"-Synchronized-Data."

This commit is contained in:
CVE Team 2022-03-11 16:20:53 +00:00
parent 64d62893f3
commit da43eb88a0
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
45 changed files with 837 additions and 593 deletions

View File

@ -91,6 +91,11 @@
"name": "1033337",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033337"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-508/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-508/"
}
]
}

View File

@ -82,6 +82,16 @@
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03823en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03823en_us"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-507/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-507/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-506/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-506/"
}
]
}

View File

@ -97,6 +97,11 @@
"refsource": "FEDORA",
"name": "FEDORA-2022-486d5f349d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -48,6 +48,11 @@
"refsource": "MISC",
"name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003",
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-505/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-505/"
}
]
},

View File

@ -61,6 +61,16 @@
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193678",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193678"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-0c6402a6a3",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-0649006be6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
}
]
}

View File

@ -66,6 +66,16 @@
"refsource": "MISC",
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1193671",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1193671"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-0c6402a6a3",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5CSXQE7Q4TVDQJKFYBO4XDH3BZ7BLAR/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-0649006be6",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEJN7CPW6YCHBFQPFZKGA6AVA6T5NPIW/"
}
]
}

View File

@ -54,6 +54,11 @@
"url": "https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1117173",
"refsource": "MISC",
"name": "https://crbug.com/1117173"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1273609",
"refsource": "MISC",
"name": "https://crbug.com/1273609"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1245629",
"refsource": "MISC",
"name": "https://crbug.com/1245629"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1238209",
"refsource": "MISC",
"name": "https://crbug.com/1238209"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1249426",
"refsource": "MISC",
"name": "https://crbug.com/1249426"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1260129",
"refsource": "MISC",
"name": "https://crbug.com/1260129"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1272266",
"refsource": "MISC",
"name": "https://crbug.com/1272266"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1273661",
"refsource": "MISC",
"name": "https://crbug.com/1273661"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1274376",
"refsource": "MISC",
"name": "https://crbug.com/1274376"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1278960",
"refsource": "MISC",
"name": "https://crbug.com/1278960"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1248438",
"refsource": "MISC",
"name": "https://crbug.com/1248438"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1248444",
"refsource": "MISC",
"name": "https://crbug.com/1248444"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1261689",
"refsource": "MISC",
"name": "https://crbug.com/1261689"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1237310",
"refsource": "MISC",
"name": "https://crbug.com/1237310"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1241188",
"refsource": "MISC",
"name": "https://crbug.com/1241188"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1255713",
"refsource": "MISC",
"name": "https://crbug.com/1255713"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1039885",
"refsource": "MISC",
"name": "https://crbug.com/1039885"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1267627",
"refsource": "MISC",
"name": "https://crbug.com/1267627"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1268903",
"refsource": "MISC",
"name": "https://crbug.com/1268903"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1272250",
"refsource": "MISC",
"name": "https://crbug.com/1272250"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1115847",
"refsource": "MISC",
"name": "https://crbug.com/1115847"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1238631",
"refsource": "MISC",
"name": "https://crbug.com/1238631"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -54,6 +54,11 @@
"url": "https://crbug.com/1262953",
"refsource": "MISC",
"name": "https://crbug.com/1262953"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-d1a15f9cdb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/"
}
]
},

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0476",
"STATE": "PUBLIC",
"TITLE": "Denial of Service in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0476",
"STATE": "PUBLIC",
"TITLE": "Denial of Service in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
}
}
]
},
"vendor_name": "radareorg"
}
}
]
},
"vendor_name": "radareorg"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400 Uncontrolled Resource Consumption"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d"
},
{
"name": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b"
}
]
},
"source": {
"advisory": "81ddfbda-6c9f-4b69-83ff-85b15141e35d",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400 Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d"
},
{
"name": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},
"source": {
"advisory": "81ddfbda-6c9f-4b69-83ff-85b15141e35d",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0518",
"STATE": "PUBLIC",
"TITLE": "Heap-based Buffer Overflow in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.2"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0518",
"STATE": "PUBLIC",
"TITLE": "Heap-based Buffer Overflow in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.2"
}
]
}
}
]
},
"vendor_name": "radareorg"
}
}
]
},
"vendor_name": "radareorg"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184"
},
{
"name": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa"
}
]
},
"source": {
"advisory": "10051adf-7ddc-4042-8fd0-8e9e0c5b1184",
"discovery": "EXTERNAL"
}
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184"
},
{
"name": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},
"source": {
"advisory": "10051adf-7ddc-4042-8fd0-8e9e0c5b1184",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0519",
"STATE": "PUBLIC",
"TITLE": "Buffer Access with Incorrect Length Value in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.2"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0519",
"STATE": "PUBLIC",
"TITLE": "Buffer Access with Incorrect Length Value in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.2"
}
]
}
}
]
},
"vendor_name": "radareorg"
}
}
]
},
"vendor_name": "radareorg"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-805 Buffer Access with Incorrect Length Value"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3"
},
{
"name": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5"
}
]
},
"source": {
"advisory": "af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3",
"discovery": "EXTERNAL"
}
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-805 Buffer Access with Incorrect Length Value"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3"
},
{
"name": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},
"source": {
"advisory": "af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3",
"discovery": "EXTERNAL"
}
}

View File

@ -79,6 +79,11 @@
"name": "https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/8525ad0b9fd596f4b251bb3d7b114e6dc7ce1ee8"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},

View File

@ -79,6 +79,11 @@
"name": "https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},

View File

@ -79,6 +79,11 @@
"name": "https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/d17a7bdf166108a29a27cd89bf454f9fa6c050d6"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0523",
"STATE": "PUBLIC",
"TITLE": "Expired Pointer Dereference in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.2"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0523",
"STATE": "PUBLIC",
"TITLE": "Expired Pointer Dereference in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.2"
}
]
}
}
]
},
"vendor_name": "radareorg"
}
}
]
},
"vendor_name": "radareorg"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-825 Expired Pointer Dereference"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69"
},
{
"name": "https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269"
}
]
},
"source": {
"advisory": "9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69",
"discovery": "EXTERNAL"
}
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-825 Expired Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69"
},
{
"name": "https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},
"source": {
"advisory": "9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69",
"discovery": "EXTERNAL"
}
}

View File

@ -79,6 +79,11 @@
"name": "https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},

View File

@ -79,6 +79,11 @@
"name": "https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0695",
"STATE": "PUBLIC",
"TITLE": "Denial of Service in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0695",
"STATE": "PUBLIC",
"TITLE": "Denial of Service in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
}
}
]
},
"vendor_name": "radareorg"
}
}
]
},
"vendor_name": "radareorg"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400 Uncontrolled Resource Consumption"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea"
},
{
"name": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf"
}
]
},
"source": {
"advisory": "bdbddc0e-fb06-4211-a90b-7cbedcee2bea",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400 Uncontrolled Resource Consumption"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea"
},
{
"name": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},
"source": {
"advisory": "bdbddc0e-fb06-4211-a90b-7cbedcee2bea",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0712",
"STATE": "PUBLIC",
"TITLE": "NULL Pointer Dereference in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0712",
"STATE": "PUBLIC",
"TITLE": "NULL Pointer Dereference in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
}
}
]
},
"vendor_name": "radareorg"
}
}
]
},
"vendor_name": "radareorg"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466"
},
{
"name": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7"
}
]
},
"source": {
"advisory": "1e572820-e502-49d1-af0e-81833e2eb466",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466"
},
{
"name": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},
"source": {
"advisory": "1e572820-e502-49d1-af0e-81833e2eb466",
"discovery": "EXTERNAL"
}
}

View File

@ -1,89 +1,94 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0713",
"STATE": "PUBLIC",
"TITLE": "Heap-based Buffer Overflow in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-0713",
"STATE": "PUBLIC",
"TITLE": "Heap-based Buffer Overflow in radareorg/radare2"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "radareorg/radare2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "5.6.4"
}
]
}
}
]
},
"vendor_name": "radareorg"
}
}
]
},
"vendor_name": "radareorg"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c"
},
{
"name": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1"
}
]
},
"source": {
"advisory": "d35b3dff-768d-4a09-a742-c18ca8f56d3c",
"discovery": "EXTERNAL"
}
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c"
},
{
"name": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1",
"refsource": "MISC",
"url": "https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-7db9e7bb5b",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/"
}
]
},
"source": {
"advisory": "d35b3dff-768d-4a09-a742-c18ca8f56d3c",
"discovery": "EXTERNAL"
}
}

View File

@ -115,6 +115,16 @@
"name": "https://github.com/pypa/pipenv/releases/tag/v2022.1.8",
"refsource": "MISC",
"url": "https://github.com/pypa/pipenv/releases/tag/v2022.1.8"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-77ce20f03a",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHQRIWKDP3SVJABAPEXBIQPKDI6UP7G4/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2022-508e460384",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KCROBYHUS6DKQPCXBRPCZ5CDBNQTYAWT/"
}
]
},

View File

@ -48,20 +48,24 @@
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199",
"name": "https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199"
},
{
"refsource": "CONFIRM",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245"
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245",
"name": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/steveukx/git-js/pull/767"
"refsource": "MISC",
"url": "https://github.com/steveukx/git-js/pull/767",
"name": "https://github.com/steveukx/git-js/pull/767"
},
{
"refsource": "CONFIRM",
"url": "https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0"
"refsource": "MISC",
"url": "https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0",
"name": "https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0"
}
]
},
@ -69,7 +73,7 @@
"description_data": [
{
"lang": "eng",
"value": "The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.\n"
"value": "The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution."
}
]
},

View File

@ -83,6 +83,11 @@
"name": "https://mybb.com/versions/1.8.30/",
"refsource": "MISC",
"url": "https://mybb.com/versions/1.8.30/"
},
{
"refsource": "MISC",
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-503/",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-503/"
}
]
},