mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-08-22T20:00:38.701005+00:00
This commit is contained in:
parent
8200aaabba
commit
65e39f011e
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-7484",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-11-30T02:15:10.390",
|
||||
"lastModified": "2019-12-11T18:21:43.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-22T19:15:53.670",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -98,6 +98,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.zabbix.com/browse/ZBX-16551",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-17382",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-10-09T14:15:12.817",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-08-22T19:15:54.797",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -94,6 +94,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/47467",
|
||||
"source": "cve@mitre.org",
|
||||
|
20
CVE-2020/CVE-2020-182xx/CVE-2020-18232.json
Normal file
20
CVE-2020/CVE-2020-182xx/CVE-2020-18232.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18232",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:54.903",
|
||||
"lastModified": "2023-08-22T19:15:54.903",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in function H5S_close in H5S.c in HDF5 1.10.4 allows remote attackers to run arbitrary code via creation of crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/winson2004aa/PAAFS/tree/master/vul2",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-183xx/CVE-2020-18378.json
Normal file
20
CVE-2020/CVE-2020-183xx/CVE-2020-18378.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18378",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.143",
|
||||
"lastModified": "2023-08-22T19:15:55.143",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A NULL pointer dereference was discovered in SExpressionWasmBuilder::makeBlock in wasm/wasm-s-parser.c in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-as."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WebAssembly/binaryen/issues/1900",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-183xx/CVE-2020-18382.json
Normal file
20
CVE-2020/CVE-2020-183xx/CVE-2020-18382.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18382",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.203",
|
||||
"lastModified": "2023-08-22T19:15:55.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap-buffer-overflow in /src/wasm/wasm-binary.cpp in wasm::WasmBinaryBuilder::visitBlock(wasm::Block*) in Binaryen 1.38.26. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm-opt."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WebAssembly/binaryen/issues/1900",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-184xx/CVE-2020-18494.json
Normal file
20
CVE-2020/CVE-2020-184xx/CVE-2020-18494.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18494",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.267",
|
||||
"lastModified": "2023-08-22T19:15:55.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in function H5S_close in H5S.c in HDF5 1.10.4 allows remote attackers to run arbitrary code via creation of crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/magicSwordsMan/PAAFS/tree/master/vul12",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-186xx/CVE-2020-18651.json
Normal file
24
CVE-2020/CVE-2020-186xx/CVE-2020-18651.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-18651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.360",
|
||||
"lastModified": "2023-08-22T19:15:55.360",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in function ID3_Support::ID3v2Frame::getFrameValue in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted audio file with ID3V2 frame."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/commit/fdd4765a699f9700850098b43b9798b933acb32f",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/issues/13",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-186xx/CVE-2020-18652.json
Normal file
24
CVE-2020/CVE-2020-186xx/CVE-2020-18652.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-18652",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.423",
|
||||
"lastModified": "2023-08-22T19:15:55.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in WEBP_Support.cpp in exempi 2.5.0 and earlier allows remote attackers to cause a denial of service via opening of crafted webp file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/commit/acee2894ceb91616543927c2a6e45050c60f98f7",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/libopenraw/exempi/issues/12",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-187xx/CVE-2020-18768.json
Normal file
20
CVE-2020/CVE-2020-187xx/CVE-2020-18768.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18768",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.480",
|
||||
"lastModified": "2023-08-22T19:15:55.480",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2848",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-187xx/CVE-2020-18770.json
Normal file
20
CVE-2020/CVE-2020-187xx/CVE-2020-18770.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18770",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.550",
|
||||
"lastModified": "2023-08-22T19:15:55.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in function zzip_disk_entry_to_file_header in mmapped.c in zziplib 0.13.69, which will lead to a denial-of-service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gdraheim/zziplib/issues/69",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-187xx/CVE-2020-18780.json
Normal file
20
CVE-2020/CVE-2020-187xx/CVE-2020-18780.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18780",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:55.740",
|
||||
"lastModified": "2023-08-22T19:15:55.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Use After Free vulnerability in function new_Token in asm/preproc.c in nasm 2.14.02 allows attackers to cause a denial of service via crafted nasm command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392634",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-187xx/CVE-2020-18781.json
Normal file
20
CVE-2020/CVE-2020-187xx/CVE-2020-18781.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18781",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:56.027",
|
||||
"lastModified": "2023-08-22T19:15:56.027",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap buffer overflow vulnerability in FilePOSIX::read in File.cpp in audiofile 0.3.6 may cause denial-of-service via a crafted wav file, this bug can be triggered by the executable sfconvert."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mpruett/audiofile/issues/56",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-188xx/CVE-2020-18831.json
Normal file
24
CVE-2020/CVE-2020-188xx/CVE-2020-18831.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-18831",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:56.220",
|
||||
"lastModified": "2023-08-22T19:15:56.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in tEXtToDataBuf function in pngimage.cpp in Exiv2 0.27.1 allows remote attackers to cause a denial of service and other unspecified impacts via use of crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Exiv2/exiv2/issues/828",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.exiv2.org/download.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-188xx/CVE-2020-18839.json
Normal file
20
CVE-2020/CVE-2020-188xx/CVE-2020-18839.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-18839",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:56.570",
|
||||
"lastModified": "2023-08-22T19:15:56.570",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in HtmlOutputDev::page in poppler 0.75.0 allows attackers to cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/poppler/poppler/issues/742",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-191xx/CVE-2020-19185.json
Normal file
20
CVE-2020/CVE-2020-191xx/CVE-2020-19185.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19185",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:57.233",
|
||||
"lastModified": "2023-08-22T19:15:57.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-191xx/CVE-2020-19186.json
Normal file
20
CVE-2020/CVE-2020-191xx/CVE-2020-19186.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19186",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:58.247",
|
||||
"lastModified": "2023-08-22T19:15:58.247",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-191xx/CVE-2020-19187.json
Normal file
20
CVE-2020/CVE-2020-191xx/CVE-2020-19187.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19187",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:15:59.317",
|
||||
"lastModified": "2023-08-22T19:15:59.317",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-191xx/CVE-2020-19188.json
Normal file
20
CVE-2020/CVE-2020-191xx/CVE-2020-19188.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19188",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:00.380",
|
||||
"lastModified": "2023-08-22T19:16:00.380",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-191xx/CVE-2020-19189.json
Normal file
20
CVE-2020/CVE-2020-191xx/CVE-2020-19189.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19189",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:01.020",
|
||||
"lastModified": "2023-08-22T19:16:01.020",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-191xx/CVE-2020-19190.json
Normal file
20
CVE-2020/CVE-2020-191xx/CVE-2020-19190.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19190",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:01.803",
|
||||
"lastModified": "2023-08-22T19:16:01.803",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
15
CVE-2020/CVE-2020-195xx/CVE-2020-19500.json
Normal file
15
CVE-2020/CVE-2020-195xx/CVE-2020-19500.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2020-19500",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:02.470",
|
||||
"lastModified": "2023-08-22T19:16:02.470",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
24
CVE-2020/CVE-2020-197xx/CVE-2020-19724.json
Normal file
24
CVE-2020/CVE-2020-197xx/CVE-2020-19724.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-19724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:03.767",
|
||||
"lastModified": "2023-08-22T19:16:03.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory consumption issue in get_data function in binutils/nm.c in GNU nm before 2.34 allows attackers to cause a denial of service via crafted command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25362",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=805f38bc551de820bcd7b31d3c5731ae27cf853a",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-197xx/CVE-2020-19725.json
Normal file
20
CVE-2020/CVE-2020-197xx/CVE-2020-19725.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19725",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:04.567",
|
||||
"lastModified": "2023-08-22T19:16:04.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is a use-after-free vulnerability in file pdd_simplifier.cpp in Z3 before 4.8.8. It occurs when the solver attempt to simplify the constraints and causes unexpected memory access. It can cause segmentation faults or arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Z3Prover/z3/issues/3363",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-197xx/CVE-2020-19726.json
Normal file
24
CVE-2020/CVE-2020-197xx/CVE-2020-19726.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-19726",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:05.730",
|
||||
"lastModified": "2023-08-22T19:16:05.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in binutils libbfd.c 2.36 relating to the auxiliary symbol data allows attackers to read or write to system memory or cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26240",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=26241",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-199xx/CVE-2020-19909.json
Normal file
20
CVE-2020/CVE-2020-199xx/CVE-2020-19909.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-19909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:06.480",
|
||||
"lastModified": "2023-08-22T19:16:06.480",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via crafted value as the retry delay."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/curl/curl/pull/4166",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-201xx/CVE-2020-20145.json
Normal file
20
CVE-2020/CVE-2020-201xx/CVE-2020-20145.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-20145",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:07.323",
|
||||
"lastModified": "2023-08-22T19:16:07.323",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in /src/helper.c in Dnsmasq up to and including 2.80 allows attackers to cause a denial of service via function create_helper."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=69bc94779c2f035a9fffdb5327a54c3aeca73ed5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-208xx/CVE-2020-20813.json
Normal file
20
CVE-2020/CVE-2020-208xx/CVE-2020-20813.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-20813",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:08.247",
|
||||
"lastModified": "2023-08-22T19:16:08.247",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.freebuf.com/vuls/215171.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-210xx/CVE-2020-21047.json
Normal file
24
CVE-2020/CVE-2020-210xx/CVE-2020-21047.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-21047",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:09.657",
|
||||
"lastModified": "2023-08-22T19:16:09.657",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25068",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/git/?p=elfutils.git;a=commitdiff;h=99dc63b10b3878616b85df2dfd2e4e7103e414b8",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-214xx/CVE-2020-21426.json
Normal file
20
CVE-2020/CVE-2020-214xx/CVE-2020-21426.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21426",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:10.540",
|
||||
"lastModified": "2023-08-22T19:16:10.540",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in function C_IStream::read in PluginEXR.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/300/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-214xx/CVE-2020-21427.json
Normal file
20
CVE-2020/CVE-2020-214xx/CVE-2020-21427.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21427",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:11.423",
|
||||
"lastModified": "2023-08-22T19:16:11.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginBMP.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/298/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-214xx/CVE-2020-21428.json
Normal file
20
CVE-2020/CVE-2020-214xx/CVE-2020-21428.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:12.293",
|
||||
"lastModified": "2023-08-22T19:16:12.293",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/299/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-214xx/CVE-2020-21469.json
Normal file
20
CVE-2020/CVE-2020-214xx/CVE-2020-21469.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21469",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:13.257",
|
||||
"lastModified": "2023-08-22T19:16:13.257",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in PostgreSQL 12.2 allows attackers to cause a denial of service via repeatedly sending SIGHUP signals."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.postgresql.org/message-id/CAA8ZSMqAHDCgo07hqKoM5XJaoQy6Vv76O7966agez4ffyQktkA%40mail.gmail.com",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-214xx/CVE-2020-21490.json
Normal file
24
CVE-2020/CVE-2020-214xx/CVE-2020-21490.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-21490",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:13.720",
|
||||
"lastModified": "2023-08-22T19:16:13.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in GNU Binutils 2.34. It is a memory leak when process microblaze-dis.c. This one will consume memory on each insn disassembled."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25249",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=378fd436405b3051df34ac995b2e03fe1f3d1907",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-215xx/CVE-2020-21528.json
Normal file
20
CVE-2020/CVE-2020-215xx/CVE-2020-21528.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21528",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:13.803",
|
||||
"lastModified": "2023-08-22T19:16:13.803",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Segmentation Fault issue discovered in in ieee_segment function in outieee.c in nasm 2.14.03 and 2.15 allows remote attackers to cause a denial of service via crafted assembly file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392637",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-215xx/CVE-2020-21583.json
Normal file
24
CVE-2020/CVE-2020-215xx/CVE-2020-21583.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-21583",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:13.890",
|
||||
"lastModified": "2023-08-22T19:16:13.890",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in hwclock.13-v2.27 allows attackers to gain escalated privlidges or execute arbitrary commands via the path parameter when setting the date."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-216xx/CVE-2020-21679.json
Normal file
20
CVE-2020/CVE-2020-216xx/CVE-2020-21679.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21679",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:13.990",
|
||||
"lastModified": "2023-08-22T19:16:13.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in WritePCXImage function in pcx.c in GraphicsMagick 1.4 allows remote attackers to cause a denial of service via converting of crafted image file to pcx format."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/graphicsmagick/bugs/619/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-216xx/CVE-2020-21685.json
Normal file
20
CVE-2020/CVE-2020-216xx/CVE-2020-21685.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21685",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:14.087",
|
||||
"lastModified": "2023-08-22T19:16:14.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in hash_findi function in hashtbl.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392644",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-216xx/CVE-2020-21686.json
Normal file
20
CVE-2020/CVE-2020-216xx/CVE-2020-21686.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21686",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:14.327",
|
||||
"lastModified": "2023-08-22T19:16:14.327",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack-use-after-scope issue discovered in expand_mmac_params function in preproc.c in nasm before 2.15.04 allows remote attackers to cause a denial of service via crafted asm file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392643",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-216xx/CVE-2020-21687.json
Normal file
20
CVE-2020/CVE-2020-216xx/CVE-2020-21687.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21687",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:15.000",
|
||||
"lastModified": "2023-08-22T19:16:15.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in scan function in stdscan.c in nasm 2.15rc0 allows remote attackers to cause a denial of service via crafted asm file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.nasm.us/show_bug.cgi?id=3392645",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-216xx/CVE-2020-21699.json
Normal file
20
CVE-2020/CVE-2020-216xx/CVE-2020-21699.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:15.847",
|
||||
"lastModified": "2023-08-22T19:16:15.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web server Tengine 2.2.2 developed in the Nginx version from 0.5.6 thru 1.13.2 is vulnerable to an integer overflow vulnerability in the nginx range filter module, resulting in the leakage of potentially sensitive information triggered by specially crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ZxDecide/Nginx-variants/blob/master/%E9%99%84%E4%BB%B6(Tengine).docx",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-217xx/CVE-2020-21710.json
Normal file
24
CVE-2020/CVE-2020-217xx/CVE-2020-21710.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-21710",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:16.127",
|
||||
"lastModified": "2023-08-22T19:16:16.127",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A divide by zero issue discovered in eps_print_page in gdevepsn.c in Artifex Software GhostScript 9.50 allows remote attackers to cause a denial of service via opening of crafted PDF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=701843",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=4e713293de84b689c4ab358f3e110ea54aa81925",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-217xx/CVE-2020-21722.json
Normal file
24
CVE-2020/CVE-2020-217xx/CVE-2020-21722.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-21722",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:17.080",
|
||||
"lastModified": "2023-08-22T19:16:17.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in oggvideotools 0.9.1 allows remote attackers to run arbitrary code via opening of crafted ogg file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaoxiongwang/security/tree/master/oggvideotools#segv-and-heap-use-after-free-detected-in-line-17-of-streamextractorcpp",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/oggvideotools/bugs/11/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-217xx/CVE-2020-21723.json
Normal file
24
CVE-2020/CVE-2020-217xx/CVE-2020-21723.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-21723",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:18.233",
|
||||
"lastModified": "2023-08-22T19:16:18.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Segmentation Fault issue discovered StreamSerializer::extractStreams function in streamSerializer.cpp in oggvideotools 0.9.1 allows remote attackers to cause a denial of service (crash) via opening of crafted ogg file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaoxiongwang/security/tree/master/oggvideotools#segv-occurs-in-function-streamserializerextractstreams-in-streamserializercpp",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/oggvideotools/bugs/10/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-217xx/CVE-2020-21724.json
Normal file
24
CVE-2020/CVE-2020-217xx/CVE-2020-21724.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-21724",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:18.657",
|
||||
"lastModified": "2023-08-22T19:16:18.657",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in ExtractorInformation function in streamExtractor.cpp in oggvideotools 0.9.1 allows remaote attackers to run arbitrary code via opening of crafted ogg file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaoxiongwang/security/tree/master/oggvideotools#segv-and-heap-overflow-detected-in-line-17-of-streamextractorcpp",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://sourceforge.net/p/oggvideotools/bugs/9/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-218xx/CVE-2020-21890.json
Normal file
20
CVE-2020/CVE-2020-218xx/CVE-2020-21890.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21890",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:18.730",
|
||||
"lastModified": "2023-08-22T19:16:18.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in clj_media_size function in devices/gdevclj.c in Artifex Ghostscript 9.50 allows remote attackers to cause a denial of service or other unspecified impact(s) via opening of crafted PDF document."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=701846",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-218xx/CVE-2020-21896.json
Normal file
20
CVE-2020/CVE-2020-218xx/CVE-2020-21896.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-21896",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:18.793",
|
||||
"lastModified": "2023-08-22T19:16:18.793",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Use After Free vulnerability in svg_dev_text_span_as_paths_defs function in source/fitz/svg-device.c in Artifex Software MuPDF 1.16.0 allows remote attackers to cause a denial of service via opening of a crafted PDF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=701294",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-221xx/CVE-2020-22181.json
Normal file
24
CVE-2020/CVE-2020-221xx/CVE-2020-22181.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-22181",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:18.910",
|
||||
"lastModified": "2023-08-22T19:16:18.910",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A reflected cross site scripting (XSS) vulnerability was discovered on Samsung sww-3400rw Router devices via the m2 parameter of the sess-bin/command.cgi"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gusrmsdlrh/Vulner/blob/master/Sww-3400rw.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-222xx/CVE-2020-22217.json
Normal file
20
CVE-2020/CVE-2020-222xx/CVE-2020-22217.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-22217",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.050",
|
||||
"lastModified": "2023-08-22T19:16:19.050",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/c-ares/c-ares/issues/333",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-222xx/CVE-2020-22218.json
Normal file
20
CVE-2020/CVE-2020-222xx/CVE-2020-22218.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-22218",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.120",
|
||||
"lastModified": "2023-08-22T19:16:19.120",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libssh2/libssh2/pull/476",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-222xx/CVE-2020-22219.json
Normal file
20
CVE-2020/CVE-2020-222xx/CVE-2020-22219.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-22219",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.190",
|
||||
"lastModified": "2023-08-22T19:16:19.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiph/flac/issues/215",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-225xx/CVE-2020-22524.json
Normal file
20
CVE-2020/CVE-2020-225xx/CVE-2020-22524.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-22524",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.243",
|
||||
"lastModified": "2023-08-22T19:16:19.243",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in FreeImage_Load function in FreeImage Library 3.19.0(r1828) allows attackers to cuase a denial of service via crafted PFM file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/319/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-225xx/CVE-2020-22570.json
Normal file
20
CVE-2020/CVE-2020-225xx/CVE-2020-22570.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-22570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.297",
|
||||
"lastModified": "2023-08-22T19:16:19.297",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Memcached 1.6.0 before 1.6.3 allows remote attackers to cause a denial of service (daemon crash) via a crafted meta command."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/memcached/memcached/issues/636",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-226xx/CVE-2020-22628.json
Normal file
20
CVE-2020/CVE-2020-226xx/CVE-2020-22628.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-22628",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.353",
|
||||
"lastModified": "2023-08-22T19:16:19.353",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\\src\\postprocessing\\aspect_ratio.cpp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LibRaw/LibRaw/issues/269",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-229xx/CVE-2020-22916.json
Normal file
24
CVE-2020/CVE-2020-229xx/CVE-2020-22916.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-22916",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.407",
|
||||
"lastModified": "2023-08-22T19:16:19.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in XZ 5.2.5 allows attackers to cause a denial of service via decompression of crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://tukaani.org/xz/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-237xx/CVE-2020-23793.json
Normal file
20
CVE-2020/CVE-2020-237xx/CVE-2020-23793.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-23793",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.463",
|
||||
"lastModified": "2023-08-22T19:16:19.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in spice-server spice-server-0.14.0-6.el7_6.1.x86_64 of Redhat's VDI product. There is a security vulnerablility that can restart KVMvirtual machine without any authorization. It is not yet known if there will be other other effects."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zelat/spice-security-issues",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-238xx/CVE-2020-23804.json
Normal file
20
CVE-2020/CVE-2020-238xx/CVE-2020-23804.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-23804",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.520",
|
||||
"lastModified": "2023-08-22T19:16:19.520",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Uncontrolled Recursion in pdfinfo, and pdftops in poppler 0.89.0 allows remote attackers to cause a denial of service via crafted input."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.freedesktop.org/poppler/poppler/-/issues/936",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-239xx/CVE-2020-23992.json
Normal file
20
CVE-2020/CVE-2020-239xx/CVE-2020-23992.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-23992",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.580",
|
||||
"lastModified": "2023-08-22T19:16:19.580",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) in Nagios XI 5.7.1 allows remote attackers to run arbitrary code via returnUrl parameter in a crafted GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/EmreOvunc/Nagios-XI-Reflected-XSS",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-242xx/CVE-2020-24292.json
Normal file
20
CVE-2020/CVE-2020-242xx/CVE-2020-24292.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-24292",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.647",
|
||||
"lastModified": "2023-08-22T19:16:19.647",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in load function in PluginICO.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted ico file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-242xx/CVE-2020-24293.json
Normal file
20
CVE-2020/CVE-2020-242xx/CVE-2020-24293.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-24293",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.703",
|
||||
"lastModified": "2023-08-22T19:16:19.703",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted psd file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-242xx/CVE-2020-24294.json
Normal file
20
CVE-2020/CVE-2020-242xx/CVE-2020-24294.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-24294",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.760",
|
||||
"lastModified": "2023-08-22T19:16:19.760",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in psdParser::UnpackRLE function in PSDParser.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to cuase a denial of service via opening of crafted psd file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-242xx/CVE-2020-24295.json
Normal file
20
CVE-2020/CVE-2020-242xx/CVE-2020-24295.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-24295",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.827",
|
||||
"lastModified": "2023-08-22T19:16:19.827",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in FreeImage 3.19.0 [r1859] allows remote attackers to ru narbitrary code via use of crafted psd file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-258xx/CVE-2020-25887.json
Normal file
20
CVE-2020/CVE-2020-258xx/CVE-2020-25887.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-25887",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.887",
|
||||
"lastModified": "2023-08-22T19:16:19.887",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in mg_resolve_from_hosts_file in Mongoose 6.18, when reading from a crafted hosts file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cesanta/mongoose/issues/1140",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-266xx/CVE-2020-26652.json
Normal file
20
CVE-2020/CVE-2020-266xx/CVE-2020-26652.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-26652",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.943",
|
||||
"lastModified": "2023-08-22T19:16:19.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in function nl80211_send_chandef in rtl8812au v5.6.4.2 allows attackers to cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/aircrack-ng/rtl8812au/issues/730",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-266xx/CVE-2020-26683.json
Normal file
20
CVE-2020/CVE-2020-266xx/CVE-2020-26683.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-26683",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:19.997",
|
||||
"lastModified": "2023-08-22T19:16:19.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak issue discovered in /pdf/pdf-font-add.c in Artifex Software MuPDF 1.17.0 allows attackers to obtain sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.ghostscript.com/show_bug.cgi?id=702566",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-274xx/CVE-2020-27418.json
Normal file
24
CVE-2020/CVE-2020-274xx/CVE-2020-27418.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-27418",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.047",
|
||||
"lastModified": "2023-08-22T19:16:20.047",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://fedora.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://patchwork.freedesktop.org/patch/356372/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2020/CVE-2020-353xx/CVE-2020-35342.json
Normal file
20
CVE-2020/CVE-2020-353xx/CVE-2020-35342.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2020-35342",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.107",
|
||||
"lastModified": "2023-08-22T19:16:20.107",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "GNU Binutils before 2.34 has an uninitialized-heap vulnerability in function tic4x_print_cond (file opcodes/tic4x-dis.c) which could allow attackers to make an information leak."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=25319",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2020/CVE-2020-353xx/CVE-2020-35357.json
Normal file
24
CVE-2020/CVE-2020-353xx/CVE-2020-35357.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2020-35357",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.167",
|
||||
"lastModified": "2023-08-22T19:16:20.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://savannah.gnu.org/bugs/?59624",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-293xx/CVE-2021-29390.json
Normal file
20
CVE-2021/CVE-2021-293xx/CVE-2021-29390.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-29390",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.237",
|
||||
"lastModified": "2023-08-22T19:16:20.237",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "libjpeg-turbo version 2.0.90 is vulnerable to a heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-300xx/CVE-2021-30047.json
Normal file
20
CVE-2021/CVE-2021-300xx/CVE-2021-30047.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-30047",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.290",
|
||||
"lastModified": "2023-08-22T19:16:20.290",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VSFTPD 3.0.3 allows attackers to cause a denial of service due to limited number of connections allowed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/49719",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-322xx/CVE-2021-32292.json
Normal file
20
CVE-2021/CVE-2021-322xx/CVE-2021-32292.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-32292",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.350",
|
||||
"lastModified": "2023-08-22T19:16:20.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in json-c through 0.15-20200726. A stack-buffer-overflow exists in the function parseit located in json_parse.c. It allows an attacker to cause code Execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/json-c/json-c/issues/654",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2021/CVE-2021-324xx/CVE-2021-32420.json
Normal file
24
CVE-2021/CVE-2021-324xx/CVE-2021-32420.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-32420",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.407",
|
||||
"lastModified": "2023-08-22T19:16:20.407",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "dpic 2021.01.01 has a Heap-based Buffer Overflow in thestorestring function in dpic.y."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/issues/5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2021/CVE-2021-324xx/CVE-2021-32421.json
Normal file
24
CVE-2021/CVE-2021-324xx/CVE-2021-32421.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-32421",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.460",
|
||||
"lastModified": "2023-08-22T19:16:20.460",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "dpic 2021.01.01 has a Heap Use-After-Free in thedeletestringbox() function in dpic.y."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/issues/7",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2021/CVE-2021-324xx/CVE-2021-32422.json
Normal file
24
CVE-2021/CVE-2021-324xx/CVE-2021-32422.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-32422",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.510",
|
||||
"lastModified": "2023-08-22T19:16:20.510",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "dpic 2021.01.01 has a Global buffer overflow in theyylex() function in main.c and reads out of the bound array."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/issues/6",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-333xx/CVE-2021-33388.json
Normal file
20
CVE-2021/CVE-2021-333xx/CVE-2021-33388.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-33388",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.567",
|
||||
"lastModified": "2023-08-22T19:16:20.567",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "dpic 2021.04.10 has a Heap Buffer Overflow in themakevar() function in dpic.y"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/issues/8",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-333xx/CVE-2021-33390.json
Normal file
20
CVE-2021/CVE-2021-333xx/CVE-2021-33390.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-33390",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.617",
|
||||
"lastModified": "2023-08-22T19:16:20.617",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "dpic 2021.04.10 has a use-after-free in thedeletestringbox() function in dpic.y. A different vulnerablility than CVE-2021-32421."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/aplevich/dpic/-/issues/10",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2021/CVE-2021-341xx/CVE-2021-34193.json
Normal file
64
CVE-2021/CVE-2021-341xx/CVE-2021-34193.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2021-34193",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:20.913",
|
||||
"lastModified": "2023-08-22T19:16:20.913",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack overflow vulnerability in OpenSC smart card middleware before 0.23 via crafted responses to APDUs."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27719",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28768",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28855",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29912",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30112",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30800",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31448",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31540",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32149",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2021/CVE-2021-353xx/CVE-2021-35309.json
Normal file
24
CVE-2021/CVE-2021-353xx/CVE-2021-35309.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-35309",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.367",
|
||||
"lastModified": "2023-08-22T19:16:21.367",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in Samsung SyncThru Web Service SPL 5.93 06-09-2014 allows attackers to gain escalated privileges via MITM attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/mustafa-turgut/cve-subscriptions/tree/main/samsung-stws",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.samsungmobile.com/securityUpdate.smsb",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-402xx/CVE-2021-40211.json
Normal file
20
CVE-2021/CVE-2021-402xx/CVE-2021-40211.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-40211",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.427",
|
||||
"lastModified": "2023-08-22T19:16:21.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered with ImageMagick 7.1.0-4 via Division by zero in function ReadEnhMetaFile of coders/emf.c."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/issues/4097",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-402xx/CVE-2021-40262.json
Normal file
20
CVE-2021/CVE-2021-402xx/CVE-2021-40262.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-40262",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.487",
|
||||
"lastModified": "2023-08-22T19:16:21.487",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack exhaustion issue was discovered in FreeImage before 1.18.0 via the Validate function in PluginRAW.cpp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/338/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-402xx/CVE-2021-40263.json
Normal file
20
CVE-2021/CVE-2021-402xx/CVE-2021-40263.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-40263",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.540",
|
||||
"lastModified": "2023-08-22T19:16:21.540",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad function in PluginTIFF.cpp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/336/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-402xx/CVE-2021-40264.json
Normal file
20
CVE-2021/CVE-2021-402xx/CVE-2021-40264.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-40264",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.597",
|
||||
"lastModified": "2023-08-22T19:16:21.597",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NULL pointer dereference vulnerability in FreeImage before 1.18.0 via the FreeImage_CloneTag function inFreeImageTag.cpp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/335/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-402xx/CVE-2021-40265.json
Normal file
20
CVE-2021/CVE-2021-402xx/CVE-2021-40265.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-40265",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.650",
|
||||
"lastModified": "2023-08-22T19:16:21.650",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function in PluginJPEG.cpp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/337/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-402xx/CVE-2021-40266.json
Normal file
20
CVE-2021/CVE-2021-402xx/CVE-2021-40266.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-40266",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.707",
|
||||
"lastModified": "2023-08-22T19:16:21.707",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vulnerabile to null pointer dereference."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/freeimage/bugs/334/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2021/CVE-2021-431xx/CVE-2021-43171.json
Normal file
24
CVE-2021/CVE-2021-431xx/CVE-2021-43171.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2021-43171",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.760",
|
||||
"lastModified": "2023-08-22T19:16:21.760",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper verification of applications' cryptographic signatures in the /e/OS app store client App Lounge before 0.19q allows attackers in control of the application server to install malicious applications on user's systems by altering the server's API response."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.e.foundation/e/os/releases/-/releases/v0.19-q#sparkles-we-embedded-other-improvements",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://nervuri.net/e/apps",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-461xx/CVE-2021-46174.json
Normal file
20
CVE-2021/CVE-2021-461xx/CVE-2021-46174.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46174",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.820",
|
||||
"lastModified": "2023-08-22T19:16:21.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap-based Buffer Overflow in function bfd_getl32 in Binutils objdump 3.37."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28753",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-461xx/CVE-2021-46179.json
Normal file
20
CVE-2021/CVE-2021-461xx/CVE-2021-46179.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46179",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.883",
|
||||
"lastModified": "2023-08-22T19:16:21.883",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reachable Assertion vulnerability in upx before 4.0.0 allows attackers to cause a denial of service via crafted file passed to the the readx function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/upx/upx/issues/545",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-463xx/CVE-2021-46310.json
Normal file
20
CVE-2021/CVE-2021-463xx/CVE-2021-46310.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46310",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.940",
|
||||
"lastModified": "2023-08-22T19:16:21.940",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/djvu/bugs/345/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-463xx/CVE-2021-46312.json
Normal file
20
CVE-2021/CVE-2021-463xx/CVE-2021-46312.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-46312",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:21.993",
|
||||
"lastModified": "2023-08-22T19:16:21.993",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/djvu/bugs/344/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-24439",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2022-12-06T05:15:11.420",
|
||||
"lastModified": "2023-07-25T12:15:10.570",
|
||||
"lastModified": "2023-08-22T19:16:22.050",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -124,6 +124,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/",
|
||||
"source": "report@snyk.io"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJHN3QUXPJIMM6SULIR3PR34UFWRAE7X/",
|
||||
"source": "report@snyk.io",
|
||||
|
32
CVE-2022/CVE-2022-250xx/CVE-2022-25024.json
Normal file
32
CVE-2022/CVE-2022-250xx/CVE-2022-25024.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2022-25024",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.173",
|
||||
"lastModified": "2023-08-22T19:16:22.173",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The json2xml package through 3.12.0 for Python allows an error in typecode decoding enabling a remote attack that can lead to an exception, causing a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/vinitkumar/json2xml/issues/106",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vinitkumar/json2xml/pull/107",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/vinitkumar/json2xml/pull/107/files",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packaging.python.org/en/latest/guides/analyzing-pypi-package-downloads/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-265xx/CVE-2022-26592.json
Normal file
20
CVE-2022/CVE-2022-265xx/CVE-2022-26592.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-26592",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.240",
|
||||
"lastModified": "2023-08-22T19:16:22.240",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/sass/libsass/issues/3174",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-280xx/CVE-2022-28068.json
Normal file
20
CVE-2022/CVE-2022-280xx/CVE-2022-28068.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-28068",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.423",
|
||||
"lastModified": "2023-08-22T19:16:22.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/commit/637f4bd1af6752e28e0a9998e954e2e9ce6fa992",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-280xx/CVE-2022-28069.json
Normal file
20
CVE-2022/CVE-2022-280xx/CVE-2022-28069.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-28069",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.513",
|
||||
"lastModified": "2023-08-22T19:16:22.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap buffer overflow in vax_opfunction in radare2 5.4.2 and 5.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/commit/49b0cebfdf0db9704e36f8a5533f1df6d3e2ed3a",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-280xx/CVE-2022-28070.json
Normal file
20
CVE-2022/CVE-2022-280xx/CVE-2022-28070.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-28070",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.583",
|
||||
"lastModified": "2023-08-22T19:16:22.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A null pointer deference in __core_anal_fcn function in radare2 5.4.2 and 5.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/commit/4aff1bb00224de4f5bc118f987dfd5d2fe3450d0",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-280xx/CVE-2022-28071.json
Normal file
20
CVE-2022/CVE-2022-280xx/CVE-2022-28071.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-28071",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.667",
|
||||
"lastModified": "2023-08-22T19:16:22.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-280xx/CVE-2022-28072.json
Normal file
20
CVE-2022/CVE-2022-280xx/CVE-2022-28072.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-28072",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.740",
|
||||
"lastModified": "2023-08-22T19:16:22.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap buffer overflow in r_read_le32 function in radare25.4.2 and 5.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/commit/027cd9b7274988bb1af866539ba6c2fa2ff63e45",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-280xx/CVE-2022-28073.json
Normal file
20
CVE-2022/CVE-2022-280xx/CVE-2022-28073.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-28073",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.843",
|
||||
"lastModified": "2023-08-22T19:16:22.843",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use after free in r_reg_set_value function in radare2 5.4.2 and 5.4.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/radareorg/radare2/commit/59a9dfb60acf8b5c0312061cffd9693fc9526053",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2022/CVE-2022-296xx/CVE-2022-29654.json
Normal file
28
CVE-2022/CVE-2022-296xx/CVE-2022-29654.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2022-29654",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:22.940",
|
||||
"lastModified": "2023-08-22T19:16:22.940",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow vulnerability in quote_for_pmake in asm/nasm.c in nasm before 2.15.05 allows attackers to cause a denial of service via crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gcc.gnu.org/onlinedocs/gcc/Instrumentation-Options.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nasm.us/pub/nasm/releasebuilds/2.15.05/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2022/CVE-2022-340xx/CVE-2022-34038.json
Normal file
24
CVE-2022/CVE-2022-340xx/CVE-2022-34038.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2022-34038",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:23.000",
|
||||
"lastModified": "2023-08-22T19:16:23.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/etcd-io/etcd/pull/14022",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/etcd-io/etcd/pull/14452",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-352xx/CVE-2022-35205.json
Normal file
20
CVE-2022/CVE-2022-352xx/CVE-2022-35205.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-35205",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:23.060",
|
||||
"lastModified": "2023-08-22T19:16:23.060",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Binutils readelf 2.38.50, reachable assertion failure in function display_debug_names allows attackers to cause a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=29289",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user