovered in Bento4 1.5.1.0. There is a use-after-free in AP4_Sample::GetOffset in Core/Ap4Sample.h when called from Ap4LinearReader.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/461"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/461 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | ./mp42ts $poc out
poc
[test-002.zip](https://github.com/axiomatic-systems/Bento4/files/3938643/test-002.zip)
asan output
```
root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts overflows/test-002.mp4-double_free-idx\:0xffffffff-0x0 out
=====================================================... | use after free in Ap4Sample.h | https://api.github.com/repos/axiomatic-systems/Bento4/issues/461/comments | 0 | 2019-12-09T08:53:39Z | 2019-12-09T08:53:39Z | https://github.com/axiomatic-systems/Bento4/issues/461 | 534,780,352 | 461 |
CVE-2019-20091 | 2019-12-30T04:15:11.123 | An issue was discovered in Bento4 1.5.1.0. There is a NULL pointer dereference in AP4_Descriptor::GetTag in mp42ts when called from AP4_DecoderConfigDescriptor::GetDecoderSpecificInfoDescriptor in Ap4DecoderConfigDescriptor.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/462"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83B32974-D913-4DDB-844F-C58D55ECC17E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/axiomatic-systems/Bento4/issues/462 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | ./mp42ts $poc out
poc
[poc1.zip](https://github.com/axiomatic-systems/Bento4/files/3938679/poc1.zip)
[poc2.zip](https://github.com/axiomatic-systems/Bento4/files/3938680/poc2.zip)
asan output
1
```
root@ubuntu:/home/tim/Bento4/cmakebuild# ../../Bento4-asan/cmakebuild/mp42ts crashes/test-001.mp4-signalb-0x0 out
... | 2 segv in mp42ts | https://api.github.com/repos/axiomatic-systems/Bento4/issues/462/comments | 0 | 2019-12-09T09:00:42Z | 2019-12-09T09:00:42Z | https://github.com/axiomatic-systems/Bento4/issues/462 | 534,783,741 | 462 |
CVE-2019-20159 | 2019-12-31T00:15:12.243 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a memory leak in dinf_New() in isomedia/box_code_base.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1321"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1321 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-memory-leak
```
POC file:
https://github.com/Clingto/P... | AddressSanitizer: a memory leak of dinf_New() | https://api.github.com/repos/gpac/gpac/issues/1321/comments | 2 | 2019-10-28T16:03:11Z | 2020-01-08T12:43:28Z | https://github.com/gpac/gpac/issues/1321 | 513,400,465 | 1,321 |
CVE-2019-20160 | 2019-12-31T00:15:12.337 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a stack-based buffer overflow in the function av1_parse_tile_group() in media_tools/av_parsers.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1334"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1334 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-av1_parse_tile_group
```
POC file:
https://... | AddressSanitizer: stack-buffer-overflow in av1_parse_tile_group media_tools/av_parsers.c:3845 | https://api.github.com/repos/gpac/gpac/issues/1334/comments | 2 | 2019-11-09T11:22:06Z | 2020-01-08T12:45:14Z | https://github.com/gpac/gpac/issues/1334 | 520,394,957 | 1,334 |
CVE-2019-20161 | 2019-12-31T00:15:12.417 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1320"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1320 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (master 6ada10e)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-ReadGF_IPMPX_WatermarkingInit
```
POC file:
https://gi... | AddressSanitizer: heap-buffer-overflow in ReadGF_IPMPX_WatermarkingInit at ipmpx_code.c:1517 | https://api.github.com/repos/gpac/gpac/issues/1320/comments | 2 | 2019-10-28T15:50:52Z | 2020-01-08T12:43:16Z | https://github.com/gpac/gpac/issues/1320 | 513,392,746 | 1,320 |
CVE-2019-20162 | 2019-12-31T00:15:12.507 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is heap-based buffer overflow in the function gf_isom_box_parse_ex() in isomedia/box_funcs.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1327"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1327 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_parse_ex
```
POC file:
https://... | ERROR: AddressSanitizer: heap-buffer-overflow in gf_isom_box_parse_ex isomedia/box_funcs.c:189 | https://api.github.com/repos/gpac/gpac/issues/1327/comments | 2 | 2019-11-09T11:12:14Z | 2020-01-08T12:43:37Z | https://github.com/gpac/gpac/issues/1327 | 520,392,881 | 1,327 |
CVE-2019-20163 | 2019-12-31T00:15:12.587 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_odf_avc_cfg_write_bs() in odf/descriptors.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1335"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1335 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_odf_avc_cfg_write_bs
```
POC file:
https... | AddressSanitizer: NULL pointer dereference in gf_odf_avc_cfg_write_bs odf/descriptors.c:567 | https://api.github.com/repos/gpac/gpac/issues/1335/comments | 2 | 2019-11-09T11:23:01Z | 2020-01-08T12:45:23Z | https://github.com/gpac/gpac/issues/1335 | 520,395,160 | 1,335 |
CVE-2019-20164 | 2019-12-31T00:15:12.667 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_box_del() in isomedia/box_funcs.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1332"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1332 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_del
```
POC file:
https://githu... | AddressSanitizer: NULL pointer dereference (use-after-free ) in gf_isom_box_del isomedia/box_funcs.c:1500 | https://api.github.com/repos/gpac/gpac/issues/1332/comments | 2 | 2019-11-09T11:19:52Z | 2022-01-26T08:36:22Z | https://github.com/gpac/gpac/issues/1332 | 520,394,510 | 1,332 |
CVE-2019-20165 | 2019-12-31T00:15:12.743 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function ilst_item_Read() in isomedia/box_code_apple.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1338"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1338 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hello, I found a similar issue but I am not sure they are the same.
https://github.com/gpac/gpac/issues/1263
System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make... | ERROR: AddressSanitizer: NULL pointer dereference in ilst_item_Read isomedia/box_code_apple.c:119 | https://api.github.com/repos/gpac/gpac/issues/1338/comments | 4 | 2019-11-09T12:06:24Z | 2020-01-08T12:45:38Z | https://github.com/gpac/gpac/issues/1338 | 520,405,629 | 1,338 |
CVE-2019-20166 | 2019-12-31T00:15:12.837 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function gf_isom_dump() in isomedia/box_dump.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1331"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1331 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_dump
```
POC file:
https://github.c... | AddressSanitizer: NULL pointer dereference in gf_isom_dump isomedia/box_dump.c:133 | https://api.github.com/repos/gpac/gpac/issues/1331/comments | 2 | 2019-11-09T11:18:44Z | 2020-01-08T12:44:45Z | https://github.com/gpac/gpac/issues/1331 | 520,394,250 | 1,331 |
CVE-2019-20167 | 2019-12-31T00:15:12.930 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a NULL pointer dereference in the function senc_Parse() in isomedia/box_code_drm.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1330"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1330 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-senc_Parse
```
POC file:
https://github.com... | AddressSanitizer: NULL pointer dereference in senc_Parse isomedia/box_code_drm.c:1378 | https://api.github.com/repos/gpac/gpac/issues/1330/comments | 2 | 2019-11-09T11:17:12Z | 2020-01-08T12:44:20Z | https://github.com/gpac/gpac/issues/1330 | 520,393,923 | 1,330 |
CVE-2019-20168 | 2019-12-31T00:15:13.007 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function gf_isom_box_dump_ex() in isomedia/box_funcs.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1333"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1333 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-gf_isom_box_dump_ex
```
POC file:
https://g... | AddressSanitizer: heap-use-after-free in gf_isom_box_dump_ex isomedia/box_funcs.c:1734 | https://api.github.com/repos/gpac/gpac/issues/1333/comments | 4 | 2019-11-09T11:21:05Z | 2020-01-16T22:33:39Z | https://github.com/gpac/gpac/issues/1333 | 520,394,786 | 1,333 |
CVE-2019-20169 | 2019-12-31T00:15:13.087 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is a use-after-free in the function trak_Read() in isomedia/box_code_base.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1329"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1329 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-trak_Read
```
POC file:
https://github.com/... | AddressSanitizer: heap-use-after-free in trak_Read isomedia/box_code_base.c:7153 | https://api.github.com/repos/gpac/gpac/issues/1329/comments | 2 | 2019-11-09T11:15:44Z | 2020-01-08T12:44:04Z | https://github.com/gpac/gpac/issues/1329 | 520,393,655 | 1,329 |
CVE-2019-20170 | 2019-12-31T00:15:13.213 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There is an invalid pointer dereference in the function GF_IPMPX_AUTH_Delete() in odf/ipmpx_code.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1328"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1328 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-GF_IPMPX_AUTH_Delete
```
POC file:
https://... | AddressSanitizer: heap-use-after-free in GF_IPMPX_AUTH_Delete odf/ipmpx_code.c:115 | https://api.github.com/repos/gpac/gpac/issues/1328/comments | 2 | 2019-11-09T11:14:15Z | 2020-01-08T12:43:51Z | https://github.com/gpac/gpac/issues/1328 | 520,393,299 | 1,328 |
CVE-2019-20171 | 2019-12-31T00:15:13.307 | An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20191109. There are memory leaks in metx_New in isomedia/box_code_base.c and abst_Read in isomedia/box_code_adobe.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1337"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1337 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | System info:
Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master 00dfc93)
Compile Command:
```
$ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box
$ make
```
Run Command:
```
$ MP4Box -diso -out /dev/null $POC-new-memory-leak
```
POC file:
https://github.co... | AddressSanitizer: 2 memory leaks of metx_New(), abst_Read() | https://api.github.com/repos/gpac/gpac/issues/1337/comments | 3 | 2019-11-09T12:00:28Z | 2020-01-08T13:26:12Z | https://github.com/gpac/gpac/issues/1337 | 520,403,921 | 1,337 |
CVE-2019-20208 | 2020-01-02T14:16:36.363 | dimC_Read in isomedia/box_code_3gpp.c in GPAC 0.8.0 has a stack-based buffer overflow. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1348"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-an... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1348 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
[ √] I looked for a similar issue and couldn't find any.
[ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
[ √] I give enough informa... | There is a stack-buffer-overflow in the dimC_Read function of box_code_3gpp.c:1000 | https://api.github.com/repos/gpac/gpac/issues/1348/comments | 2 | 2019-11-13T07:25:13Z | 2020-01-08T12:45:44Z | https://github.com/gpac/gpac/issues/1348 | 522,010,451 | 1,348 |
CVE-2019-20219 | 2020-01-02T15:15:12.520 | ngiflib 0.4 has a heap-based buffer over-read in GifIndexToTrueColor in ngiflib.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/miniupnp/ngiflib/issues/15"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | https://github.com/miniupnp/ngiflib/issues/15 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"miniupnp",
"ngiflib"
] | Tested in Ubuntu 19.04, 64bit, ngiflib(master 2bef2a0)
Triggered by
gif2tga $POC
POC file:
[poc.zip](https://github.com/miniupnp/ngiflib/files/3723825/poc.zip)
asan
```
root@ubuntu:/home/tim/ngiflib-normal# ./gif2tga mr_gland.gif-out_of_bound-idx\:0xf3-0x0.gif
==========================================... | heap-buffer-overflow at WritePixels() in ngiflib.c:226 | https://api.github.com/repos/miniupnp/ngiflib/issues/15/comments | 2 | 2019-10-14T09:40:20Z | 2020-01-05T08:51:16Z | https://github.com/miniupnp/ngiflib/issues/15 | 506,545,294 | 15 |
CVE-2020-6609 | 2020-01-08T21:15:11.193 | GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/179#issue-544834443 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 |
CVE-2020-6610 | 2020-01-08T21:15:11.287 | GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447120 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 |
CVE-2020-6611 | 2020-01-08T21:15:11.367 | GNU LibreDWG 0.9.3.2564 has a NULL pointer dereference in get_next_owned_entity in dwg.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447190 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 |
CVE-2020-6612 | 2020-01-08T21:15:11.457 | GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 |
CVE-2020-6613 | 2020-01-08T21:15:11.537 | GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447025 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 |
CVE-2020-6614 | 2020-01-08T21:15:11.630 | GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 |
CVE-2020-6615 | 2020-01-08T21:15:11.693 | GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00046.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.9.3.2564:*:*:*:*:*:*:*",
"matchCriteriaId": "6292F71C-4D80-4570-A07D-C790FEEE9B2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_0.9.3.2564/id:000239%2Csig:06%2Csrc:007083%2Cop:havoc%2Crep:4
... | Several bugs found by fuzzing | https://api.github.com/repos/LibreDWG/libredwg/issues/179/comments | 7 | 2020-01-03T03:19:25Z | 2020-01-16T12:12:04Z | https://github.com/LibreDWG/libredwg/issues/179 | 544,834,443 | 179 |
CVE-2020-6628 | 2020-01-09T02:15:13.433 | Ming (aka libming) 0.4.8 has a heap-based buffer over-read in the function decompile_SWITCH() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/191"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/191 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | export ASAN_OPTIONS=allocator_may_return_null=1
./swftopython $poc
[segmentaion_fault_decompile_569-use_after_free-idx:0x1365-0x2.zip](https://github.com/libming/libming/files/4028582/segmentaion_fault_decompile_569-use_after_free-idx.0x1365-0x2.zip)
asan output
```
root@ubuntu:/home/tim/libming/util# export ASA... | heap overflow in decompile_SWITCH | https://api.github.com/repos/libming/libming/issues/191/comments | 0 | 2020-01-07T01:51:41Z | 2020-01-07T01:51:41Z | https://github.com/libming/libming/issues/191 | 546,033,507 | 191 |
CVE-2020-6629 | 2020-01-09T02:15:13.527 | Ming (aka libming) 0.4.8 has z NULL pointer dereference in the function decompileGETURL2() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/190"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/190 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | swftophp $poc
[libming_decompile762poc-out_of_mem-idx:0xfcd-0x0.zip](https://github.com/libming/libming/files/4028435/libming_decompile762poc-out_of_mem-idx.0xfcd-0x0.zip)
asan output
```
root@ubuntu:/home/tim/libming/util# ../../asan/libming/util/swftophp overflows/libming_decompile762poc-out_of_mem-idx\:0xf... | null pointer reference in decompileGETURL2 | https://api.github.com/repos/libming/libming/issues/190/comments | 0 | 2020-01-07T00:53:16Z | 2020-01-07T00:53:16Z | https://github.com/libming/libming/issues/190 | 546,016,991 | 190 |
CVE-2020-6630 | 2020-01-09T02:15:13.590 | An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_isom_get_media_data_size() in isomedia/isom_read.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1377"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1377 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ yes] I looked for a similar issue and couldn't find any.
- [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ yes] I give en... | null pointer reference in gf_isom_get_media_data_size | https://api.github.com/repos/gpac/gpac/issues/1377/comments | 1 | 2020-01-02T00:45:04Z | 2020-01-08T15:42:17Z | https://github.com/gpac/gpac/issues/1377 | 544,416,874 | 1,377 |
CVE-2020-6631 | 2020-01-09T02:15:13.653 | An issue was discovered in GPAC version 0.8.0. There is a NULL pointer dereference in the function gf_m2ts_stream_process_pmt() in media_tools/m2ts_mux.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1378"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1378 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ yes] I looked for a similar issue and couldn't find any.
- [ yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ yes] I give en... | null pointer reference in gf_m2ts_stream_process_pmt | https://api.github.com/repos/gpac/gpac/issues/1378/comments | 2 | 2020-01-02T00:49:55Z | 2020-01-17T15:09:51Z | https://github.com/gpac/gpac/issues/1378 | 544,417,280 | 1,378 |
CVE-2019-11251 | 2020-02-03T16:15:11.140 | The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attac... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/87773"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/d/msg/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E20ECB8-B503-4DB2-BCDB-D28E53523C9E",
"versionEndExcluding": "1.13.11",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/87773 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | A security issue was discovered in kubectl versions v1.13.10, v1.14.6, and v1.15.3. The issue is of a medium severity and upgrading of kubectl is encouraged to fix the vulnerability.
**Am I vulnerable?**
Run kubectl version --client and if it returns versions v1.13.10, v1.14.6, and v1.15.3, you are running a vuln... | CVE-2019-11251: kubectl cp symlink vulnerability | https://api.github.com/repos/kubernetes/kubernetes/issues/87773/comments | 3 | 2020-02-03T15:12:22Z | 2022-10-14T02:00:16Z | https://github.com/kubernetes/kubernetes/issues/87773 | 559,146,411 | 87,773 |
CVE-2016-7523 | 2020-02-06T14:15:10.737 | coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/09/22/2"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bug... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/ImageMagick/ImageMagick/issues/94 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537420
| heap-buffer-overflow in coders/meta.c:496 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/94/comments | 2 | 2016-01-24T01:29:08Z | 2016-01-25T00:23:16Z | https://github.com/ImageMagick/ImageMagick/issues/94 | 128,365,381 | 94 |
CVE-2016-7524 | 2020-02-06T14:15:10.830 | coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2016/09/22/2"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bug... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/ImageMagick/ImageMagick/issues/96 | [
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537422
| heap-buffer-overflow in coders/meta.c:465 | https://api.github.com/repos/ImageMagick/ImageMagick/issues/96/comments | 3 | 2016-01-24T01:29:30Z | 2020-02-10T03:00:49Z | https://github.com/ImageMagick/ImageMagick/issues/96 | 128,365,398 | 96 |
CVE-2020-8089 | 2020-02-10T16:15:14.267 | Piwigo 2.10.1 is affected by stored XSS via the Group Name Field to the group_list page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1150"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://piwigo... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/Piwigo/Piwigo/issues/1150 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Description:
Piwigo version 2.10.1 is affected by stored cross site scripting vulnerability. This vulnerability exists in "Group Name" Field in "group_list" page.
How to reproduce:
1. Login into the application.
2. Go to the "Users" -> "Groups" page from life navigation menu.
3. Click on "Add Group" button a... | Stored Cross-Site Scripting vulnerability in Piwigo CMS | https://api.github.com/repos/Piwigo/Piwigo/issues/1150/comments | 1 | 2020-01-20T13:47:13Z | 2020-03-25T14:32:53Z | https://github.com/Piwigo/Piwigo/issues/1150 | 552,310,420 | 1,150 |
CVE-2020-10251 | 2020-03-10T04:15:11.533 | In ImageMagick 7.0.9, an out-of-bounds read vulnerability exists within the ReadHEICImageByID function in coders\heic.c. It can be triggered via an image with a width or height value that exceeds the actual size of the image. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1859"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A044015-839F-4D63-A002-1F7806C41365",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/ImageMagick/ImageMagick/issues/1859 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [Y] I have written a descriptive issue title
- [Y] I have verified that I am using the latest version of ImageMagick
- [Y] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | ImageMagick "ReadHEICImageByID()" Out-of-bounds read vulnerability | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1859/comments | 6 | 2020-03-03T19:01:32Z | 2020-06-17T12:24:04Z | https://github.com/ImageMagick/ImageMagick/issues/1859 | 574,875,269 | 1,859 |
CVE-2019-20628 | 2020-03-24T19:15:20.947 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8",
"versionEndExcluding": "0.8.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1269 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hi,
Our fuzzer found an UAF on MP4Box (the latest commit 987169b on master).
PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_uaf_mpegts.c:2183
Command: MP4Box -info $PoC
ASAN says:
~~~
==12341==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300000efb0 at pc 0x00000098190d bp 0... | Use After Free (mpegts.c:2183) | https://api.github.com/repos/gpac/gpac/issues/1269/comments | 1 | 2019-07-06T00:10:37Z | 2019-07-07T15:59:17Z | https://github.com/gpac/gpac/issues/1269 | 464,799,448 | 1,269 |
CVE-2019-20629 | 2020-03-24T19:15:21.007 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8",
"versionEndExcluding": "0.8.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1264 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hi,
Our fuzzer found a crash on MP4Box (the latest commit 987169b on master) due to a heap buffer overflow on function gf_m2ts_process_pmt.
PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_gf_m2ts_process_pmt
Command: MP4Box -info $PoC
ASAN says:
~~~
==19178==ERROR: AddressSanitizer: he... | SEGV (heap-buffer-overflow) on gf_m2ts_process_pmt | https://api.github.com/repos/gpac/gpac/issues/1264/comments | 1 | 2019-07-05T22:57:04Z | 2019-07-07T15:57:21Z | https://github.com/gpac/gpac/issues/1264 | 464,791,707 | 1,264 |
CVE-2019-20630 | 2020-03-24T19:15:21.070 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8",
"versionEndExcluding": "0.8.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1268 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hi,
Our fuzzer found a buffer overflow on MP4Box (the latest commit 987169b on master).
PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_hbo_BS_ReadByte
Command: MP4Box -info $PoC
ASAN says:
~~~
==27934==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b00000a236 at pc 0x0000004... | heap-buffer-overflow on BS_ReadByte | https://api.github.com/repos/gpac/gpac/issues/1268/comments | 1 | 2019-07-06T00:10:13Z | 2019-07-07T15:59:28Z | https://github.com/gpac/gpac/issues/1268 | 464,799,415 | 1,268 |
CVE-2019-20631 | 2020-03-24T19:15:21.133 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_list_count in utils/list.c that can cause a denial of service via a crafted MP4 file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1270"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8",
"versionEndExcluding": "0.8.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1270 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hi,
Our fuzzer found an UAF on MP4Box (the latest commit 987169b on master).
PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_list_count
Command: MP4Box -info $PoC
ASAN says:
~~~
==19963==ERROR: AddressSanitizer: SEGV on unknown address 0x00047fff8001 (pc 0x00000047a43d bp 0x6080000... | SEGV on unknown address on gf_list_count | https://api.github.com/repos/gpac/gpac/issues/1270/comments | 1 | 2019-07-06T00:11:01Z | 2019-07-07T16:00:40Z | https://github.com/gpac/gpac/issues/1270 | 464,799,484 | 1,270 |
CVE-2019-20632 | 2020-03-24T19:15:21.180 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains an invalid pointer dereference in gf_odf_delete_descriptor in odf/desc_private.c that can cause a denial of service via a crafted MP4 file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1271"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "123D0430-86B1-40BF-9B43-C782CC2EDDE8",
"versionEndExcluding": "0.8.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/1271 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hi,
Our fuzzer found a crash on MP4Box (the latest commit 987169b on master).
PoC: https://github.com/strongcourage/PoCs/blob/master/gpac_987169b/PoC_segv_gf_odf_delete_descriptor
Command: MP4Box -diso $PoC
ASAN says:
~~~
==26490==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000ff00 (pc 0x000000c3ef6d ... | SEGV on unknown addres on gf_odf_delete_descriptor | https://api.github.com/repos/gpac/gpac/issues/1271/comments | 1 | 2019-07-06T00:25:31Z | 2019-07-07T16:01:07Z | https://github.com/gpac/gpac/issues/1271 | 464,800,676 | 1,271 |
CVE-2020-9467 | 2020-03-26T20:15:11.427 | Piwigo 2.10.1 has stored XSS via the file parameter in a /ws.php request because of the pwg.images.setInfo function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/159191/Piwigo-2.10.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:2.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8B6457-1AF4-4B29-AF6E-9682E45BB2A9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/Piwigo/Piwigo/issues/1168 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | on `file` param. No worry with an admin, but this method can be used by a community user as well.
Originally reported by Zak S. see CVE-2020-9467 | stored XSS with pwg.images.setInfo | https://api.github.com/repos/Piwigo/Piwigo/issues/1168/comments | 1 | 2020-03-24T13:03:01Z | 2020-03-28T05:54:16Z | https://github.com/Piwigo/Piwigo/issues/1168 | 586,943,552 | 1,168 |
CVE-2020-8551 | 2020-03-27T15:15:12.647 | The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.3,
"confidentialityImpact": "N... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/89377"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://groups.google.com/forum/#%21topic/kuber... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44ECF71D-7483-45B0-8BF5-92284C11696C",
"versionEndExcluding": null,
"versionEndIncluding": "1.15.9",
"versionStart... | https://github.com/kubernetes/kubernetes/issues/89377 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Medium)
The Kubelet has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served... | CVE-2020-8551: Kubelet DoS via API | https://api.github.com/repos/kubernetes/kubernetes/issues/89377/comments | 7 | 2020-03-23T18:34:40Z | 2021-12-02T22:55:29Z | https://github.com/kubernetes/kubernetes/issues/89377 | 586,428,637 | 89,377 |
CVE-2020-8552 | 2020-03-27T15:15:12.757 | The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/89378"
},
{
"source": "jordan@liggitt.net",
"tags": null,
"url": "https://groups.google.com/forum/#%21topic/kuber... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07761E41-21F4-466F-A602-4DC9BD1257CE",
"versionEndExcluding": null,
"versionEndIncluding": "1.15.9",
"versionStart... | https://github.com/kubernetes/kubernetes/issues/89378 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (Medium)
The Kubernetes API server has been found to be vulnerable to a denial of service attack via authorized API requests.
### Am I vulnerable?
If an attacker t... | CVE-2020-8552: apiserver DoS (oom) | https://api.github.com/repos/kubernetes/kubernetes/issues/89378/comments | 4 | 2020-03-23T18:35:34Z | 2021-12-02T22:55:22Z | https://github.com/kubernetes/kubernetes/issues/89378 | 586,429,123 | 89,378 |
CVE-2019-11254 | 2020-04-01T21:15:13.397 | The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/89535"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://groups.google.com/d/msg/kubernetes-announce/AL... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87849953-B423-4E3B-A977-A62A88B40037",
"versionEndExcluding": "1.15.10",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/89535 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVE-2019-11254 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML payloads to cause kube-apiserver to consume excessive CPU cycles while parsing YAML.
The issue was discovered via the fuzz test kubernetes/kubernetes#83750.
**Affected components:**
Kuber... | CVE-2019-11254: kube-apiserver Denial of Service vulnerability from malicious YAML payloads | https://api.github.com/repos/kubernetes/kubernetes/issues/89535/comments | 2 | 2020-03-26T18:55:26Z | 2022-08-23T02:18:32Z | https://github.com/kubernetes/kubernetes/issues/89535 | 588,652,998 | 89,535 |
CVE-2020-11558 | 2020-04-05T20:15:12.650 | An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1440 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | 3 UAF bugs in box_funcs.c | https://api.github.com/repos/gpac/gpac/issues/1440/comments | 4 | 2020-03-24T17:16:05Z | 2020-03-26T19:28:46Z | https://github.com/gpac/gpac/issues/1440 | 587,134,103 | 1,440 |
CVE-2020-11894 | 2020-04-19T19:15:12.477 | Ming (aka libming) 0.4.8 has a heap-based buffer over-read (8 bytes) in the function decompileIF() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/196"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/196 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ./swftocxx $poc
[segmentaion_fault_decompile_569-out_of_bound-idx:0x1199-0xb.zip](https://github.com/libming/libming/files/4490660/segmentaion_fault_decompile_569-out_of_bound-idx.0x1199-0xb.zip)
```
root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56... | heap overflow in decompileIF decompile.c:2473 | https://api.github.com/repos/libming/libming/issues/196/comments | 0 | 2020-04-17T02:47:07Z | 2020-04-17T02:47:07Z | https://github.com/libming/libming/issues/196 | 601,663,070 | 196 |
CVE-2020-11895 | 2020-04-19T19:15:12.977 | Ming (aka libming) 0.4.8 has a heap-based buffer over-read (2 bytes) in the function decompileIF() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/197"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/197 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ./swftocxx $poc
[segmentaion_fault_decompile_569-out_of_bound-idx:0x1186-0x10.zip](https://github.com/libming/libming/files/4490668/segmentaion_fault_decompile_569-out_of_bound-idx.0x1186-0x10.zip)
```
root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56... | heap overflow in decompileIF decompile.c:2436 | https://api.github.com/repos/libming/libming/issues/197/comments | 0 | 2020-04-17T02:50:13Z | 2020-04-17T02:50:13Z | https://github.com/libming/libming/issues/197 | 601,663,990 | 197 |
CVE-2020-13622 | 2020-05-27T00:15:11.497 | JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3787"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/pull... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3787 | [
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9
###### Build platform
Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64)
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--error-... | Assertion 'ecma_is_value_string (value)' failed at jerry-core/ecma/base/ecma-helpers-value.c(ecma_get_string_from_value):742 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3787/comments | 0 | 2020-05-23T17:53:33Z | 2020-05-26T13:22:51Z | https://github.com/jerryscript-project/jerryscript/issues/3787 | 623,709,607 | 3,787 |
CVE-2020-13623 | 2020-05-27T00:15:11.557 | JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3785"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3785 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9
###### Build platform
Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64)
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--error-... | Stack Exhaustion (ecma_proxy_object_get, ecma_proxy_object_set) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3785/comments | 3 | 2020-05-23T08:58:58Z | 2020-05-26T07:44:39Z | https://github.com/jerryscript-project/jerryscript/issues/3785 | 623,613,918 | 3,785 |
CVE-2020-13649 | 2020-05-28T15:15:11.980 | parser/js/js-scanner.c in JerryScript 2.2.0 mishandles errors during certain out-of-memory conditions, as demonstrated by a scanner_reverse_info_list NULL pointer dereference and a scanner_scan_all assertion failure. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/commit/69f8e78c2f8d562bd6d8002b5488f1662ac30d24"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3786 | [
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9
###### Build platform
Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64)
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--error-... | NULL dereference in scanner_reverse_info_list | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3786/comments | 0 | 2020-05-23T17:46:47Z | 2020-05-27T12:40:44Z | https://github.com/jerryscript-project/jerryscript/issues/3786 | 623,708,437 | 3,786 |
CVE-2020-13649 | 2020-05-28T15:15:11.980 | parser/js/js-scanner.c in JerryScript 2.2.0 mishandles errors during certain out-of-memory conditions, as demonstrated by a scanner_reverse_info_list NULL pointer dereference and a scanner_scan_all assertion failure. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/commit/69f8e78c2f8d562bd6d8002b5488f1662ac30d24"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3788 | [
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9
###### Build platform
Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64)
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--error-... | Assertion 'context_p->error == PARSER_ERR_NO_ERROR' failed at jerry-core/parser/js/js-scanner.c(scanner_scan_all):3196 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3788/comments | 0 | 2020-05-23T17:56:43Z | 2020-05-27T12:40:44Z | https://github.com/jerryscript-project/jerryscript/issues/3788 | 623,710,199 | 3,788 |
CVE-2020-13597 | 2020-06-03T17:15:24.887 | Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "psirt@tigera.io",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/91507"
},
{
"source": "psirt@tigera.io",
"tags": null,
"url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "95DB38FE-A03E-456B-874A-A58C31BE7592",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.2",
"versi... | https://github.com/kubernetes/kubernetes/issues/91507 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L) (6.0 Medium)
A cluster configured to use an affected container networking implementation is susceptible to man-in-the-middle (MitM) attacks. By sending “rogue” router ad... | CVE-2020-10749: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements | https://api.github.com/repos/kubernetes/kubernetes/issues/91507/comments | 7 | 2020-05-27T19:32:29Z | 2022-09-14T11:48:50Z | https://github.com/kubernetes/kubernetes/issues/91507 | 625,973,443 | 91,507 |
CVE-2020-8555 | 2020-06-05T17:15:11.640 | The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/01/4"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://w... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB84B14-8D71-4BEA-90FC-DB76F9A0F781",
"versionEndExcluding": "1.15.11",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/91542 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)
There exists a Server Side Request Forgery (SSRF) vulnerability in kube-controller-manager that allows certain authorized users to leak up to 500 bytes of arbitrary info... | CVE-2020-8555: Half-Blind SSRF in kube-controller-manager | https://api.github.com/repos/kubernetes/kubernetes/issues/91542/comments | 4 | 2020-05-28T16:13:34Z | 2021-12-02T22:54:48Z | https://github.com/kubernetes/kubernetes/issues/91542 | 626,636,248 | 91,542 |
CVE-2020-14163 | 2020-06-15T21:15:10.553 | An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3804 | [
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
7a20150ae747742c178e7d61bb4b3c71476925e2
###### Build platform
Ubuntu 18.04.4 LTS (Linux 4.15.0-91-generic x86_64)
and
ProductName: Mac OS X
ProductVersion: 10.15.4
BuildVersion: 19E287
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --com... | Memory corruption in ecma_gc_set_object_visited (jerry-core/ecma/base/ecma-gc.c:85) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3804/comments | 0 | 2020-05-27T18:29:22Z | 2020-05-28T05:55:17Z | https://github.com/jerryscript-project/jerryscript/issues/3804 | 625,930,295 | 3,804 |
CVE-2019-20909 | 2020-07-16T18:15:12.690 | An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/commit/d7913b893bfa98fab27f05825dc4cab2d3a20c83"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E3A7DE-65A0-4A6B-BF63-00F627CF17CB",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.3",
"versionStartExcluding"... | https://github.com/LibreDWG/libredwg/issues/178 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
I got some bugs, and I tested on master branch and version **0.9.3**. There are **3 heap overflow**, **2 NULL pointer deference**, **1 denial of service**, **1 stack overflow** (this bug causes memory leak in master branch) in that.
Compile with **ASAN** and use **dwgrewrite** to repro that.
Hear are some detail... | Several bugs need to be fixed. | https://api.github.com/repos/LibreDWG/libredwg/issues/178/comments | 18 | 2019-12-31T06:04:23Z | 2020-01-16T12:12:03Z | https://github.com/LibreDWG/libredwg/issues/178 | 544,098,538 | 178 |
CVE-2020-15807 | 2020-07-17T16:15:11.560 | GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/186"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53",
"versionEndExcluding": "0.11",
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/LibreDWG/libredwg/issues/186 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hello, I got a NULL pointer deference bug in **0.10.1.2677 and even earlier** by run `dxf2dwg poc -o /dev/null`
```
==12391==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f9f9b4f3284 bp 0x7ffcfa3b08a0 sp 0x7ffcfa3b0860 T0)
==12391==The signal is caused by a READ memory access.
==12391==Hi... | NULL pointer deference | https://api.github.com/repos/LibreDWG/libredwg/issues/186/comments | 3 | 2020-01-14T12:30:37Z | 2020-07-20T02:14:44Z | https://github.com/LibreDWG/libredwg/issues/186 | 549,536,132 | 186 |
CVE-2020-15807 | 2020-07-17T16:15:11.560 | GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/186"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53",
"versionEndExcluding": "0.11",
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/LibreDWG/libredwg/issues/189 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`. | Some NULL pointer bugs | https://api.github.com/repos/LibreDWG/libredwg/issues/189/comments | 58 | 2020-01-16T11:36:57Z | 2020-07-20T02:15:32Z | https://github.com/LibreDWG/libredwg/issues/189 | 550,751,408 | 189 |
CVE-2020-15807 | 2020-07-17T16:15:11.560 | GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/186"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53",
"versionEndExcluding": "0.11",
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/LibreDWG/libredwg/issues/190 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`. | Some heap_overflow bug | https://api.github.com/repos/LibreDWG/libredwg/issues/190/comments | 5 | 2020-01-16T11:51:56Z | 2020-07-20T02:16:17Z | https://github.com/LibreDWG/libredwg/issues/190 | 550,758,758 | 190 |
CVE-2020-8559 | 2020-07-22T14:15:16.517 | The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6,
"confidentialityImpact": "PART... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/92914"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43222A9D-6D48-490F-8120-349DCE1C1218",
"versionEndExcluding": null,
"versionEndIncluding": "1.15.0",
"versionStart... | https://github.com/kubernetes/kubernetes/issues/92914 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: Medium (6.4) [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)
If an attacker is able to intercept certain requests to the Kubelet, they can send a redirect response that may be followed by a client using the credential... | CVE-2020-8559: Privilege escalation from compromised node to cluster | https://api.github.com/repos/kubernetes/kubernetes/issues/92914/comments | 7 | 2020-07-08T17:03:16Z | 2021-12-02T22:54:32Z | https://github.com/kubernetes/kubernetes/issues/92914 | 653,456,402 | 92,914 |
CVE-2020-8557 | 2020-07-23T17:15:12.513 | The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/93032"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12849C27-DD8A-4D84-92FD-3AB32B43742B",
"versionEndExcluding": "1.16.13",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/93032 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: Medium (5.5) [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M)
The `/etc/hosts` file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral ... | CVE-2020-8557: Node disk DOS by writing to container /etc/hosts | https://api.github.com/repos/kubernetes/kubernetes/issues/93032/comments | 3 | 2020-07-13T18:39:08Z | 2021-12-02T22:54:24Z | https://github.com/kubernetes/kubernetes/issues/93032 | 656,058,152 | 93,032 |
CVE-2020-8558 | 2020-07-27T20:15:12.413 | The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachabl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/92315"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mailing List",
"Miti... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9586C74C-1239-4E96-89A6-F618D14EF889",
"versionEndExcluding": null,
"versionEndIncluding": "1.16.10",
"versionStar... | https://github.com/kubernetes/kubernetes/issues/92315 | [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating:
In typical clusters: medium (5.4) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
In clusters where API server insecure port has not been disabled: high (8.8) [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://... | CVE-2020-8558: Node setting allows for neighboring hosts to bypass localhost boundary | https://api.github.com/repos/kubernetes/kubernetes/issues/92315/comments | 17 | 2020-06-19T18:38:58Z | 2021-12-02T22:54:39Z | https://github.com/kubernetes/kubernetes/issues/92315 | 642,156,921 | 92,315 |
CVE-2020-8553 | 2020-07-29T15:15:13.450 | The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "PARTI... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/ingress-nginx/issues/5126"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60159025-3CB0-40E3-B960-4479582F192F",
"versionEndExcluding": "0.28.0",
"versionEndIncluding": null,
"versionSt... | https://github.com/kubernetes/ingress-nginx/issues/5126 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | A security issue was discovered in ingress-nginx versions older than v0.28.0. The issue is of medium severity, and upgrading is encouraged to fix the vulnerability.
**Am I vulnerable?**
The vulnerability exists only if the annotation [nginx.ingress.kubernetes.io/auth-type: basic](https://kubernetes.github.io/ingr... | CVE-2020-8553: auth-type basic annotation vulnerability | https://api.github.com/repos/kubernetes/ingress-nginx/issues/5126/comments | 4 | 2020-02-19T19:00:32Z | 2020-07-30T11:33:35Z | https://github.com/kubernetes/ingress-nginx/issues/5126 | 567,776,445 | 5,126 |
CVE-2020-24344 | 2020-08-13T19:15:13.740 | JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3976"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.0",
"versionStar... | https://github.com/jerryscript-project/jerryscript/issues/3976 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ### JerryScript revision
git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2
### Test case
```javascript
( function ( { a = arguments }) {
const arguments
}
)
```
In debug build, it triggers an assertion 'scope_stack_p > context_p->scope_stack_p' failed
### Execution steps
./jerry poc.js
### Bui... | Heap overflow in jerry-core | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3976/comments | 14 | 2020-07-05T20:43:50Z | 2021-06-16T09:03:07Z | https://github.com/jerryscript-project/jerryscript/issues/3976 | 651,142,365 | 3,976 |
CVE-2020-24345 | 2020-08-13T19:15:13.807 | JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3977"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01F91CD4-9EFF-4338-A18E-64F109090995",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.0",
"versionStar... | https://github.com/jerryscript-project/jerryscript/issues/3977 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ### JerryScript revision
git hash: 392ee717128f6daaf0b94e54fc9512eb26d680e2
### Test case
```javascript
function a() { new new Proxy(a, {}) }
JSON.parse("[]", a)
```
### Execution steps
./jerry poc.js
### Build cmd
python tools/build.py --compile-flag="-fsanitize=address"
Stack dump:
---
```
ASAN:... | Stack overflow in ecma_is_lexical_environment | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3977/comments | 1 | 2020-07-06T05:01:36Z | 2020-07-06T13:02:51Z | https://github.com/jerryscript-project/jerryscript/issues/3977 | 651,247,064 | 3,977 |
CVE-2020-23814 | 2020-09-03T17:15:11.097 | Multiple cross-site scripting (XSS) vulnerabilities in xxl-job v2.2.0 allow remote attackers to inject arbitrary web script or HTML via (1) AppName and (2)AddressList parameter in JobGroupController.java file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/xuxueli/xxl-job/issues/1866"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.ccsq8.com/issues.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/xuxueli/xxl-job/issues/1866 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"xuxueli",
"xxl-job"
] | Locate the executor management function:
https://github.com/xuxueli/xxl-job/blob/289f02185b952f4652a4a7daf4ac3c6384f338bc/xxl-job-admin/src/main/java/com/xxl/job/admin/controller/JobGroupController.java
insert POC there has front-end validation,By code audit, I find that the back end only has length validation.Can be... | v2.2.0 Stored XSS vulnerabilities | https://api.github.com/repos/xuxueli/xxl-job/issues/1866/comments | 5 | 2020-07-30T09:30:54Z | 2021-02-16T15:18:29Z | https://github.com/xuxueli/xxl-job/issues/1866 | 668,541,948 | 1,866 |
CVE-2020-13991 | 2020-09-24T23:15:13.540 | vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/googleprojectzero/fuzzilli#JerryScript"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3858 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
c09c2c5dd7144d97b8b32cc2697d5b04bb647e35
###### Build platform
Ubuntu 18.04 LTS
###### Build steps
python tools/build.py --profile=es2015-subset --lto=off --error-messages=on --strip=off --compile-flag=-fsanitize=address
###### Test case
```
function main() {
const v1 = ~21474... | SEGV in ecma_deref_ecma_string | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3858/comments | 0 | 2020-06-05T03:38:44Z | 2020-06-06T16:39:42Z | https://github.com/jerryscript-project/jerryscript/issues/3858 | 631,287,137 | 3,858 |
CVE-2020-13991 | 2020-09-24T23:15:13.540 | vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/googleprojectzero/fuzzilli#JerryScript"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3859 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
c09c2c5dd7144d97b8b32cc2697d5b04bb647e35
###### Build platform
Ubuntu 18.04 LTS
###### Build steps
python tools/build.py --profile=es2015-subset --lto=off --error-messages=on --strip=off --compile-flag=-fsanitize=address
###### Test case
```
function main() {
const v3 = {a:13.... | SEGV in jmem_pools_finalize | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3859/comments | 0 | 2020-06-05T03:41:34Z | 2020-06-06T16:39:42Z | https://github.com/jerryscript-project/jerryscript/issues/3859 | 631,287,983 | 3,859 |
CVE-2020-13991 | 2020-09-24T23:15:13.540 | vm/opcodes.c in JerryScript 2.2.0 allows attackers to hijack the flow of control by controlling a register. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/googleprojectzero/fuzzilli#JerryScript"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3860 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
c09c2c5dd7144d97b8b32cc2697d5b04bb647e35
###### Build platform
Ubuntu 18.04 LTS
###### Build steps
python tools/build.py --profile=es2015-subset --lto=off --error-messages=on --strip=off --compile-flag=-fsanitize=address
###### Test case
```
function main() {
const v4 = [13.37... | SIGABRT in jerry_port_fatal | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3860/comments | 3 | 2020-06-05T03:46:21Z | 2020-06-06T16:39:41Z | https://github.com/jerryscript-project/jerryscript/issues/3860 | 631,289,340 | 3,860 |
CVE-2020-21564 | 2020-09-30T18:15:24.303 | An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/83"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.10:dev2:*:*:*:*:*:*",
"matchCriteriaId": "960CA1A9-1510-488A-82C2-14AFA3AF7FBE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/pluck-cms/pluck/issues/83 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | Vulnerability location:
/data/inc/file.php line:42

If the file name is '.htaccess', the strpos function returns a result of 0.
Demo:
Upload these two files in the management file interface.

... | Pluck-4.7.11 admin background exists a remote command execution vulnerability when uploading files | https://api.github.com/repos/pluck-cms/pluck/issues/91/comments | 10 | 2019-12-19T15:37:06Z | 2020-01-08T06:45:09Z | https://github.com/pluck-cms/pluck/issues/91 | 540,390,005 | 91 |
CVE-2020-19667 | 2020-11-20T16:15:15.557 | Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/1895"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.0.10-7:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D172B4-41A4-4E14-A094-EEBBAB83ECAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/ImageMagick/ImageMagick/issues/1895 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [✅ ] I have written a descriptive issue title
- [ ✅] I have verified that I am using the latest version of ImageMagick
- [ ✅] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues... | stack-buffer-overflow at /coders/xpm.c:232 in ReadXPMImage | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1895/comments | 9 | 2020-04-14T10:46:31Z | 2020-11-30T07:10:48Z | https://github.com/ImageMagick/ImageMagick/issues/1895 | 599,474,018 | 1,895 |
CVE-2020-8563 | 2020-12-07T22:15:21.197 | In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log. This affects < v1.19.3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/95621"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://groups.go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "515661A5-8AFF-45B7-932C-3B5CD32945F0",
"versionEndExcluding": "1.19.3",
"versionEndIncluding": null,
"versionStart... | https://github.com/kubernetes/kubernetes/issues/95621 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N (Medium)
In Kubernetes clusters using VSphere as a cloud provider, with a logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager's log.
### Am I vulnerable?
If you are using VSphere as a cloud provide... | CVE-2020-8563: Secret leaks in kube-controller-manager when using vSphere provider | https://api.github.com/repos/kubernetes/kubernetes/issues/95621/comments | 3 | 2020-10-15T22:00:44Z | 2021-12-02T22:54:17Z | https://github.com/kubernetes/kubernetes/issues/95621 | 722,704,051 | 95,621 |
CVE-2020-8564 | 2020-12-07T22:15:21.307 | In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials. This affects < v1.19.3, < v1.18.10, < v1.17.13. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/95622"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://groups.go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B765012B-C658-4EB8-956A-62A91142CE05",
"versionEndExcluding": "1.17.13",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/95622 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (Medium)
In Kubernetes clusters using a logging level of at least 4, processing a malformed docker config file will result in the contents of the docker config file being leaked, which can include pull secrets or other registry credentials.
### Am I vu... | CVE-2020-8564: Docker config secrets leaked when file is malformed and log level >= 4 | https://api.github.com/repos/kubernetes/kubernetes/issues/95622/comments | 3 | 2020-10-15T22:03:19Z | 2021-12-02T22:54:10Z | https://github.com/kubernetes/kubernetes/issues/95622 | 722,705,294 | 95,622 |
CVE-2020-8565 | 2020-12-07T22:15:21.400 | In Kubernetes, if the logging level is set to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like kubectl. This affects <= v1.19.3, <= v1.18.10, <= v1.17.13, < v1.20.0-alpha2. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/95623"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://groups.go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC4DF80-12A5-482D-88C8-1939A015FBE4",
"versionEndExcluding": null,
"versionEndIncluding": "1.17.13",
"versionStar... | https://github.com/kubernetes/kubernetes/issues/95623 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (Medium)
In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`.
### Am I vulnerable?
If kube-apiserver is using ... | CVE-2020-8565: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 | https://api.github.com/repos/kubernetes/kubernetes/issues/95623/comments | 3 | 2020-10-15T22:05:32Z | 2021-12-02T22:54:04Z | https://github.com/kubernetes/kubernetes/issues/95623 | 722,706,304 | 95,623 |
CVE-2020-8566 | 2020-12-07T22:15:21.480 | In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/95624"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://groups.go... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B765012B-C658-4EB8-956A-62A91142CE05",
"versionEndExcluding": "1.17.13",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/95624 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: 4.7 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (Medium)
In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims.
... | CVE-2020-8566: Ceph RBD adminSecrets exposed in logs when loglevel >= 4 | https://api.github.com/repos/kubernetes/kubernetes/issues/95624/comments | 3 | 2020-10-15T22:07:53Z | 2021-12-02T22:53:56Z | https://github.com/kubernetes/kubernetes/issues/95624 | 722,707,368 | 95,624 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.