Auto-Update: 2023-08-22T20:00:38.701005+00:00

This commit is contained in:
cad-safe-bot 2023-08-22 20:00:42 +00:00
parent 8200aaabba
commit 65e39f011e
240 changed files with 10712 additions and 245 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-7484",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-11-30T02:15:10.390",
"lastModified": "2019-12-11T18:21:43.850",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-22T19:15:53.670",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -98,6 +98,10 @@
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html",
"source": "cve@mitre.org"
},
{
"url": "https://support.zabbix.com/browse/ZBX-16551",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-17382",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-10-09T14:15:12.817",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-22T19:15:54.797",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -94,6 +94,10 @@
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/47467",
"source": "cve@mitre.org",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18232",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:54.903",
"lastModified": "2023-08-22T19:15:54.903",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in function H5S_close in H5S.c in HDF5 1.10.4 allows remote attackers to run arbitrary code via creation of crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/winson2004aa/PAAFS/tree/master/vul2",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18378",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.143",
"lastModified": "2023-08-22T19:15:55.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A NULL pointer dereference was discovered in SExpressionWasmBuilder::makeBlock in wasm/wasm-s-parser.c in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-as."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WebAssembly/binaryen/issues/1900",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18382",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.203",
"lastModified": "2023-08-22T19:15:55.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap-buffer-overflow in /src/wasm/wasm-binary.cpp in wasm::WasmBinaryBuilder::visitBlock(wasm::Block*) in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-opt."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WebAssembly/binaryen/issues/1900",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18494",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.267",
"lastModified": "2023-08-22T19:15:55.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in function H5S_close in H5S.c in HDF5 1.10.4 allows remote attackers to run arbitrary code via creation of crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/magicSwordsMan/PAAFS/tree/master/vul12",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-18651",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.360",
"lastModified": "2023-08-22T19:15:55.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in function ID3_Support::ID3v2Frame::getFrameValue in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted audio file with ID3V2 frame."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/commit/fdd4765a699f9700850098b43b9798b933acb32f",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/issues/13",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-18652",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.423",
"lastModified": "2023-08-22T19:15:55.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in WEBP_Support.cpp in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted webp file."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/commit/acee2894ceb91616543927c2a6e45050c60f98f7",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/issues/12",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18768",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.480",
"lastModified": "2023-08-22T19:15:55.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file."
}
],
"metrics": {},
"references": [
{
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2848",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18770",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.550",
"lastModified": "2023-08-22T19:15:55.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in function zzip_disk_entry_to_file_header in mmapped.c in zziplib 0.13.69, which will lead to a denial-of-service."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gdraheim/zziplib/issues/69",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18780",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:55.740",
"lastModified": "2023-08-22T19:15:55.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Use After Free vulnerability in function new_Token in asm/preproc.c in nasm 2.14.02 allows attackers to cause a denial of service via crafted nasm command."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392634",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18781",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:56.027",
"lastModified": "2023-08-22T19:15:56.027",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap buffer overflow vulnerability in FilePOSIX::read in File.cpp in audiofile 0.3.6 may cause denial-of-service via a crafted wav file, this bug can be triggered by the executable sfconvert."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mpruett/audiofile/issues/56",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-18831",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:56.220",
"lastModified": "2023-08-22T19:15:56.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in tEXtToDataBuf function in pngimage.cpp in Exiv2 0.27.1 allows remote attackers to cause a denial of service and other unspecified impacts via use of crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Exiv2/exiv2/issues/828",
"source": "cve@mitre.org"
},
{
"url": "https://www.exiv2.org/download.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-18839",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:56.570",
"lastModified": "2023-08-22T19:15:56.570",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in HtmlOutputDev::page in poppler 0.75.0 allows attackers to cause a denial of service."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.freedesktop.org/poppler/poppler/issues/742",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19185",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:57.233",
"lastModified": "2023-08-22T19:15:57.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19186",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:58.247",
"lastModified": "2023-08-22T19:15:58.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19187",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:15:59.317",
"lastModified": "2023-08-22T19:15:59.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19188",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:00.380",
"lastModified": "2023-08-22T19:16:00.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19189",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:01.020",
"lastModified": "2023-08-22T19:16:01.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19190",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:01.803",
"lastModified": "2023-08-22T19:16:01.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2020-19500",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:02.470",
"lastModified": "2023-08-22T19:16:02.470",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-19724",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:03.767",
"lastModified": "2023-08-22T19:16:03.767",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A memory consumption issue in get_data function in binutils/nm.c in GNU nm before 2.34 allows attackers to cause a denial of service via crafted command."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25362",
"source": "cve@mitre.org"
},
{
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=805f38bc551de820bcd7b31d3c5731ae27cf853a",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19725",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:04.567",
"lastModified": "2023-08-22T19:16:04.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is a use-after-free vulnerability in file pdd_simplifier.cpp in Z3 before 4.8.8. It occurs when the solver attempt to simplify the constraints and causes unexpected memory access. It can cause segmentation faults or arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Z3Prover/z3/issues/3363",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-19726",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:05.730",
"lastModified": "2023-08-22T19:16:05.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in binutils libbfd.c 2.36 relating to the auxiliary symbol data allows attackers to read or write to system memory or cause a denial of service."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26240",
"source": "cve@mitre.org"
},
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26241",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-19909",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:06.480",
"lastModified": "2023-08-22T19:16:06.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via crafted value as the retry delay."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/curl/curl/pull/4166",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-20145",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:07.323",
"lastModified": "2023-08-22T19:16:07.323",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in /src/helper.c in Dnsmasq up to and including 2.80 allows attackers to cause a denial of service via function create_helper."
}
],
"metrics": {},
"references": [
{
"url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=69bc94779c2f035a9fffdb5327a54c3aeca73ed5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-20813",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:08.247",
"lastModified": "2023-08-22T19:16:08.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet."
}
],
"metrics": {},
"references": [
{
"url": "https://www.freebuf.com/vuls/215171.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-21047",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:09.657",
"lastModified": "2023-08-22T19:16:09.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25068",
"source": "cve@mitre.org"
},
{
"url": "https://sourceware.org/git/?p=elfutils.git;a=commitdiff;h=99dc63b10b3878616b85df2dfd2e4e7103e414b8",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21426",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:10.540",
"lastModified": "2023-08-22T19:16:10.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in function C_IStream::read in PluginEXR.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/300/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21427",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:11.423",
"lastModified": "2023-08-22T19:16:11.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/298/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21428",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:12.293",
"lastModified": "2023-08-22T19:16:12.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/299/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21469",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:13.257",
"lastModified": "2023-08-22T19:16:13.257",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in PostgreSQL 12.2 allows attackers to cause a denial of service via repeatedly sending SIGHUP signals."
}
],
"metrics": {},
"references": [
{
"url": "https://www.postgresql.org/message-id/CAA8ZSMqAHDCgo07hqKoM5XJaoQy6Vv76O7966agez4ffyQktkA%40mail.gmail.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-21490",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:13.720",
"lastModified": "2023-08-22T19:16:13.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GNU Binutils 2.34. It is a memory leak when process microblaze-dis.c. This one will consume memory on each insn disassembled."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25249",
"source": "cve@mitre.org"
},
{
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=378fd436405b3051df34ac995b2e03fe1f3d1907",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21528",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:13.803",
"lastModified": "2023-08-22T19:16:13.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Segmentation Fault issue discovered in in ieee_segment function in outieee.c in nasm 2.14.03 and 2.15 allows remote attackers to cause a denial of service via crafted assembly file."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392637",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-21583",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:13.890",
"lastModified": "2023-08-22T19:16:13.890",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21679",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:13.990",
"lastModified": "2023-08-22T19:16:13.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in WritePCXImage function in pcx.c in GraphicsMagick 1.4 allows remote attackers to cause a denial of service via converting of crafted image file to pcx format."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/graphicsmagick/bugs/619/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21685",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:14.087",
"lastModified": "2023-08-22T19:16:14.087",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in hash_findi function in hashtbl.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392644",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21686",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:14.327",
"lastModified": "2023-08-22T19:16:14.327",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack-use-after-scope issue discovered in expand_mmac_params function in preproc.c in nasm before 2.15.04 allows remote attackers to cause a denial of service via crafted asm file."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392643",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21687",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:15.000",
"lastModified": "2023-08-22T19:16:15.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in scan function in stdscan.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392645",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21699",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:15.847",
"lastModified": "2023-08-22T19:16:15.847",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The web server Tengine 2.2.2 developed in the Nginx version from 0.5.6 thru 1.13.2 is vulnerable to an integer overflow vulnerability in the nginx range filter module, resulting in the leakage of potentially sensitive information triggered by specially crafted requests."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-21710",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:16.127",
"lastModified": "2023-08-22T19:16:16.127",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A divide by zero issue discovered in eps_print_page in gdevepsn.c in Artifex Software GhostScript 9.50 allows remote attackers to cause a denial of service via opening of crafted PDF file."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=701843",
"source": "cve@mitre.org"
},
{
"url": "https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=4e713293de84b689c4ab358f3e110ea54aa81925",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-21722",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:17.080",
"lastModified": "2023-08-22T19:16:17.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in oggvideotools 0.9.1 allows remote attackers to run arbitrary code via opening of crafted ogg file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xiaoxiongwang/security/tree/master/oggvideotools#segv-and-heap-use-after-free-detected-in-line-17-of-streamextractorcpp",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/oggvideotools/bugs/11/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-21723",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:18.233",
"lastModified": "2023-08-22T19:16:18.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Segmentation Fault issue discovered StreamSerializer::extractStreams function in streamSerializer.cpp in oggvideotools 0.9.1 allows remote attackers to cause a denial of service (crash) via opening of crafted ogg file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xiaoxiongwang/security/tree/master/oggvideotools#segv-occurs-in-function-streamserializerextractstreams-in-streamserializercpp",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/oggvideotools/bugs/10/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-21724",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:18.657",
"lastModified": "2023-08-22T19:16:18.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in ExtractorInformation function in streamExtractor.cpp in oggvideotools 0.9.1 allows remaote attackers to run arbitrary code via opening of crafted ogg file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xiaoxiongwang/security/tree/master/oggvideotools#segv-and-heap-overflow-detected-in-line-17-of-streamextractorcpp",
"source": "cve@mitre.org"
},
{
"url": "https://sourceforge.net/p/oggvideotools/bugs/9/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21890",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:18.730",
"lastModified": "2023-08-22T19:16:18.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in clj_media_size function in devices/gdevclj.c in Artifex Ghostscript 9.50 allows remote attackers to cause a denial of service or other unspecified impact(s) via opening of crafted PDF document."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=701846",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-21896",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:18.793",
"lastModified": "2023-08-22T19:16:18.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Use After Free vulnerability in svg_dev_text_span_as_paths_defs function in source/fitz/svg-device.c in Artifex Software MuPDF 1.16.0 allows remote attackers to cause a denial of service via opening of a crafted PDF file."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=701294",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-22181",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:18.910",
"lastModified": "2023-08-22T19:16:18.910",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected cross site scripting (XSS) vulnerability was discovered on Samsung sww-3400rw Router devices via the m2 parameter of the sess-bin/command.cgi"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gusrmsdlrh/Vulner/blob/master/Sww-3400rw.md",
"source": "cve@mitre.org"
},
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-22217",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.050",
"lastModified": "2023-08-22T19:16:19.050",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/c-ares/c-ares/issues/333",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-22218",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.120",
"lastModified": "2023-08-22T19:16:19.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/libssh2/libssh2/pull/476",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-22219",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.190",
"lastModified": "2023-08-22T19:16:19.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xiph/flac/issues/215",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-22524",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.243",
"lastModified": "2023-08-22T19:16:19.243",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in FreeImage_Load function in FreeImage Library 3.19.0(r1828) allows attackers to cuase a denial of service via crafted PFM file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/319/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-22570",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.297",
"lastModified": "2023-08-22T19:16:19.297",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memcached 1.6.0 before 1.6.3 allows remote attackers to cause a denial of service (daemon crash) via a crafted meta command."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/memcached/memcached/issues/636",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-22628",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.353",
"lastModified": "2023-08-22T19:16:19.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\\src\\postprocessing\\aspect_ratio.cpp."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LibRaw/LibRaw/issues/269",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-22916",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.407",
"lastModified": "2023-08-22T19:16:19.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability",
"source": "cve@mitre.org"
},
{
"url": "https://tukaani.org/xz/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-23793",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.463",
"lastModified": "2023-08-22T19:16:19.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in spice-server spice-server-0.14.0-6.el7_6.1.x86_64 of Redhat's VDI product. There is a security vulnerablility that can restart KVMvirtual machine without any authorization. It is not yet known if there will be other other effects."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zelat/spice-security-issues",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-23804",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.520",
"lastModified": "2023-08-22T19:16:19.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled Recursion in pdfinfo, and pdftops in poppler 0.89.0 allows remote attackers to cause a denial of service via crafted input."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.freedesktop.org/poppler/poppler/-/issues/936",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-23992",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.580",
"lastModified": "2023-08-22T19:16:19.580",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) in Nagios XI 5.7.1 allows remote attackers to run arbitrary code via returnUrl parameter in a crafted GET request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/EmreOvunc/Nagios-XI-Reflected-XSS",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-24292",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.647",
"lastModified": "2023-08-22T19:16:19.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in load function in PluginICO.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted ico file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-24293",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.703",
"lastModified": "2023-08-22T19:16:19.703",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted psd file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-24294",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.760",
"lastModified": "2023-08-22T19:16:19.760",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in psdParser::UnpackRLE function in PSDParser.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to cuase a denial of service via opening of crafted psd file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-24295",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.827",
"lastModified": "2023-08-22T19:16:19.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in FreeImage 3.19.0 [r1859] allows remote attackers to ru narbitrary code via use of crafted psd file."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-25887",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.887",
"lastModified": "2023-08-22T19:16:19.887",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in mg_resolve_from_hosts_file in Mongoose 6.18, when reading from a crafted hosts file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/cesanta/mongoose/issues/1140",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-26652",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.943",
"lastModified": "2023-08-22T19:16:19.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in function nl80211_send_chandef in rtl8812au v5.6.4.2 allows attackers to cause a denial of service."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/aircrack-ng/rtl8812au/issues/730",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-26683",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:19.997",
"lastModified": "2023-08-22T19:16:19.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A memory leak issue discovered in /pdf/pdf-font-add.c in Artifex Software MuPDF 1.17.0 allows attackers to obtain sensitive information."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=702566",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-27418",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.047",
"lastModified": "2023-08-22T19:16:20.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function."
}
],
"metrics": {},
"references": [
{
"url": "http://fedora.com",
"source": "cve@mitre.org"
},
{
"url": "https://patchwork.freedesktop.org/patch/356372/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-35342",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.107",
"lastModified": "2023-08-22T19:16:20.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25319",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-35357",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.167",
"lastModified": "2023-08-22T19:16:20.167",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution."
}
],
"metrics": {},
"references": [
{
"url": "https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859",
"source": "cve@mitre.org"
},
{
"url": "https://savannah.gnu.org/bugs/?59624",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-29390",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.237",
"lastModified": "2023-08-22T19:16:20.237",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "libjpeg-turbo version 2.0.90 is vulnerable to a heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-30047",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.290",
"lastModified": "2023-08-22T19:16:20.290",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "VSFTPD 3.0.3 allows attackers to cause a denial of service due to limited number of connections allowed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.exploit-db.com/exploits/49719",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-32292",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.350",
"lastModified": "2023-08-22T19:16:20.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in json-c through 0.15-20200726. A stack-buffer-overflow exists in the function parseit located in json_parse.c. It allows an attacker to cause code Execution."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/json-c/json-c/issues/654",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2021-32420",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.407",
"lastModified": "2023-08-22T19:16:20.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "dpic 2021.01.01 has a Heap-based Buffer Overflow in thestorestring function in dpic.y."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/aplevich/dpic/-/issues/5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2021-32421",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.460",
"lastModified": "2023-08-22T19:16:20.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "dpic 2021.01.01 has a Heap Use-After-Free in thedeletestringbox() function in dpic.y."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/aplevich/dpic/-/issues/7",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2021-32422",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.510",
"lastModified": "2023-08-22T19:16:20.510",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "dpic 2021.01.01 has a Global buffer overflow in theyylex() function in main.c and reads out of the bound array."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/aplevich/dpic/-/issues/6",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-33388",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.567",
"lastModified": "2023-08-22T19:16:20.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "dpic 2021.04.10 has a Heap Buffer Overflow in themakevar() function in dpic.y"
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/aplevich/dpic/-/issues/8",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-33390",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.617",
"lastModified": "2023-08-22T19:16:20.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "dpic 2021.04.10 has a use-after-free in thedeletestringbox() function in dpic.y. A different vulnerablility than CVE-2021-32421."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/aplevich/dpic/-/issues/10",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2021-34193",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:20.913",
"lastModified": "2023-08-22T19:16:20.913",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stack overflow vulnerability in OpenSC smart card middleware before 0.23 via crafted responses to APDUs."
}
],
"metrics": {},
"references": [
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27719",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28768",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28855",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29912",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30112",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30800",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31448",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31540",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32149",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2021-35309",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.367",
"lastModified": "2023-08-22T19:16:21.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in Samsung SyncThru Web Service SPL 5.93 06-09-2014 allows attackers to gain escalated privileges via MITM attacks."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mustafa-turgut/cve-subscriptions/tree/main/samsung-stws",
"source": "cve@mitre.org"
},
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-40211",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.427",
"lastModified": "2023-08-22T19:16:21.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered with ImageMagick 7.1.0-4 via Division by zero in function ReadEnhMetaFile of coders/emf.c."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ImageMagick/ImageMagick/issues/4097",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-40262",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.487",
"lastModified": "2023-08-22T19:16:21.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack exhaustion issue was discovered in FreeImage before 1.18.0 via the Validate function in PluginRAW.cpp."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/338/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-40263",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.540",
"lastModified": "2023-08-22T19:16:21.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad function in PluginTIFF.cpp."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/336/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-40264",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.597",
"lastModified": "2023-08-22T19:16:21.597",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NULL pointer dereference vulnerability in FreeImage before 1.18.0 via the FreeImage_CloneTag function inFreeImageTag.cpp."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/335/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-40265",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.650",
"lastModified": "2023-08-22T19:16:21.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function in PluginJPEG.cpp."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/337/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-40266",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.707",
"lastModified": "2023-08-22T19:16:21.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vulnerabile to null pointer dereference."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/freeimage/bugs/334/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2021-43171",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.760",
"lastModified": "2023-08-22T19:16:21.760",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper verification of applications' cryptographic signatures in the /e/OS app store client App Lounge before 0.19q allows attackers in control of the application server to install malicious applications on user's systems by altering the server's API response."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.e.foundation/e/os/releases/-/releases/v0.19-q#sparkles-we-embedded-other-improvements",
"source": "cve@mitre.org"
},
{
"url": "https://nervuri.net/e/apps",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-46174",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.820",
"lastModified": "2023-08-22T19:16:21.820",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap-based Buffer Overflow in function bfd_getl32 in Binutils objdump 3.37."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28753",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-46179",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.883",
"lastModified": "2023-08-22T19:16:21.883",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Reachable Assertion vulnerability in upx before 4.0.0 allows attackers to cause a denial of service via crafted file passed to the the readx function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/upx/upx/issues/545",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-46310",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.940",
"lastModified": "2023-08-22T19:16:21.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/djvu/bugs/345/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-46312",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:21.993",
"lastModified": "2023-08-22T19:16:21.993",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceforge.net/p/djvu/bugs/344/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-24439",
"sourceIdentifier": "report@snyk.io",
"published": "2022-12-06T05:15:11.420",
"lastModified": "2023-07-25T12:15:10.570",
"lastModified": "2023-08-22T19:16:22.050",
"vulnStatus": "Modified",
"descriptions": [
{
@ -124,6 +124,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/",
"source": "report@snyk.io"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJHN3QUXPJIMM6SULIR3PR34UFWRAE7X/",
"source": "report@snyk.io",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2022-25024",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.173",
"lastModified": "2023-08-22T19:16:22.173",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The json2xml package through 3.12.0 for Python allows an error in typecode decoding enabling a remote attack that can lead to an exception, causing a denial of service."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/vinitkumar/json2xml/issues/106",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/vinitkumar/json2xml/pull/107",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/vinitkumar/json2xml/pull/107/files",
"source": "cve@mitre.org"
},
{
"url": "https://packaging.python.org/en/latest/guides/analyzing-pypi-package-downloads/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-26592",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.240",
"lastModified": "2023-08-22T19:16:22.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/sass/libsass/issues/3174",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-28068",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.423",
"lastModified": "2023-08-22T19:16:22.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4.0."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/radareorg/radare2/commit/637f4bd1af6752e28e0a9998e954e2e9ce6fa992",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-28069",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.513",
"lastModified": "2023-08-22T19:16:22.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A heap buffer overflow in vax_opfunction in radare2 5.4.2 and 5.4.0."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/radareorg/radare2/commit/49b0cebfdf0db9704e36f8a5533f1df6d3e2ed3a",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-28070",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.583",
"lastModified": "2023-08-22T19:16:22.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A null pointer deference in __core_anal_fcn function in radare2 5.4.2 and 5.4.0."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/radareorg/radare2/commit/4aff1bb00224de4f5bc118f987dfd5d2fe3450d0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-28071",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.667",
"lastModified": "2023-08-22T19:16:22.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-28072",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.740",
"lastModified": "2023-08-22T19:16:22.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A heap buffer overflow in r_read_le32 function in radare25.4.2 and 5.4.0."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/radareorg/radare2/commit/027cd9b7274988bb1af866539ba6c2fa2ff63e45",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-28073",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.843",
"lastModified": "2023-08-22T19:16:22.843",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A use after free in r_reg_set_value function in radare2 5.4.2 and 5.4.0."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/radareorg/radare2/commit/59a9dfb60acf8b5c0312061cffd9693fc9526053",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2022-29654",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:22.940",
"lastModified": "2023-08-22T19:16:22.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in quote_for_pmake in asm/nasm.c in nasm before 2.15.05 allows attackers to cause a denial of service via crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://gcc.gnu.org/onlinedocs/gcc/Instrumentation-Options.html",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f",
"source": "cve@mitre.org"
},
{
"url": "https://www.nasm.us/pub/nasm/releasebuilds/2.15.05/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-34038",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:23.000",
"lastModified": "2023-08-22T19:16:23.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/etcd-io/etcd/pull/14022",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/etcd-io/etcd/pull/14452",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-35205",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:23.060",
"lastModified": "2023-08-22T19:16:23.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Binutils readelf 2.38.50, reachable assertion failure in function display_debug_names allows attackers to cause a denial of service."
}
],
"metrics": {},
"references": [
{
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29289",
"source": "cve@mitre.org"
}
]
}

Some files were not shown because too many files have changed in this diff Show More