ecosystem
stringclasses 11
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
220
⌀ | details
stringlengths 34
13.5k
| aliases
stringlengths 17
87
⌀ | modified_date
stringdate 2019-03-26 14:13:00
2022-05-10 08:46:52
| published_date
stringdate 2012-06-17 03:41:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 581
values | refs
stringlengths 82
11.6k
| introduced
stringclasses 843
values | code_refs
stringlengths 46
940
| commits
stringlengths 46
940
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NuGet | GHSA-fm9p-5m9f-rq85 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0915'} | 2022-03-03T05:13:09.041076Z | 2021-03-29T21:00:03Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'} |
NuGet | GHSA-h23m-w6x5-jwr4 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0923'} | 2022-03-03T05:14:08.577126Z | 2021-03-29T21:00:08Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'} |
NuGet | GHSA-prxj-c66c-4gcf | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0924'} | 2022-03-03T05:12:53.230422Z | 2021-03-29T21:00:12Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null | {'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f'} |
NuGet | GHSA-6r92-cgxc-r5fg | Denial of service in CBOR library | ### Impact
Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.
Affected versions _include_ versions 4.0.0 through 4.5.0.
This vulnerability was privately reported to me.
### Patches
This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.)
### Workarounds
Again, users should use the latest version of this library.
In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if—
- it begins with a byte other than 0x80 through 0xDF, or
- it does not contain a byte in the range 0xa0 through 0xBF.
Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
| null | 2022-03-03T05:12:53.419938Z | 2022-01-21T23:35:35Z | HIGH | null | {'CWE-407'} | {'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1', 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95', 'https://github.com/peteroupc/CBOR'} | null | {'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'} | {'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'} |
NuGet | GHSA-v89p-5hr2-4rh4 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196. | {'CVE-2019-1197'} | 2022-03-03T05:12:53.493944Z | 2021-03-29T20:56:15Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null | {'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-5q7q-qqw2-hjq7 | Cross-Site Scripting in AjaxNetProfessional | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects.
### Description
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network.
### Releases
Releases before version 21.12.22.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.
### Workarounds
A workaround exists that replaces one of the core JavaScript files embedded in the library. Using a XML configuration allows to replace the default JavaScript code to be replaced with the version on GitHub.
```xml
<configuration>
<configSections>
<sectionGroup name="ajaxNet">
<section name="ajaxSettings" type="AjaxPro.AjaxSettingsSectionHandler,AjaxPro.2" requirePermission="false" restartOnExternalChanges="true"/>
</sectionGroup>
</configSections>
<ajaxNet>
<ajaxSettings>
<coreScript>~/ajaxpro-core-fixed.js</coreScript>
</ajaxSettings>
</ajaxNet>
</configuration>
```
Copy the file core.js from the main project folder to your web server root folder and rename that ajaxpro-core-fixed.js.
Clients need to refresh the web page to download the changed JavaScript code.
### References
Commit fixing the issue: c89e39b9679fcb8ab6644fe21cc7e652cb615e2b
Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this GitHub repository
| {'CVE-2021-43853'} | 2022-03-03T05:13:21.805430Z | 2022-01-06T18:32:24Z | HIGH | null | {'CWE-79'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43853', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7', 'https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1', 'https://github.com/michaelschwarz/Ajax.NET-Professional'} | null | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b'} |
NuGet | GHSA-8gvg-8vhf-h26g | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933. | {'CVE-2019-0937'} | 2022-03-03T05:12:59.188688Z | 2021-03-29T20:59:03Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null | {'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} |
NuGet | GHSA-rx34-jff5-ph35 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0917'} | 2022-03-03T05:13:15.368520Z | 2021-03-29T21:00:06Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'} |
NuGet | GHSA-6r7c-6w96-8pvw | Remote Code Execution in AjaxNetProfessional | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
### Description
Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.
Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.
Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.
An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.
Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).
### Releases
Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.
### Workarounds
There is no workaround available that addresses all issues except updating to latest version from GitHub.
### References
Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971
Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this GitHub repository
| null | 2022-03-03T05:11:30.895768Z | 2021-12-07T21:21:49Z | CRITICAL | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://github.com/michaelschwarz/Ajax.NET-Professional'} | null | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} |
NuGet | GHSA-jvjp-vh27-r9h5 | Cross-site Scripting in PiranhaCMS | In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution. | {'CVE-2021-25977'} | 2022-03-03T05:14:07.242632Z | 2021-10-27T18:53:03Z | MODERATE | null | {'CWE-79'} | {'https://github.com/PiranhaCMS/piranha.core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977', 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'} | null | {'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'} | {'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'} |
NuGet | GHSA-mw7r-3g6w-85qg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1131'} | 2022-03-03T05:12:46.071533Z | 2021-03-29T20:57:46Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null | {'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-2rfj-2mwp-787v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0993'} | 2022-03-03T05:11:34.130533Z | 2021-03-29T20:57:51Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0993', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'} |
NuGet | GHSA-pwpr-vp2v-99xw | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1138'} | 2022-03-03T05:13:05.852214Z | 2021-03-29T20:56:11Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1138', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1138'} | null | {'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046'} |
NuGet | GHSA-q99r-j969-6jwr | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1237'} | 2022-03-03T05:13:44.392146Z | 2021-03-29T20:56:04Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045'} | null | {'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045'} |
NuGet | GHSA-vw2g-5827-m9fp | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366. | {'CVE-2019-1308'} | 2022-03-03T05:12:56.773266Z | 2021-03-29T20:55:52Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'} | {'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
NuGet | GHSA-9824-rp6m-xx9w | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0989'} | 2022-03-03T05:13:01.401560Z | 2021-03-29T20:59:04Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'} |
NuGet | GHSA-9475-xg6m-j7pw | Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET | ### Impact
Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved.
The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session.
### Patches
Version 1.0.2 and 2.7.0 are patched.
### Workarounds
Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP.
### For more information
If you have any questions or comments about this advisory:
* Comment on #103
* Email us at security@sustainsys.com if you think that there are further security issues. | {'CVE-2020-5268'} | 2022-03-03T05:12:52.477872Z | 2020-04-22T20:59:37Z | MODERATE | null | {'CWE-303'} | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241', 'https://github.com/Sustainsys/Saml2/issues/712', 'https://www.nuget.org/packages/Sustainsys.Saml2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw'} | null | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} |
NuGet | GHSA-874w-m2v2-mj64 | Double Free in Adplug | AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h. | {'CVE-2019-15151'} | 2022-03-03T05:13:08.121515Z | 2021-03-29T20:48:45Z | CRITICAL | null | {'CWE-415'} | {'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e', 'https://github.com/adplug/adplug/issues/91', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/'} | null | {'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'} | {'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'} |
NuGet | GHSA-m22m-h4rf-pwq3 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3. | {'CVE-2021-32840'} | 2022-03-03T05:13:40.088268Z | 2022-02-01T16:22:50Z | HIGH | null | {'CWE-22'} | {'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32840', 'https://github.com/icsharpcode/SharpZipLib', 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'} | null | {'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'} | {'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'} |
NuGet | GHSA-xpwp-rq3x-x6v7 | Critical severity vulnerability that affects recurly-api-client | The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources. | {'CVE-2017-0907'} | 2022-03-03T05:12:43.938941Z | 2018-10-16T17:35:04Z | CRITICAL | null | {'CWE-918'} | {'https://hackerone.com/reports/288635', 'https://dev.recurly.com/page/net-updates', 'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7', 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907'} | null | {'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'} | {'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'} |
NuGet | GHSA-grvw-q343-58wh | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298. | {'CVE-2019-1300'} | 2022-03-03T05:13:58.668379Z | 2021-03-29T20:55:57Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'} | null | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'} |
NuGet | GHSA-v5rv-hpxg-8x49 | Signature validation bypass in ServiceStack | ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature. | {'CVE-2020-28042'} | 2022-03-03T05:13:06.294605Z | 2021-01-13T19:13:11Z | MODERATE | null | {'CWE-347'} | {'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/', 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.nuget.org/packages/ServiceStack/'} | null | {'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'} | {'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'} |
NuGet | GHSA-5rcr-q3rx-j7vr | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106. | {'CVE-2019-1107'} | 2022-03-03T05:13:46.158859Z | 2021-03-29T20:57:35Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'} |
NuGet | GHSA-hrmm-f4j8-8vxc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0922'} | 2022-03-03T05:14:02.985181Z | 2021-03-29T21:00:11Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'} |
NuGet | GHSA-6j89-jhpr-849f | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366. | {'CVE-2019-1307'} | 2022-03-03T05:13:12.777814Z | 2021-03-29T20:55:46Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b'} | {'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
NuGet | GHSA-ppxc-pmx9-qjv9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1195'} | 2022-03-03T05:12:39.713478Z | 2021-03-29T20:57:59Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null | {'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-7q36-4xx7-xcxf | Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack | ### Impact
When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors:
1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized.
1. stack overflow - leading to the deserializing process crashing.
### Patches
The following steps are required to mitigate this risk.
1. Upgrade to a version of the library where a fix is available
1. Add code to your application to put MessagePack into the defensive `UntrustedData` mode.
1. Identify all MessagePack extensions that implement `IMessagePackFormatter<T>` implementations that do not ship with the MessagePack library to include the security mitigations. This includes those acquired from 3rd party packages and classes included directly into your project. Any AOT formatters generated with the MPC tool must be regenerated with the patched version of mpc.
1. Review your messagepack-serializable data structures for hash-based collections that use custom or unusual types for the hashed key. See below for details on handling such situations.
Review the `MessagePackSecurity` class to tweak any settings as necessary to strike the right balance between performance, functionality, and security.
Specialized `IEqualityComparer<T>` implementations provide the hash collision resistance.
Each type of hashed key may require a specialized implementation of its own.
The patched MessagePack library includes many such implementations for primitive types commonly used as keys in hash-based collections.
If your data structures use custom types as keys in these hash-based collections,
putting MessagePack in `UntrustedData` mode may lead the deserializer to throw an exception
because no safe `IEqualityComparer<T>` is available for your custom `T` type.
You can provide your own safe implementation by deriving from the `MessagePackSecurity` class
and overriding the `GetHashCollisionResistantEqualityComparer<T>()` method to return your own
custom implementation when `T` matches your type, and fallback to `return base.GetHashCollisionResistantEqualityComparer<T>();` for types you do not have custom implementations for.
Unrelated to this advisory, but as general security guidance, you should also avoid the Typeless serializer/formatters/resolvers for untrusted data as that opens the door for the untrusted data to potentially deserialize unanticipated types that can compromise security.
#### MessagePack 1.x users
1. Upgrade to any 1.9.x version.
1. When deserializing untrusted data, put MessagePack into a more secure mode with:
```cs
MessagePackSecurity.Active = MessagePackSecurity.UntrustedData;
```
In MessagePack v1.x this is a static property and thus the security level is shared by the entire process or AppDomain.
Use MessagePack v2.1 or later for better control over the security level for your particular use.
1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `MessagePackSecurity` class.
Review any custom-written `IMessagePackFormatter<T>` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required.
In particular, a formatter that deserializes an object (as opposed to a primitive value) should wrap the deserialization in a `using (MessagePackSecurity.DepthStep())` block. For example:
```cs
public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options)
{
if (reader.TryReadNil())
{
return default;
}
else
{
using (MessagePackSecurity.DepthStep()) // STACK OVERFLOW MITIGATION
{
MyObject o = new MyObject();
// deserialize members of the object here.
return o;
}
}
}
```
If your custom formatter creates hash-based collections (e.g. `Dictionary<K, V>` or `HashSet<T>`) where the hashed key comes from the messagepack data, always instantiate your collection using `MessagePackSecurity.Active.GetEqualityComparer<T>()` as the equality comparer:
```cs
var collection = new HashSet<T>(MessagePackSecurity.Active.GetEqualityComparer<T>());
```
This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm.
Learn more about [best security practices when reading untrusted data with MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security).
#### MessagePack 2.x users
1. Upgrade to any 2.1.x or later version.
1. When deserializing untrusted data, put MessagePack into a more secure mode by configuring your `MessagePackSerializerOptions.Security` property:
```cs
var options = MessagePackSerializerOptions.Standard
.WithSecurity(MessagePackSecurity.UntrustedData);
// Pass the options explicitly for the greatest control.
T object = MessagePackSerializer.Deserialize<T>(data, options);
// Or set the security level as the default.
MessagePackSerializer.DefaultOptions = options;
```
1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `Security` member on the `MessagePackSerializerOptions` parameter.
Review any custom-written `IMessagePackFormatter<T>` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required.
In particular, a formatter that deserializes an object (as opposed to a primitive value) should call `options.Security.DepthStep(ref reader);` before deserializing the object's members, and be sure to revert the depth step with `reader.Depth--;` before exiting the method. For example:
```cs
public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options)
{
if (reader.TryReadNil())
{
return default;
}
else
{
options.Security.DepthStep(ref reader); // STACK OVERFLOW MITIGATION, line 1
try
{
MyObject o = new MyObject();
// deserialize members of the object here.
return o;
}
finally
{
reader.Depth--; // STACK OVERFLOW MITIGATION, line 2
}
}
}
```
If your custom formatter creates hash-based collections (e.g. `Dictionary<K, V>` or `HashSet<T>`) where the hashed key comes from the messagepack data, always instantiate your collection using `options.Security.GetEqualityComparer<TKey>()` as the equality comparer:
```cs
var collection = new HashSet<T>(options.Security.GetEqualityComparer<T>());
```
This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm.
Learn more about [best security practices when reading untrusted data with MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security).
### Workarounds
The security vulnerabilities are in the formatters.
Avoiding the built-in formatters entirely in favor of reading messagepack primitive data directly
or relying on carefully written custom formatters can provide a workaround.
MessagePack v1.x users may utilize the `MessagePackBinary` static class directly to read the data they expect.
MessagePack v2.x users may utilize the `MessagePackReader` struct directly to read the data they expect.
### References
Learn more about best security practices when reading untrusted data with [MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security) or [MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [MessagePack-CSharp](https://github.com/neuecc/MessagePack-CSharp/issues/new/choose)
* [Email us](mailto:andrewarnott@gmail.com) | {'CVE-2020-5234'} | 2022-03-03T05:13:22.194363Z | 2020-01-31T17:59:20Z | MODERATE | null | {'CWE-121'} | {'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02', 'https://github.com/neuecc/MessagePack-CSharp/issues/810', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5234'} | null | {'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'} | {'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007'} |
NuGet | GHSA-7423-5qfm-g648 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0916'} | 2022-03-03T05:13:45.933184Z | 2021-03-29T21:00:09Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'} |
NuGet | GHSA-2x7h-96h5-rq84 | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability. | {'CVE-2021-32841'} | 2022-03-03T05:13:28.356898Z | 2022-02-01T16:22:57Z | MODERATE | null | {'CWE-22'} | {'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/icsharpcode/SharpZipLib', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'} | null | {'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'} | {'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'} |
NuGet | GHSA-g8j6-m4p7-5rfq | High severity vulnerability that affects DotNetNuke.Core | DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources. | {'CVE-2017-0929'} | 2022-03-03T05:13:02.306663Z | 2018-10-16T17:18:12Z | HIGH | null | {'CWE-918'} | {'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3', 'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq', 'https://github.com/dnnsoftware/Dnn.Platform', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0929'} | null | {'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'} | {'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'} |
NuGet | GHSA-rh4p-g7x6-8pqg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1062'} | 2022-03-03T05:13:18.764715Z | 2021-03-29T20:59:09Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1062', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'} |
NuGet | GHSA-9qw8-ccq9-ffj9 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1139'} | 2022-03-03T05:14:02.943957Z | 2021-03-29T20:57:53Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139'} | null | {'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | {'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} |
NuGet | GHSA-w89r-qch4-8jv5 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0912'} | 2022-03-03T05:13:37.247605Z | 2021-03-29T20:59:59Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'} |
NuGet | GHSA-2x75-mf24-588m | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1092'} | 2022-03-03T05:14:00.642186Z | 2021-03-29T20:59:11Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1092', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} | null | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'} |
NuGet | GHSA-2452-3rwv-x89c | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300. | {'CVE-2019-1298'} | 2022-03-03T05:13:43.259043Z | 2021-03-29T20:56:01Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298'} | null | {'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782'} |
NuGet | GHSA-hfvc-g252-rp4g | Denial of Service in i18n | This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | {'CVE-2020-7791'} | 2022-03-03T05:14:11.849809Z | 2020-12-14T19:50:22Z | MODERATE | null | {'CWE-400', 'CWE-20'} | {'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E'} | null | {'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'} | {'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'} |
NuGet | GHSA-6w5m-jgc5-8cgc | orchardcore is vulnerable to Cross-site Scripting | orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0159'} | 2022-03-03T05:14:13.613996Z | 2022-01-21T23:57:49Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://github.com/orchardcms/orchardcore'} | null | {'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} | {'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'} |
NuGet | GHSA-2wwc-w2gw-4329 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335. | {'CVE-2019-1366'} | 2022-03-03T05:13:27.978381Z | 2021-03-29T20:55:36Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'} | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf'} | {'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
NuGet | GHSA-rqrc-8q8f-cp9c | Infinite loop in .Net Bond | A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads. | {'CVE-2020-1469'} | 2022-04-08T18:34:02.348210Z | 2022-04-08T18:11:51Z | HIGH | null | {'CWE-434', 'CWE-835'} | {'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469', 'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469'} | null | {'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'} | {'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'} |
NuGet | GHSA-7378-6268-4278 | High severity vulnerability that affects DotNetZip | DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | {'CVE-2018-1002205'} | 2022-03-03T05:13:57.586333Z | 2018-10-16T17:16:40Z | HIGH | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/pull/121'} | null | {'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'} | {'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'} |
NuGet | GHSA-pjxv-w3qj-j8m3 | Directory Traversal in elFinder.AspNet | This affects the package elFinder.AspNet before 1.1.1.
The user-controlled file name is not properly sanitized before it is used to create a file system path.
| {'CVE-2021-23415'} | 2022-03-03T05:13:27.755638Z | 2021-08-09T20:42:13Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720', 'https://github.com/mguinness/elFinder.AspNet'} | null | {'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'} | {'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'} |
NuGet | GHSA-mjww-934m-h4jw | Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua | A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates. | {'CVE-2020-29457'} | 2022-03-03T05:13:00.413150Z | 2021-11-19T20:19:53Z | MODERATE | null | {'CWE-295'} | {'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25', 'https://github.com/OPCFoundation/UA-.NETStandard/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29457', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/'} | null | {'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'} | {'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'} |
NuGet | GHSA-53r4-h27g-rg3x | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0992'} | 2022-03-03T05:12:36.945087Z | 2021-03-29T20:59:07Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0992'} | null | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'} | {'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'} |
NuGet | GHSA-fxh6-w476-hgr4 | Directory Traversal in SharpCompress | SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction. | {'CVE-2018-1002206'} | 2022-03-03T05:13:37.184703Z | 2019-09-11T22:59:57Z | MODERATE | null | {'CWE-22'} | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'} | null | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'} | {'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'} |
NuGet | GHSA-mvvp-gwgc-5hrp | Path Traversal in elFinder.Net.Core | This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path. | {'CVE-2021-23407'} | 2022-03-03T05:13:33.232451Z | 2021-08-02T17:30:27Z | HIGH | null | {'CWE-22'} | {'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://github.com/trannamtrung1st/elFinder.Net.Core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://github.com/trannamtrung1st/elFinder.Net.Core/releases/tag/all-1.2.4'} | null | {'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'} | {'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'} |
OSS-Fuzz | OSV-2021-1168 | Heap-buffer-overflow in exif_get_slong | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
exif_get_slong
exif_get_long
exif_get_rational
```
| null | 2022-04-13T03:04:40.883862Z | 2021-08-25T00:01:25.325827Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570', 'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'} | {'https://github.com/libexif/libexif/commit/ce946b93dfd34b2187d9f9fb01603943fbb32137'} | {'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'} | {'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'} |
OSS-Fuzz | OSV-2021-386 | Stack-buffer-overflow in ot::Coap::Message::AppendUintOption | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831
```
Crash type: Stack-buffer-overflow READ 1
Crash state:
ot::Coap::Message::AppendUintOption
ot::Coap::Message::AppendBlockOption
otCoapMessageAppendBlock2Option
```
| null | 2022-04-13T03:04:38.946438Z | 2021-02-13T00:00:59.547439Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831', 'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'} | {'https://github.com/openthread/openthread/commit/2cd36266abaaf8b79ebb0441e6ed2ec3847cf3ca'} | {'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'} | {'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'} |
OSS-Fuzz | OSV-2020-386 | Heap-buffer-overflow in OPENSSL_strlcpy | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
OPENSSL_strlcpy
OPENSSL_strlcat
ERR_add_error_vdata
```
| null | 2022-04-13T03:04:38.742191Z | 2020-07-01T00:00:06.528477Z | HIGH | null | null | {'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107'} | {'https://github.com/openssl/openssl/commit/10f8b36874fca928c3f41834babac8ee94dd3f09'} | {'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'} | {'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'} |
OSS-Fuzz | OSV-2017-39 | Use-of-uninitialized-value in IsRelativeSymlinkSafe | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308
```
Crash type: Use-of-uninitialized-value
Crash state:
IsRelativeSymlinkSafe
ExtractUnixLink30
ExtractSymlink
```
| null | 2022-04-13T03:04:35.323958Z | 2021-01-13T21:56:03.501889Z | MEDIUM | null | null | {'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308'} | {'https://github.com/aawc/unrar/commit/d2e5341ebf6f34c9bd5939c3ac812cb2cd983081'} | {'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987'} | {'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987'} |
OSS-Fuzz | OSV-2020-2076 | Use-of-uninitialized-value in UpdateDecStatNoFreezingInfo | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346
```
Crash type: Use-of-uninitialized-value
Crash state:
UpdateDecStatNoFreezingInfo
UpdateDecStat
WelsDec::DecodeFrameConstruction
```
| null | 2022-04-13T03:04:37.372384Z | 2020-10-16T00:00:42.366443Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346', 'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'} | {'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} | {'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'} | {'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'} |
OSS-Fuzz | OSV-2020-369 | UNKNOWN READ in ot::TimerScheduler::Remove | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383
```
Crash type: UNKNOWN READ
Crash state:
ot::TimerScheduler::Remove
ot::Mle::Mle::Stop
otThreadSetEnabled
```
| null | 2022-04-13T03:04:38.951596Z | 2020-07-01T00:00:05.571696Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383', 'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'} | {'https://github.com/openthread/openthread/commit/3eb5a106ffa6678e23c6bc244e843e264cae9b31'} | {'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'} | {'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'} |
OSS-Fuzz | OSV-2020-693 | Heap-buffer-overflow in parse_sec_attr_44 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
parse_sec_attr_44
setcos_select_file
sc_select_file
```
| null | 2022-04-13T03:04:41.597761Z | 2020-07-01T00:00:25.178023Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798', 'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'} | {'https://github.com/OpenSC/OpenSC/commit/7a1e42e1352201127d1a97b6cb5f41e48cace0f5'} | {'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'} | {'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'} |
OSS-Fuzz | OSV-2020-2099 | Heap-buffer-overflow in decode_chars | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
decode_chars
decode_font
process_text
```
| null | 2022-04-13T03:04:30.610125Z | 2020-10-28T00:00:05.887987Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674', 'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'} | {'https://github.com/libass/libass/commit/910211f1c0078e37546f73e95306724358b89be2'} | {'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'} | {'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'} |
OSS-Fuzz | OSV-2020-2133 | Heap-buffer-overflow in tdefl_compress_lz_codes | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263
```
Crash type: Heap-buffer-overflow WRITE 8
Crash state:
tdefl_compress_lz_codes
tdefl_compress_block
tdefl_flush_block
```
| null | 2022-04-13T03:29:21.391124Z | 2020-11-08T00:00:05.283717Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263', 'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'} | {'https://github.com/fluent/fluent-bit//commit/03ff96d82f5f51a8bea6981fc9d7e8c3429c50b1', 'https://github.com/fluent/fluent-bit//commit/7a588237fdb744e5825fb119753dcad2e8878866'} | {'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'} | {'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'} |
OSS-Fuzz | OSV-2020-739 | UNKNOWN READ in str_decref | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756
```
Crash type: UNKNOWN READ
Crash state:
str_decref
obj_free
mrb_gc_destroy
```
| null | 2022-04-13T03:04:39.688080Z | 2020-07-01T00:00:27.971876Z | MEDIUM | null | null | {'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756'} | {'https://github.com/mruby/mruby/commit/caba5fef274ab7df91b7247182ecbf2483b853b8'} | {'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2'} | {'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2'} |
OSS-Fuzz | OSV-2021-369 | Segv on unknown address in blosc_read_header | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761
```
Crash type: Segv on unknown address
Crash state:
blosc_read_header
blosc2_getitem_ctx
blosc_getitem
```
| null | 2022-04-13T03:04:40.205415Z | 2021-02-11T00:01:00.831869Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761', 'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'} | {'https://github.com/Blosc/c-blosc2/commit/57fca38a4f51687d71e451ae29df6b353764fb72'} | {'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'} | {'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'} |
OSS-Fuzz | OSV-2021-739 | Stack-buffer-overflow in flb_sds_cat | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025
```
Crash type: Stack-buffer-overflow READ {*}
Crash state:
flb_sds_cat
flb_ra_translate
record_ac_fuzzer.c
```
| null | 2022-04-13T03:04:38.249988Z | 2021-05-08T00:01:15.452663Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57', 'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c'} | {'https://github.com/fluent/fluent-bit//commit/68746b76af8b143daf477033a6799902be2f3cad'} | {'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57'} | {'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57'} |
OSS-Fuzz | OSV-2020-410 | Global-buffer-overflow in lex_multiline_string | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455
Crash type: Global-buffer-overflow READ 1
Crash state:
lex_multiline_string
lex_next
parse_config
| null | 2021-03-09T04:49:05.872972Z | 2020-07-01T00:00:07.995615Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455', 'git://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'} | {'git://github.com/lpereira/lwan/commit/c9ac13203b6685d3bf89ab6d257b37dd6b0d5833'} | {'https://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'} | {'https://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'} |
OSS-Fuzz | OSV-2020-1965 | UNKNOWN READ in asn1_item_print_ctx | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920
```
Crash type: UNKNOWN READ
Crash state:
asn1_item_print_ctx
asn1_template_print_ctx
asn1_item_print_ctx
```
| null | 2022-04-13T03:04:38.790305Z | 2020-10-03T00:00:22.855250Z | MEDIUM | null | null | {'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920'} | {'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'} | {'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'} | {'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'} |
OSS-Fuzz | OSV-2020-943 | Heap-buffer-overflow in pcpp::HeaderField::HeaderField | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
pcpp::HeaderField::HeaderField
pcpp::TextBasedProtocolMessage::parseFields
pcpp::SipResponseLayer::SipResponseLayer
```
| null | 2022-04-13T03:04:38.590838Z | 2020-07-22T00:00:21.373584Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528', 'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'} | {'https://github.com/seladb/PcapPlusPlus/commit/4366d2f86bf105025765a0ce3db6e647ba0f3508'} | {'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'} | {'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'} |
OSS-Fuzz | OSV-2020-1066 | Heap-buffer-overflow in dav1dFeedData | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
dav1dFeedData
dav1dCodecGetNextImage
avifDecoderNextImage
```
| null | 2022-04-13T03:34:31.037013Z | 2020-07-22T21:49:44.588962Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947', 'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1'} | {'https://github.com/AOMediaCodec/libavif/commit/4be7ce1dd3f0a45cd2555c94bd76a8f40baabcc4'} | {'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1', 'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be'} | {'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1'} |
OSS-Fuzz | OSV-2018-143 | Global-buffer-overflow in CFF::BlendArg::set_blends | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714
```
Crash type: Global-buffer-overflow READ 8
Crash state:
CFF::BlendArg::set_blends
CFF::CFF2CSOpSet<CFF2CSOpSet_SubrSubset, CFF::SubrSubsetParam, CFF::PathProcsNul
CFF2CSOpSet_SubrSubset::process_op
```
| null | 2022-04-13T03:35:31.377146Z | 2021-01-13T00:01:01.540340Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714', 'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'} | {'https://github.com/harfbuzz/harfbuzz/commit/0996c0ff6279f377e2b14f08663df2ce82de2b14'} | {'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'} | {'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'} |
OSS-Fuzz | OSV-2021-555 | Uncaught exception in java.base/java.util.concurrent.ConcurrentHashMap.putVal | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395
```
Crash type: Uncaught exception
Crash state:
java.base/java.util.concurrent.ConcurrentHashMap.putVal
java.base/java.util.concurrent.ConcurrentHashMap.put
com.fasterxml.jackson.core.util.InternCache.intern
```
| null | 2022-04-13T03:04:31.802020Z | 2021-03-25T00:00:09.158172Z | LOW | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501', 'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd'} | {'https://github.com/FasterXML/jackson-core/commit/2bd85ebcdd94233d9e59a0833f29e06ce4281f3b'} | {'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501'} | {'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501'} |
OSS-Fuzz | OSV-2020-1573 | Use-of-uninitialized-value in void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633
```
Crash type: Use-of-uninitialized-value
Crash state:
void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop
ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig
ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig
```
| null | 2022-04-13T03:04:39.357700Z | 2020-08-04T00:00:11.334079Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633', 'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'} | {'https://github.com/bblanchon/ArduinoJson/commit/298864bafe080e6a0a42185445b278be92820110'} | {'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'} | {'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'} |
OSS-Fuzz | OSV-2020-806 | Segv on unknown address in process_ndpi_collected_info | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122
```
Crash type: Segv on unknown address
Crash state:
process_ndpi_collected_info
packet_processing
ndpi_workflow_process_packet
```
| null | 2022-04-13T03:04:35.988021Z | 2020-07-14T05:37:42.995133Z | null | null | null | {'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122'} | {'https://github.com/ntop/nDPI/commit/4a09b4efa053a26e187119a540da4b41dd8a24d8'} | {'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'} | {'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'} |
OSS-Fuzz | OSV-2020-1123 | Index-out-of-bounds in store_reg_arm | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026
```
Crash type: Index-out-of-bounds
Crash state:
store_reg_arm
gen_load_exclusive_arm
disas_arm_insn_arm
```
| null | 2022-04-13T03:04:39.220642Z | 2020-07-22T21:49:48.909471Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026', 'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'} | {'https://github.com/unicorn-engine/unicorn/commit/46999575fb9e82ccd925e835d0d7db47200e010d'} | {'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'} | {'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'} |
OSS-Fuzz | OSV-2020-63 | UNKNOWN READ in arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20697
```
Crash type: UNKNOWN READ
Crash state:
arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend
parquet::PlainByteArrayDecoder::DecodeArrowDense
parquet::PlainByteArrayDecoder::DecodeArrow
```
| null | 2022-04-13T03:04:31.882807Z | 2020-06-24T01:51:12.364400Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20697', 'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} |
OSS-Fuzz | OSV-2020-555 | Heap-use-after-free in WelsDec::CWelsDecoder::SetOption | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18747
```
Crash type: Heap-use-after-free WRITE 1
Crash state:
WelsDec::CWelsDecoder::SetOption
decoder_fuzzer.cpp
WelsCommon::WelsFree
```
| null | 2022-04-13T03:04:37.579466Z | 2020-07-01T00:00:16.726929Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18747', 'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'} | {'https://github.com/cisco/openh264/commit/2091de60c6a235a3236475d2208139f6a8862f48'} | {'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'} | {'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'} |
OSS-Fuzz | OSV-2020-105 | Segv on unknown address in cbor_typeof | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21387
```
Crash type: Segv on unknown address
Crash state:
cbor_typeof
_cbor_nested_describe
_cbor_nested_describe
```
| null | 2022-04-13T03:04:41.481665Z | 2020-06-24T01:51:14.307336Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21387', 'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'} | {'https://github.com/PJK/libcbor/commit/6e6050e9ca2a898de1c6b0f3babadb745b5047da'} | {'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'} | {'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'} |
OSS-Fuzz | OSV-2020-1820 | Stack-buffer-overflow in hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25815
```
Crash type: Stack-buffer-overflow READ 2
Crash state:
hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha
hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha
hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha
```
| null | 2022-04-13T03:04:31.093016Z | 2020-09-21T00:00:18.040780Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25815', 'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'} | {'https://github.com/facebook/hermes/commit/58f7c31e9da3ac8cdf894307080929fa93648870'} | {'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'} | {'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'} |
OSS-Fuzz | OSV-2020-781 | Heap-buffer-overflow in __libcpp_memchr | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23328
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
__libcpp_memchr
memchr
pcpp::HeaderField::HeaderField
```
| null | 2022-04-13T03:04:38.663249Z | 2020-07-14T05:37:32.830824Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23328', 'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'} | {'https://github.com/seladb/PcapPlusPlus/commit/aeaa2e1cd094ff2083517bf4c987dc3a1380ec71'} | {'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'} | {'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'} |
OSS-Fuzz | OSV-2021-1353 | Heap-buffer-overflow in MqttClient_DecodePacket | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39056
```
Crash type: Heap-buffer-overflow WRITE 1
Crash state:
MqttClient_DecodePacket
MqttClient_WaitType
MqttClient_Unsubscribe
```
| null | 2022-04-13T03:04:34.005024Z | 2021-09-22T00:01:32.692141Z | HIGH | null | null | {'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39056'} | {'https://github.com/wolfSSL/wolfMQTT/commit/237f693c5731dcbd6adc9de69d9f575421c4414e'} | {'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2'} | {'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2'} |
OSS-Fuzz | OSV-2018-114 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10933
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
BEInt<unsigned int, 4>::operator unsigned int
OT::OffsetTo<OT::UnsizedArrayOf<OT::IntType<short, 2u> >, OT::IntType<unsigned i
AAT::KerxSubTableFormat2::get_kerning
```
| null | 2022-04-13T03:04:33.142061Z | 2021-01-13T00:00:52.786317Z | MEDIUM | null | null | {'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10933'} | {'https://github.com/harfbuzz/harfbuzz/commit/c9165f5450b99e6d93e2a168b198384a221eef58'} | {'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42'} | {'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42'} |
OSS-Fuzz | OSV-2021-447 | Heap-buffer-overflow in luaG_runerror | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31331
```
Crash type: Heap-buffer-overflow READ 8
Crash state:
luaG_runerror
luaD_pretailcall
luaV_execute
```
| null | 2022-04-13T03:36:53.712818Z | 2021-02-25T00:02:41.560298Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31331', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979', 'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6'} | {'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6'} | {'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979'} | {'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979'} |
OSS-Fuzz | OSV-2021-914 | UNKNOWN READ in mrb_vm_ci_env | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35718
```
Crash type: UNKNOWN READ
Crash state:
mrb_vm_ci_env
cipop
mrb_vm_exec
```
| null | 2022-04-13T03:04:39.759907Z | 2021-07-03T00:01:26.278614Z | MEDIUM | null | null | {'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35718'} | {'https://github.com/mruby/mruby/commit/99dbcec89c892bc90f36fbf38e46a9ec971e3a77'} | {'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4'} | {'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4'} |
OSS-Fuzz | OSV-2020-1898 | Heap-buffer-overflow in WelsDec::UpdateP16x16RefIdx | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26078
```
Crash type: Heap-buffer-overflow WRITE 2
Crash state:
WelsDec::UpdateP16x16RefIdx
WelsDec::PredBDirectTemporal
WelsDec::ParseInterBInfo
```
| null | 2022-04-13T03:04:37.589868Z | 2020-10-02T00:00:14.116993Z | HIGH | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26078', 'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} | {'https://github.com/cisco/openh264/commit/66ef706acd55b0b8daec32ca299d2586a1f473c9'} | {'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} | {'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'} |
OSS-Fuzz | OSV-2020-447 | UNKNOWN READ in yyparse | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17968
```
Crash type: UNKNOWN READ
Crash state:
yyparse
mrb_parser_parse
mrb_parse_nstring
```
| null | 2022-04-13T03:04:39.703625Z | 2020-07-01T00:00:10.057682Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17968', 'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'} | {'https://github.com/mruby/mruby/commit/ec6c8b2a3c5c499d8832ef82a2ad941cbac4a80a'} | {'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'} | {'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'} |
OSS-Fuzz | OSV-2020-502 | Heap-use-after-free in WelsDec::SetUnRef | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18644
```
Crash type: Heap-use-after-free WRITE 1
Crash state:
WelsDec::SetUnRef
WelsDec::WelsResetRefPic
WelsFreeDynamicMemory
```
| null | 2022-04-13T03:04:37.542309Z | 2020-07-01T00:00:13.377454Z | HIGH | null | null | {'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18644'} | {'https://github.com/cisco/openh264/commit/c185ac351eff0ae277bfe14a3b2ad52e9ed8ab81'} | {'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec'} | {'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec'} |
OSS-Fuzz | OSV-2020-34 | UNKNOWN READ in parquet::LevelDecoder::SetData | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20666
```
Crash type: UNKNOWN READ
Crash state:
parquet::LevelDecoder::SetData
parquet::ColumnReaderImplBase<parquet::PhysicalType<
parquet::ColumnReaderImplBase<parquet::PhysicalType<
```
| null | 2022-04-13T03:04:32.024330Z | 2020-06-24T01:51:11.146400Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20666', 'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} | {'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'} |
OSS-Fuzz | OSV-2021-152 | Stack-buffer-overflow in ot::NetworkData::ServerTlv::GetServer16 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5878
```
Crash type: Stack-buffer-overflow READ 2
Crash state:
ot::NetworkData::ServerTlv::GetServer16
ot::NetworkData::Leader::RlocLookup
ot::NetworkData::Leader::RegisterNetworkData
```
| null | 2022-04-13T03:04:38.987900Z | 2021-01-13T21:56:33.613485Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5878', 'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'} | {'https://github.com/openthread/openthread/commit/9190aa21c4b3983c05aad6be8fd5d62942b8cbd8'} | {'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'} | {'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'} |
OSS-Fuzz | OSV-2021-1216 | Global-buffer-overflow in fr_is_base16_nstd | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38283
```
Crash type: Global-buffer-overflow READ 1
Crash state:
fr_is_base16_nstd
fr_base16_decode_nstd
fr_value_box_from_str
```
| null | 2022-04-13T03:04:40.152583Z | 2021-09-10T00:00:35.488094Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38283', 'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'} | {'https://github.com/FreeRADIUS/freeradius-server/commit/6c6878ce4cdc5ac58e5115553656e05c9695544e'} | {'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'} | {'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'} |
OSS-Fuzz | OSV-2021-1646 | Heap-buffer-overflow in uncompress_b44_impl | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41625
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
uncompress_b44_impl
default_decompress_chunk
exr_decoding_run
```
| null | 2022-04-13T03:21:51.316157Z | 2021-12-04T00:01:33.435462Z | MEDIUM | null | null | {'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41625', 'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06'} | {'https://github.com/AcademySoftwareFoundation/openexr/commit/40eb606dc5e8b04b7634f8a4a15f44b4e2044191', 'https://github.com/AcademySoftwareFoundation/openexr/commit/57b05e055c7065ac5873f64e42350449be1eccb8'} | {'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95', 'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06'} | {'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06', 'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95'} |
OSS-Fuzz | OSV-2022-321 | Stack-use-after-scope in std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<g | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46468
```
Crash type: Stack-use-after-scope WRITE 1
Crash state:
std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<g
tf::Executor::_invoke
tf::Executor::_consume_task
```
| null | 2022-04-13T03:04:39.574474Z | 2022-04-09T00:00:21.286205Z | null | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46468', 'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'} | {'https://github.com/GrokImageCompression/grok/commit/a27b85d5d31dc6da58aa8af859e63448a6384150'} | {'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'} | {'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'} |
OSS-Fuzz | OSV-2021-1083 | Heap-buffer-overflow in flb_hash_get_by_id | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36718
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
flb_hash_get_by_id
utils_fuzzer.c
```
| null | 2022-04-13T03:38:50.195219Z | 2021-08-01T00:00:59.162586Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36718', 'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'} | {'https://github.com/fluent/fluent-bit//commit/10ceb5b2ab6635a000f3eceaa267e1e34496de6b'} | {'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'} | {'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'} |
OSS-Fuzz | OSV-2020-797 | Use-of-uninitialized-value in MipsAsmParser::isPicAndNotNxxAbi | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22778
```
Crash type: Use-of-uninitialized-value
Crash state:
MipsAsmParser::isPicAndNotNxxAbi
MipsAsmParser::processInstruction
MipsAsmParser::MatchAndEmitInstruction
```
| null | 2022-04-13T03:04:37.905755Z | 2020-07-14T05:37:37.559643Z | MEDIUM | null | null | {'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22778'} | {'https://github.com/keystone-engine/keystone/commit/d49b6fa4013efb919d434bfd439311d6cb67a0f7'} | {'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871'} | {'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871'} |
OSS-Fuzz | OSV-2017-78 | Negative-size-param in UA_SecureChannel_processChunk | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3609
```
Crash type: Negative-size-param
Crash state:
UA_SecureChannel_processChunk
processCompleteChunk
UA_Connection_processChunks
```
| null | 2022-04-13T03:04:41.415024Z | 2021-01-13T21:57:35.111717Z | null | null | null | {'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3609'} | {'https://github.com/open62541/open62541/commit/84d46ddefe21c7eb5f678a5046fa200ac1b4e617'} | {'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b'} | {'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b'} |
OSS-Fuzz | OSV-2020-328 | UNKNOWN READ in dotnet_parse_tilde_2 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16448
```
Crash type: UNKNOWN READ
Crash state:
dotnet_parse_tilde_2
dotnet_parse_tilde
dotnet_parse_com
```
| null | 2022-04-13T03:25:20.410918Z | 2020-07-01T00:00:03.116576Z | MEDIUM | null | null | {'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc', 'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16448'} | {'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'} | {'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc'} | {'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc'} |
OSS-Fuzz | OSV-2017-97 | Use-after-poison in rawspeed::unroll_loop_t<void rawspeed::LJpegDecompressor::decodeN<4> | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4451
```
Crash type: Use-after-poison WRITE 2
Crash state:
rawspeed::unroll_loop_t<void rawspeed::LJpegDecompressor::decodeN<4>
void rawspeed::LJpegDecompressor::decodeN<4>
rawspeed::AbstractLJpegDecompressor::decode
```
| null | 2022-04-13T03:04:36.488088Z | 2021-01-13T21:57:40.779998Z | HIGH | null | null | {'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4451'} | {'https://github.com/darktable-org/rawspeed/commit/45e6fd6c608326ae7df6419c62cc8db6a2f15281'} | {'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09'} | {'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09'} |
OSS-Fuzz | OSV-2022-264 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessRow | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=45822
```
Crash type: Heap-buffer-overflow READ 4
Crash state:
jxl::N_AVX2::BlendingStage::ProcessRow
jxl::LowMemoryRenderPipeline::RenderRect
jxl::LowMemoryRenderPipeline::ProcessBuffers
```
| null | 2022-04-13T03:04:38.130266Z | 2022-03-21T00:00:16.278407Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=45822', 'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} | {'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} | {'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} | {'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'} |
OSS-Fuzz | OSV-2021-282 | Heap-buffer-overflow in LibRaw_buffer_datastream::read | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30324
```
Crash type: Heap-buffer-overflow WRITE {*}
Crash state:
LibRaw_buffer_datastream::read
LibRaw::uncompressed_fp_dng_load_raw
LibRaw::unpack
```
| null | 2022-04-13T03:04:39.979494Z | 2021-02-06T00:00:24.519678Z | HIGH | null | null | {'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30324'} | {'https://github.com/libraw/libraw/commit/4c954948ba2de262b9cb23a1843fb8651aa3dcc1'} | {'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e'} | {'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e'} |
OSS-Fuzz | OSV-2021-778 | UNKNOWN READ in helper_uc_tracecode | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34457
Crash type: UNKNOWN READ
Crash state:
helper_uc_tracecode
| null | 2021-05-20T00:01:16.313394Z | 2021-05-20T00:01:16.313104Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34457', 'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'} | {'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'} | {'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'} | {'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'} |
OSS-Fuzz | OSV-2021-902 | Heap-buffer-overflow in ebitmap_match_any | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35553
```
Crash type: Heap-buffer-overflow READ 8
Crash state:
ebitmap_match_any
avtab_map
cil_check_neverallow
```
| null | 2022-04-13T03:04:42.344343Z | 2021-06-27T00:01:23.702334Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35553', 'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'} | {'https://github.com/SELinuxProject/selinux/commit/37863b0b1444c85a1ddc6c333c8bfea0c678c592'} | {'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'} | {'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'} |
OSS-Fuzz | OSV-2018-102 | Heap-buffer-overflow in r_read_le32 | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11303
```
Crash type: Heap-buffer-overflow READ 1
Crash state:
r_read_le32
r_bin_file_get_strings
r_bin_object_set_items
```
| null | 2022-04-13T03:04:36.594467Z | 2021-01-13T00:00:44.549063Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11303', 'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a', 'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3'} | {'https://github.com/radare/radare2/commit/d8269a9e2bacbcfbd76fac63b461cea523460d7c'} | {'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a', 'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3'} | {'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3', 'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a'} |
OSS-Fuzz | OSV-2021-514 | UNKNOWN READ in _fini | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31953
```
Crash type: UNKNOWN READ
Crash state:
_fini
```
| null | 2022-04-13T03:04:32.242907Z | 2021-03-12T00:00:13.850530Z | MEDIUM | null | null | {'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31953'} | {'https://github.com/SerenityOS/serenity/commit/51b880b0383089822f513330cd64f93b54b9f21c'} | {'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0'} | {'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0'} |
OSS-Fuzz | OSV-2018-417 | UNKNOWN READ in boost::sub_match<std::__1::__wrap_iter<char const*> >::sub_match | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9539
```
Crash type: UNKNOWN READ
Crash state:
boost::sub_match<std::__1::__wrap_iter<char const*> >::sub_match
_ZNSt3__16vectorIN5boost9sub_matchINS_11__wrap_iterIPKcEEEENS_9allocatorIS7_EEE1
boost::match_results<std::__1::__wrap_iter<char const*>, std::__1::allocator<boo
```
| null | 2022-04-13T03:04:40.905295Z | 2021-01-15T00:01:14.949558Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9539', 'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'} | {'https://github.com/boostorg/boost/commit/d81afd08ff461a21836f71829fd21dabf57f80a9', 'https://github.com/boostorg/boost/commit/9f411f107c378e51c773657c196205eca093f51b'} | {'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'} | {'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'} |
OSS-Fuzz | OSV-2021-144 | Use-of-uninitialized-value in rawspeed::RawImageData::checkMemIsInitialized | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7171
```
Crash type: Use-of-uninitialized-value
Crash state:
rawspeed::RawImageData::checkMemIsInitialized
Cr2Decompressor.cpp
rawspeed::alignedMalloc
```
| null | 2022-04-13T03:04:36.476158Z | 2021-01-13T21:56:24.820945Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7171', 'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'} | {'https://github.com/darktable-org/rawspeed/commit/ad4f8565aa1ed3d2a9afb4ac56e17eeb06f70b8d'} | {'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'} | {'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'} |
OSS-Fuzz | OSV-2020-847 | Use-of-uninitialized-value in ycck_cmyk_convert | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18732
```
Crash type: Use-of-uninitialized-value
Crash state:
ycck_cmyk_convert
sep_upsample
process_data_simple_main
```
| null | 2022-04-13T03:04:31.574083Z | 2020-07-14T22:13:44.357655Z | MEDIUM | null | null | {'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18732'} | {'https://github.com/qpdf/qpdf/commit/0ae344d002755d1f218fe4fbd818a814bc3ebdbc'} | {'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95'} | {'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95'} |
OSS-Fuzz | OSV-2020-22 | Container-overflow in parquet::schema::Unflatten | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20897
```
Crash type: Container-overflow READ 4
Crash state:
parquet::schema::Unflatten
parquet::FileMetaData::FileMetaDataImpl::FileMetaDataImpl
parquet::FileMetaData::FileMetaData
```
| null | 2022-04-13T03:04:31.828829Z | 2020-06-24T01:51:10.604817Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20897', 'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} | {'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'} | {'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} | {'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'} |
OSS-Fuzz | OSV-2020-514 | UNKNOWN READ in asn1_item_print_ctx | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14546
```
Crash type: UNKNOWN READ
Crash state:
asn1_item_print_ctx
asn1_template_print_ctx
asn1_item_print_ctx
```
| null | 2022-04-13T03:04:38.813418Z | 2020-07-01T00:00:13.902833Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14546', 'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'} | {'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'} | {'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'} | {'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'} |
OSS-Fuzz | OSV-2021-847 | Heap-buffer-overflow in frame_get_vlmetalayers | OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35086
```
Crash type: Heap-buffer-overflow READ {*}
Crash state:
frame_get_vlmetalayers
frame_to_schunk
blosc2_schunk_from_buffer
```
| null | 2022-04-13T03:04:40.375178Z | 2021-06-10T00:01:13.857277Z | MEDIUM | null | null | {'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35086', 'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'} | {'https://github.com/Blosc/c-blosc2/commit/4d2510757d797781aed92193012294e7732afe9a'} | {'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'} | {'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.