ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
NuGet
GHSA-fm9p-5m9f-rq85
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0915'}
2022-03-03T05:13:09.041076Z
2021-03-29T21:00:03Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
NuGet
GHSA-h23m-w6x5-jwr4
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0923'}
2022-03-03T05:14:08.577126Z
2021-03-29T21:00:08Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'}
NuGet
GHSA-prxj-c66c-4gcf
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0924'}
2022-03-03T05:12:53.230422Z
2021-03-29T21:00:12Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
{'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f'}
NuGet
GHSA-6r92-cgxc-r5fg
Denial of service in CBOR library
### Impact Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library. Affected versions _include_ versions 4.0.0 through 4.5.0. This vulnerability was privately reported to me. ### Patches This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.) ### Workarounds Again, users should use the latest version of this library. In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if— - it begins with a byte other than 0x80 through 0xDF, or - it does not contain a byte in the range 0xa0 through 0xBF. Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
null
2022-03-03T05:12:53.419938Z
2022-01-21T23:35:35Z
HIGH
null
{'CWE-407'}
{'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1', 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95', 'https://github.com/peteroupc/CBOR'}
null
{'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'}
{'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'}
NuGet
GHSA-v89p-5hr2-4rh4
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196.
{'CVE-2019-1197'}
2022-03-03T05:12:53.493944Z
2021-03-29T20:56:15Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
{'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
NuGet
GHSA-5q7q-qqw2-hjq7
Cross-Site Scripting in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects. ### Description Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it. XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network. ### Releases Releases before version 21.12.22.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds A workaround exists that replaces one of the core JavaScript files embedded in the library. Using a XML configuration allows to replace the default JavaScript code to be replaced with the version on GitHub. ```xml <configuration> <configSections> <sectionGroup name="ajaxNet"> <section name="ajaxSettings" type="AjaxPro.AjaxSettingsSectionHandler,AjaxPro.2" requirePermission="false" restartOnExternalChanges="true"/> </sectionGroup> </configSections> <ajaxNet> <ajaxSettings> <coreScript>~/ajaxpro-core-fixed.js</coreScript> </ajaxSettings> </ajaxNet> </configuration> ``` Copy the file core.js from the main project folder to your web server root folder and rename that ajaxpro-core-fixed.js. Clients need to refresh the web page to download the changed JavaScript code. ### References Commit fixing the issue: c89e39b9679fcb8ab6644fe21cc7e652cb615e2b Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
{'CVE-2021-43853'}
2022-03-03T05:13:21.805430Z
2022-01-06T18:32:24Z
HIGH
null
{'CWE-79'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43853', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7', 'https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1', 'https://github.com/michaelschwarz/Ajax.NET-Professional'}
null
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b'}
NuGet
GHSA-8gvg-8vhf-h26g
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933.
{'CVE-2019-0937'}
2022-03-03T05:12:59.188688Z
2021-03-29T20:59:03Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
{'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
NuGet
GHSA-rx34-jff5-ph35
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0917'}
2022-03-03T05:13:15.368520Z
2021-03-29T21:00:06Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}
NuGet
GHSA-6r7c-6w96-8pvw
Remote Code Execution in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. ### Description Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc. Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products. An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed. Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands). ### Releases Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds There is no workaround available that addresses all issues except updating to latest version from GitHub. ### References Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971 Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
null
2022-03-03T05:11:30.895768Z
2021-12-07T21:21:49Z
CRITICAL
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://github.com/michaelschwarz/Ajax.NET-Professional'}
null
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
NuGet
GHSA-jvjp-vh27-r9h5
Cross-site Scripting in PiranhaCMS
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
{'CVE-2021-25977'}
2022-03-03T05:14:07.242632Z
2021-10-27T18:53:03Z
MODERATE
null
{'CWE-79'}
{'https://github.com/PiranhaCMS/piranha.core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977', 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'}
null
{'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'}
{'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'}
NuGet
GHSA-mw7r-3g6w-85qg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1131'}
2022-03-03T05:12:46.071533Z
2021-03-29T20:57:46Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
{'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
NuGet
GHSA-2rfj-2mwp-787v
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0993'}
2022-03-03T05:11:34.130533Z
2021-03-29T20:57:51Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0993', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993'}
null
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'}
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'}
NuGet
GHSA-pwpr-vp2v-99xw
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1138'}
2022-03-03T05:13:05.852214Z
2021-03-29T20:56:11Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1138', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1138'}
null
{'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046'}
NuGet
GHSA-q99r-j969-6jwr
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1237'}
2022-03-03T05:13:44.392146Z
2021-03-29T20:56:04Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045'}
null
{'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045'}
NuGet
GHSA-vw2g-5827-m9fp
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.
{'CVE-2019-1308'}
2022-03-03T05:12:56.773266Z
2021-03-29T20:55:52Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'}
null
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'}
{'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}
NuGet
GHSA-9824-rp6m-xx9w
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0989'}
2022-03-03T05:13:01.401560Z
2021-03-29T20:59:04Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989'}
null
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'}
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'}
NuGet
GHSA-9475-xg6m-j7pw
Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET
### Impact Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved. The Sustainsys.Saml2 library incorrectly treats all incoming tokens as bearer tokens, even though they have another subject confirmation method specified. This could be used by an attacker that could get access to Saml2 tokens with another subject confirmation method than bearer. The attacker could then use such a tocken to create a log in session. ### Patches Version 1.0.2 and 2.7.0 are patched. ### Workarounds Ensure that any IdentityProvider trusted by the Sustainsys.Saml2 SP only issues bearer tokens if the audience matches the Sustainsys.Saml2 SP. ### For more information If you have any questions or comments about this advisory: * Comment on #103 * Email us at security@sustainsys.com if you think that there are further security issues.
{'CVE-2020-5268'}
2022-03-03T05:12:52.477872Z
2020-04-22T20:59:37Z
MODERATE
null
{'CWE-303'}
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241', 'https://github.com/Sustainsys/Saml2/issues/712', 'https://www.nuget.org/packages/Sustainsys.Saml2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw'}
null
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
NuGet
GHSA-874w-m2v2-mj64
Double Free in Adplug
AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h.
{'CVE-2019-15151'}
2022-03-03T05:13:08.121515Z
2021-03-29T20:48:45Z
CRITICAL
null
{'CWE-415'}
{'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e', 'https://github.com/adplug/adplug/issues/91', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/'}
null
{'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'}
{'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'}
NuGet
GHSA-m22m-h4rf-pwq3
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3.
{'CVE-2021-32840'}
2022-03-03T05:13:40.088268Z
2022-02-01T16:22:50Z
HIGH
null
{'CWE-22'}
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32840', 'https://github.com/icsharpcode/SharpZipLib', 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'}
null
{'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'}
{'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'}
NuGet
GHSA-xpwp-rq3x-x6v7
Critical severity vulnerability that affects recurly-api-client
The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
{'CVE-2017-0907'}
2022-03-03T05:12:43.938941Z
2018-10-16T17:35:04Z
CRITICAL
null
{'CWE-918'}
{'https://hackerone.com/reports/288635', 'https://dev.recurly.com/page/net-updates', 'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7', 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907'}
null
{'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'}
{'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1'}
NuGet
GHSA-grvw-q343-58wh
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298.
{'CVE-2019-1300'}
2022-03-03T05:13:58.668379Z
2021-03-29T20:55:57Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'}
null
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'}
NuGet
GHSA-v5rv-hpxg-8x49
Signature validation bypass in ServiceStack
ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.
{'CVE-2020-28042'}
2022-03-03T05:13:06.294605Z
2021-01-13T19:13:11Z
MODERATE
null
{'CWE-347'}
{'https://snyk.io/vuln/SNYK-DOTNET-SERVICESTACK-1035519', 'https://www.shielder.it/blog/2020/11/re-discovering-a-jwt-authentication-bypass-in-servicestack/', 'https://forums.servicestack.net/t/servicestack-v5-9-2-released/8850', 'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28042', 'https://www.shielder.it/advisories/servicestack-jwt-signature-verification-bypass/', 'https://www.nuget.org/packages/ServiceStack/'}
null
{'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'}
{'https://github.com/ServiceStack/ServiceStack/commit/540d4060e877a03ae95343c1a8560a26768585ee'}
NuGet
GHSA-5rcr-q3rx-j7vr
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1106.
{'CVE-2019-1107'}
2022-03-03T05:13:46.158859Z
2021-03-29T20:57:35Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1107', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'}
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/214dec9461f9acb9a4b9004368d2a81e0c125652'}
NuGet
GHSA-hrmm-f4j8-8vxc
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0922'}
2022-03-03T05:14:02.985181Z
2021-03-29T21:00:11Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'}
NuGet
GHSA-6j89-jhpr-849f
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366.
{'CVE-2019-1307'}
2022-03-03T05:13:12.777814Z
2021-03-29T20:55:46Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1307', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1307'}
null
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b'}
{'https://github.com/chakra-core/ChakraCore/commit/3fe5e24694729966a157dc613f5586a6c75f1e9b', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}
NuGet
GHSA-ppxc-pmx9-qjv9
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1195'}
2022-03-03T05:12:39.713478Z
2021-03-29T20:57:59Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1195', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
{'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/c70af488e435ebd552f3da0547dee39dc8437a64', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
NuGet
GHSA-7q36-4xx7-xcxf
Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack
### Impact When this library is used to deserialize messagepack data from an untrusted source, there is a risk of a denial of service attack by either of two vectors: 1. hash collisions - leading to large CPU consumption disproportionate to the size of the data being deserialized. 1. stack overflow - leading to the deserializing process crashing. ### Patches The following steps are required to mitigate this risk. 1. Upgrade to a version of the library where a fix is available 1. Add code to your application to put MessagePack into the defensive `UntrustedData` mode. 1. Identify all MessagePack extensions that implement `IMessagePackFormatter&lt;T&gt;` implementations that do not ship with the MessagePack library to include the security mitigations. This includes those acquired from 3rd party packages and classes included directly into your project. Any AOT formatters generated with the MPC tool must be regenerated with the patched version of mpc. 1. Review your messagepack-serializable data structures for hash-based collections that use custom or unusual types for the hashed key. See below for details on handling such situations. Review the `MessagePackSecurity` class to tweak any settings as necessary to strike the right balance between performance, functionality, and security. Specialized `IEqualityComparer&lt;T&gt;` implementations provide the hash collision resistance. Each type of hashed key may require a specialized implementation of its own. The patched MessagePack library includes many such implementations for primitive types commonly used as keys in hash-based collections. If your data structures use custom types as keys in these hash-based collections, putting MessagePack in `UntrustedData` mode may lead the deserializer to throw an exception because no safe `IEqualityComparer&lt;T&gt;` is available for your custom `T` type. You can provide your own safe implementation by deriving from the `MessagePackSecurity` class and overriding the `GetHashCollisionResistantEqualityComparer&lt;T&gt;()` method to return your own custom implementation when `T` matches your type, and fallback to `return base.GetHashCollisionResistantEqualityComparer&lt;T&gt;();` for types you do not have custom implementations for. Unrelated to this advisory, but as general security guidance, you should also avoid the Typeless serializer/formatters/resolvers for untrusted data as that opens the door for the untrusted data to potentially deserialize unanticipated types that can compromise security. #### MessagePack 1.x users 1. Upgrade to any 1.9.x version. 1. When deserializing untrusted data, put MessagePack into a more secure mode with: ```cs MessagePackSecurity.Active = MessagePackSecurity.UntrustedData; ``` In MessagePack v1.x this is a static property and thus the security level is shared by the entire process or AppDomain. Use MessagePack v2.1 or later for better control over the security level for your particular use. 1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `MessagePackSecurity` class. Review any custom-written `IMessagePackFormatter&lt;T&gt;` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required. In particular, a formatter that deserializes an object (as opposed to a primitive value) should wrap the deserialization in a `using (MessagePackSecurity.DepthStep())` block. For example: ```cs public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options) { if (reader.TryReadNil()) { return default; } else { using (MessagePackSecurity.DepthStep()) // STACK OVERFLOW MITIGATION { MyObject o = new MyObject(); // deserialize members of the object here. return o; } } } ``` If your custom formatter creates hash-based collections (e.g. `Dictionary&lt;K, V&gt;` or `HashSet&lt;T&gt;`) where the hashed key comes from the messagepack data, always instantiate your collection using `MessagePackSecurity.Active.GetEqualityComparer&lt;T&gt;()` as the equality comparer: ```cs var collection = new HashSet&lt;T&gt;(MessagePackSecurity.Active.GetEqualityComparer&lt;T&gt;()); ``` This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm. Learn more about [best security practices when reading untrusted data with MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security). #### MessagePack 2.x users 1. Upgrade to any 2.1.x or later version. 1. When deserializing untrusted data, put MessagePack into a more secure mode by configuring your `MessagePackSerializerOptions.Security` property: ```cs var options = MessagePackSerializerOptions.Standard .WithSecurity(MessagePackSecurity.UntrustedData); // Pass the options explicitly for the greatest control. T object = MessagePackSerializer.Deserialize&lt;T&gt;(data, options); // Or set the security level as the default. MessagePackSerializer.DefaultOptions = options; ``` 1. Any code produced by mpc should be regenerated with the mpc tool with the matching (patched) version. Such generated code usually is written to a file called `Generated.cs`. A patched `Generated.cs` file will typically reference the `Security` member on the `MessagePackSerializerOptions` parameter. Review any custom-written `IMessagePackFormatter&lt;T&gt;` implementations in your project or that you might use from 3rd party packages to ensure they also utilize the `MessagePackSecurity` class as required. In particular, a formatter that deserializes an object (as opposed to a primitive value) should call `options.Security.DepthStep(ref reader);` before deserializing the object&#39;s members, and be sure to revert the depth step with `reader.Depth--;` before exiting the method. For example: ```cs public MyObject Deserialize(ref MessagePackReader reader, MessagePackSerializerOptions options) { if (reader.TryReadNil()) { return default; } else { options.Security.DepthStep(ref reader); // STACK OVERFLOW MITIGATION, line 1 try { MyObject o = new MyObject(); // deserialize members of the object here. return o; } finally { reader.Depth--; // STACK OVERFLOW MITIGATION, line 2 } } } ``` If your custom formatter creates hash-based collections (e.g. `Dictionary&lt;K, V&gt;` or `HashSet&lt;T&gt;`) where the hashed key comes from the messagepack data, always instantiate your collection using `options.Security.GetEqualityComparer&lt;TKey&gt;()` as the equality comparer: ```cs var collection = new HashSet&lt;T&gt;(options.Security.GetEqualityComparer&lt;T&gt;()); ``` This ensures that when reading untrusted data, you will be using a collision-resistent hash algorithm. Learn more about [best security practices when reading untrusted data with MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security). ### Workarounds The security vulnerabilities are in the formatters. Avoiding the built-in formatters entirely in favor of reading messagepack primitive data directly or relying on carefully written custom formatters can provide a workaround. MessagePack v1.x users may utilize the `MessagePackBinary` static class directly to read the data they expect. MessagePack v2.x users may utilize the `MessagePackReader` struct directly to read the data they expect. ### References Learn more about best security practices when reading untrusted data with [MessagePack 1.x](https://github.com/neuecc/MessagePack-CSharp/tree/v1.x#security) or [MessagePack 2.x](https://github.com/neuecc/MessagePack-CSharp#security). ### For more information If you have any questions or comments about this advisory: * Open an issue in [MessagePack-CSharp](https://github.com/neuecc/MessagePack-CSharp/issues/new/choose) * [Email us](mailto:andrewarnott@gmail.com)
{'CVE-2020-5234'}
2022-03-03T05:13:22.194363Z
2020-01-31T17:59:20Z
MODERATE
null
{'CWE-121'}
{'https://github.com/neuecc/MessagePack-CSharp/security/advisories/GHSA-7q36-4xx7-xcxf', 'https://github.com/aspnet/Announcements/issues/405', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02', 'https://github.com/neuecc/MessagePack-CSharp/issues/810', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5234'}
null
{'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007', 'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02'}
{'https://github.com/neuecc/MessagePack-CSharp/commit/56fa86219d01d0a183babbbbcb34abbdea588a02', 'https://github.com/neuecc/MessagePack-CSharp/commit/f88684078698386df02204f13faeff098a61f007'}
NuGet
GHSA-7423-5qfm-g648
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0916'}
2022-03-03T05:13:45.933184Z
2021-03-29T21:00:09Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
NuGet
GHSA-2x7h-96h5-rq84
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability.
{'CVE-2021-32841'}
2022-03-03T05:13:28.356898Z
2022-02-01T16:22:57Z
MODERATE
null
{'CWE-22'}
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/icsharpcode/SharpZipLib', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841', 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}
null
{'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}
{'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}
NuGet
GHSA-g8j6-m4p7-5rfq
High severity vulnerability that affects DotNetNuke.Core
DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources.
{'CVE-2017-0929'}
2022-03-03T05:13:02.306663Z
2018-10-16T17:18:12Z
HIGH
null
{'CWE-918'}
{'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3', 'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq', 'https://github.com/dnnsoftware/Dnn.Platform', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0929'}
null
{'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'}
{'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'}
NuGet
GHSA-rh4p-g7x6-8pqg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1062'}
2022-03-03T05:13:18.764715Z
2021-03-29T20:59:09Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1062', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062'}
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'}
NuGet
GHSA-9qw8-ccq9-ffj9
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1139'}
2022-03-03T05:14:02.943957Z
2021-03-29T20:57:53Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139'}
null
{'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
NuGet
GHSA-w89r-qch4-8jv5
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0912'}
2022-03-03T05:13:37.247605Z
2021-03-29T20:59:59Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'}
NuGet
GHSA-2x75-mf24-588m
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1092'}
2022-03-03T05:14:00.642186Z
2021-03-29T20:59:11Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1092', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'}
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06'}
NuGet
GHSA-2452-3rwv-x89c
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300.
{'CVE-2019-1298'}
2022-03-03T05:13:43.259043Z
2021-03-29T20:56:01Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298'}
null
{'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782'}
NuGet
GHSA-hfvc-g252-rp4g
Denial of Service in i18n
This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.
{'CVE-2020-7791'}
2022-03-03T05:14:11.849809Z
2020-12-14T19:50:22Z
MODERATE
null
{'CWE-400', 'CWE-20'}
{'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E'}
null
{'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'}
{'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'}
NuGet
GHSA-6w5m-jgc5-8cgc
orchardcore is vulnerable to Cross-site Scripting
orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0159'}
2022-03-03T05:14:13.613996Z
2022-01-21T23:57:49Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://github.com/orchardcms/orchardcore'}
null
{'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}
{'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}
NuGet
GHSA-2wwc-w2gw-4329
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.
{'CVE-2019-1366'}
2022-03-03T05:13:27.978381Z
2021-03-29T20:55:36Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'}
null
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf'}
{'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}
NuGet
GHSA-rqrc-8q8f-cp9c
Infinite loop in .Net Bond
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads.
{'CVE-2020-1469'}
2022-04-08T18:34:02.348210Z
2022-04-08T18:11:51Z
HIGH
null
{'CWE-434', 'CWE-835'}
{'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469', 'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469'}
null
{'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}
{'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}
NuGet
GHSA-7378-6268-4278
High severity vulnerability that affects DotNetZip
DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
{'CVE-2018-1002205'}
2022-03-03T05:13:57.586333Z
2018-10-16T17:16:40Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/pull/121'}
null
{'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'}
{'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'}
NuGet
GHSA-pjxv-w3qj-j8m3
Directory Traversal in elFinder.AspNet
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23415'}
2022-03-03T05:13:27.755638Z
2021-08-09T20:42:13Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23415', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERASPNET-1315153', 'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720', 'https://github.com/mguinness/elFinder.AspNet'}
null
{'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'}
{'https://github.com/mguinness/elFinder.AspNet/commit/675049b39284a9e84f0915c71d688da8ebc7d720'}
NuGet
GHSA-mjww-934m-h4jw
Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates.
{'CVE-2020-29457'}
2022-03-03T05:13:00.413150Z
2021-11-19T20:19:53Z
MODERATE
null
{'CWE-295'}
{'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25', 'https://github.com/OPCFoundation/UA-.NETStandard/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29457', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/'}
null
{'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'}
{'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'}
NuGet
GHSA-53r4-h27g-rg3x
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0992'}
2022-03-03T05:12:36.945087Z
2021-03-29T20:59:07Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0992'}
null
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'}
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'}
NuGet
GHSA-fxh6-w476-hgr4
Directory Traversal in SharpCompress
SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction.
{'CVE-2018-1002206'}
2022-03-03T05:13:37.184703Z
2019-09-11T22:59:57Z
MODERATE
null
{'CWE-22'}
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}
null
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}
{'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}
NuGet
GHSA-mvvp-gwgc-5hrp
Path Traversal in elFinder.Net.Core
This affects the package elFinder.Net.Core from 0 and before 1.2.4. The user-controlled file name is not properly sanitized before it is used to create a file system path.
{'CVE-2021-23407'}
2022-03-03T05:13:33.232451Z
2021-08-02T17:30:27Z
HIGH
null
{'CWE-22'}
{'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73', 'https://github.com/trannamtrung1st/elFinder.Net.Core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23407', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1315152', 'https://github.com/trannamtrung1st/elFinder.Net.Core/releases/tag/all-1.2.4'}
null
{'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'}
{'https://github.com/trannamtrung1st/elFinder.Net.Core/commit/5498c8a86b76ef089cfbd7ef8be014b61fa11c73'}
OSS-Fuzz
OSV-2021-1168
Heap-buffer-overflow in exif_get_slong
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: exif_get_slong exif_get_long exif_get_rational ```
null
2022-04-13T03:04:40.883862Z
2021-08-25T00:01:25.325827Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37570', 'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'}
{'https://github.com/libexif/libexif/commit/ce946b93dfd34b2187d9f9fb01603943fbb32137'}
{'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'}
{'https://github.com/libexif/libexif/commit/a4647a5463102c4b0c5a02461edd4cc085dfc1b6'}
OSS-Fuzz
OSV-2021-386
Stack-buffer-overflow in ot::Coap::Message::AppendUintOption
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831 ``` Crash type: Stack-buffer-overflow READ 1 Crash state: ot::Coap::Message::AppendUintOption ot::Coap::Message::AppendBlockOption otCoapMessageAppendBlock2Option ```
null
2022-04-13T03:04:38.946438Z
2021-02-13T00:00:59.547439Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30831', 'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'}
{'https://github.com/openthread/openthread/commit/2cd36266abaaf8b79ebb0441e6ed2ec3847cf3ca'}
{'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'}
{'https://github.com/openthread/openthread/commit/159efe77c07abbd38f3afc754d6a644f1a14d64e'}
OSS-Fuzz
OSV-2020-386
Heap-buffer-overflow in OPENSSL_strlcpy
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107 ``` Crash type: Heap-buffer-overflow WRITE 1 Crash state: OPENSSL_strlcpy OPENSSL_strlcat ERR_add_error_vdata ```
null
2022-04-13T03:04:38.742191Z
2020-07-01T00:00:06.528477Z
HIGH
null
null
{'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16107'}
{'https://github.com/openssl/openssl/commit/10f8b36874fca928c3f41834babac8ee94dd3f09'}
{'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'}
{'https://github.com/openssl/openssl/commit/036913b1076da41f257c640a5e6230476c647eff'}
OSS-Fuzz
OSV-2017-39
Use-of-uninitialized-value in IsRelativeSymlinkSafe
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308 ``` Crash type: Use-of-uninitialized-value Crash state: IsRelativeSymlinkSafe ExtractUnixLink30 ExtractSymlink ```
null
2022-04-13T03:04:35.323958Z
2021-01-13T21:56:03.501889Z
MEDIUM
null
null
{'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4308'}
{'https://github.com/aawc/unrar/commit/d2e5341ebf6f34c9bd5939c3ac812cb2cd983081'}
{'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987'}
{'https://github.com/aawc/unrar/commit/637fc8446edb8444c7a66918f109f2fa552ff987'}
OSS-Fuzz
OSV-2020-2076
Use-of-uninitialized-value in UpdateDecStatNoFreezingInfo
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346 ``` Crash type: Use-of-uninitialized-value Crash state: UpdateDecStatNoFreezingInfo UpdateDecStat WelsDec::DecodeFrameConstruction ```
null
2022-04-13T03:04:37.372384Z
2020-10-16T00:00:42.366443Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26346', 'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'}
{'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'}
{'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'}
{'https://github.com/cisco/openh264/commit/b52786888ddce9d6bc06b7825ba9bffc65924e0c'}
OSS-Fuzz
OSV-2020-369
UNKNOWN READ in ot::TimerScheduler::Remove
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383 ``` Crash type: UNKNOWN READ Crash state: ot::TimerScheduler::Remove ot::Mle::Mle::Stop otThreadSetEnabled ```
null
2022-04-13T03:04:38.951596Z
2020-07-01T00:00:05.571696Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13383', 'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'}
{'https://github.com/openthread/openthread/commit/3eb5a106ffa6678e23c6bc244e843e264cae9b31'}
{'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'}
{'https://github.com/openthread/openthread/commit/a3548df579617e737b075be4a88591e68195e115'}
OSS-Fuzz
OSV-2020-693
Heap-buffer-overflow in parse_sec_attr_44
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: parse_sec_attr_44 setcos_select_file sc_select_file ```
null
2022-04-13T03:04:41.597761Z
2020-07-01T00:00:25.178023Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18798', 'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'}
{'https://github.com/OpenSC/OpenSC/commit/7a1e42e1352201127d1a97b6cb5f41e48cace0f5'}
{'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'}
{'https://github.com/OpenSC/OpenSC/commit/e50bc29bd9519c9f4c43e9f3cf34b5b8a9aa38da'}
OSS-Fuzz
OSV-2020-2099
Heap-buffer-overflow in decode_chars
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674 ``` Crash type: Heap-buffer-overflow WRITE 1 Crash state: decode_chars decode_font process_text ```
null
2022-04-13T03:04:30.610125Z
2020-10-28T00:00:05.887987Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674', 'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'}
{'https://github.com/libass/libass/commit/910211f1c0078e37546f73e95306724358b89be2'}
{'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'}
{'https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632'}
OSS-Fuzz
OSV-2020-2133
Heap-buffer-overflow in tdefl_compress_lz_codes
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263 ``` Crash type: Heap-buffer-overflow WRITE 8 Crash state: tdefl_compress_lz_codes tdefl_compress_block tdefl_flush_block ```
null
2022-04-13T03:29:21.391124Z
2020-11-08T00:00:05.283717Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27263', 'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'}
{'https://github.com/fluent/fluent-bit//commit/03ff96d82f5f51a8bea6981fc9d7e8c3429c50b1', 'https://github.com/fluent/fluent-bit//commit/7a588237fdb744e5825fb119753dcad2e8878866'}
{'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'}
{'https://github.com/fluent/fluent-bit//commit/df2af999105cd6c94ec8b533bcca498664b1aa16'}
OSS-Fuzz
OSV-2020-739
UNKNOWN READ in str_decref
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756 ``` Crash type: UNKNOWN READ Crash state: str_decref obj_free mrb_gc_destroy ```
null
2022-04-13T03:04:39.688080Z
2020-07-01T00:00:27.971876Z
MEDIUM
null
null
{'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18756'}
{'https://github.com/mruby/mruby/commit/caba5fef274ab7df91b7247182ecbf2483b853b8'}
{'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2'}
{'https://github.com/mruby/mruby/commit/45aa5081e418423b47a32a06e0515406f63b64d2'}
OSS-Fuzz
OSV-2021-369
Segv on unknown address in blosc_read_header
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761 ``` Crash type: Segv on unknown address Crash state: blosc_read_header blosc2_getitem_ctx blosc_getitem ```
null
2022-04-13T03:04:40.205415Z
2021-02-11T00:01:00.831869Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30761', 'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'}
{'https://github.com/Blosc/c-blosc2/commit/57fca38a4f51687d71e451ae29df6b353764fb72'}
{'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'}
{'https://github.com/Blosc/c-blosc2/commit/5a222cc79dc67ce01477da3a3ee10edf1076c655'}
OSS-Fuzz
OSV-2021-739
Stack-buffer-overflow in flb_sds_cat
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025 ``` Crash type: Stack-buffer-overflow READ {*} Crash state: flb_sds_cat flb_ra_translate record_ac_fuzzer.c ```
null
2022-04-13T03:04:38.249988Z
2021-05-08T00:01:15.452663Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34025', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57', 'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c'}
{'https://github.com/fluent/fluent-bit//commit/68746b76af8b143daf477033a6799902be2f3cad'}
{'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57'}
{'https://github.com/fluent/fluent-bit//commit/95a4dda519446aecde55cb58989882718301bc7c', 'https://github.com/fluent/fluent-bit//commit/0ec1a7b309ec29904d9f855c495dcd550da74d57'}
OSS-Fuzz
OSV-2020-410
Global-buffer-overflow in lex_multiline_string
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455 Crash type: Global-buffer-overflow READ 1 Crash state: lex_multiline_string lex_next parse_config
null
2021-03-09T04:49:05.872972Z
2020-07-01T00:00:07.995615Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18455', 'git://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'}
{'git://github.com/lpereira/lwan/commit/c9ac13203b6685d3bf89ab6d257b37dd6b0d5833'}
{'https://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'}
{'https://github.com/lpereira/lwan/commit/ab882fe013ec880425bd918e0bcbf9e798361585'}
OSS-Fuzz
OSV-2020-1965
UNKNOWN READ in asn1_item_print_ctx
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920 ``` Crash type: UNKNOWN READ Crash state: asn1_item_print_ctx asn1_template_print_ctx asn1_item_print_ctx ```
null
2022-04-13T03:04:38.790305Z
2020-10-03T00:00:22.855250Z
MEDIUM
null
null
{'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=13920'}
{'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'}
{'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'}
{'https://github.com/libressl-portable/portable/commit/17c88164016df821df2dff4b2b1291291ec4f28a'}
OSS-Fuzz
OSV-2020-943
Heap-buffer-overflow in pcpp::HeaderField::HeaderField
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: pcpp::HeaderField::HeaderField pcpp::TextBasedProtocolMessage::parseFields pcpp::SipResponseLayer::SipResponseLayer ```
null
2022-04-13T03:04:38.590838Z
2020-07-22T00:00:21.373584Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22528', 'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'}
{'https://github.com/seladb/PcapPlusPlus/commit/4366d2f86bf105025765a0ce3db6e647ba0f3508'}
{'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'}
{'https://github.com/seladb/PcapPlusPlus/commit/3e0078c2bac7b530a93484fe081a4f5aeb1e191d'}
OSS-Fuzz
OSV-2020-1066
Heap-buffer-overflow in dav1dFeedData
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: dav1dFeedData dav1dCodecGetNextImage avifDecoderNextImage ```
null
2022-04-13T03:34:31.037013Z
2020-07-22T21:49:44.588962Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21947', 'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1'}
{'https://github.com/AOMediaCodec/libavif/commit/4be7ce1dd3f0a45cd2555c94bd76a8f40baabcc4'}
{'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1', 'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be'}
{'https://github.com/AOMediaCodec/libavif/commit/34c0d3147f3d30e1218bceda410c978481a5e1be', 'https://github.com/AOMediaCodec/libavif/commit/f0a91c6e28fb3e230fef99e42ba440b7d57711c1'}
OSS-Fuzz
OSV-2018-143
Global-buffer-overflow in CFF::BlendArg::set_blends
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714 ``` Crash type: Global-buffer-overflow READ 8 Crash state: CFF::BlendArg::set_blends CFF::CFF2CSOpSet<CFF2CSOpSet_SubrSubset, CFF::SubrSubsetParam, CFF::PathProcsNul CFF2CSOpSet_SubrSubset::process_op ```
null
2022-04-13T03:35:31.377146Z
2021-01-13T00:01:01.540340Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11714', 'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'}
{'https://github.com/harfbuzz/harfbuzz/commit/0996c0ff6279f377e2b14f08663df2ce82de2b14'}
{'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'}
{'https://github.com/harfbuzz/harfbuzz/commit/14d29a10437205566c4bd7bcfa2282d34d9f4f2f'}
OSS-Fuzz
OSV-2021-555
Uncaught exception in java.base/java.util.concurrent.ConcurrentHashMap.putVal
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395 ``` Crash type: Uncaught exception Crash state: java.base/java.util.concurrent.ConcurrentHashMap.putVal java.base/java.util.concurrent.ConcurrentHashMap.put com.fasterxml.jackson.core.util.InternCache.intern ```
null
2022-04-13T03:04:31.802020Z
2021-03-25T00:00:09.158172Z
LOW
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32395', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501', 'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd'}
{'https://github.com/FasterXML/jackson-core/commit/2bd85ebcdd94233d9e59a0833f29e06ce4281f3b'}
{'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501'}
{'https://github.com/FasterXML/jackson-core/commit/0fbb52961c5092d7d1f8e8f620b719f9eff48fcd', 'https://github.com/FasterXML/jackson-core/commit/0deae137735e1c81159e83bd1b4613e6d6b36501'}
OSS-Fuzz
OSV-2020-1573
Use-of-uninitialized-value in void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633 ``` Crash type: Use-of-uninitialized-value Crash state: void ArduinoJsonNUMBER_71::Utf8::encodeCodepoint<ArduinoJsonNUMBER_71::StringCop ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig ArduinoJsonNUMBER_71::JsonDeserializer<ArduinoJsonNUMBER_71::BoundedReader<unsig ```
null
2022-04-13T03:04:39.357700Z
2020-08-04T00:00:11.334079Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24633', 'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'}
{'https://github.com/bblanchon/ArduinoJson/commit/298864bafe080e6a0a42185445b278be92820110'}
{'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'}
{'https://github.com/bblanchon/ArduinoJson/commit/96b65713528476eed35dbab690be837967cedb93'}
OSS-Fuzz
OSV-2020-806
Segv on unknown address in process_ndpi_collected_info
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122 ``` Crash type: Segv on unknown address Crash state: process_ndpi_collected_info packet_processing ndpi_workflow_process_packet ```
null
2022-04-13T03:04:35.988021Z
2020-07-14T05:37:42.995133Z
null
null
null
{'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22122'}
{'https://github.com/ntop/nDPI/commit/4a09b4efa053a26e187119a540da4b41dd8a24d8'}
{'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'}
{'https://github.com/ntop/nDPI/commit/d90b333363b157d8eab9205430c83dab986ff965'}
OSS-Fuzz
OSV-2020-1123
Index-out-of-bounds in store_reg_arm
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026 ``` Crash type: Index-out-of-bounds Crash state: store_reg_arm gen_load_exclusive_arm disas_arm_insn_arm ```
null
2022-04-13T03:04:39.220642Z
2020-07-22T21:49:48.909471Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20026', 'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'}
{'https://github.com/unicorn-engine/unicorn/commit/46999575fb9e82ccd925e835d0d7db47200e010d'}
{'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'}
{'https://github.com/unicorn-engine/unicorn/commit/ec2e4544819b2ef0ecd297ba331d4f2172b77245'}
OSS-Fuzz
OSV-2020-63
UNKNOWN READ in arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20697 ``` Crash type: UNKNOWN READ Crash state: arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend parquet::PlainByteArrayDecoder::DecodeArrowDense parquet::PlainByteArrayDecoder::DecodeArrow ```
null
2022-04-13T03:04:31.882807Z
2020-06-24T01:51:12.364400Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20697', 'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'}
{'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'}
{'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'}
{'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'}
OSS-Fuzz
OSV-2020-555
Heap-use-after-free in WelsDec::CWelsDecoder::SetOption
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18747 ``` Crash type: Heap-use-after-free WRITE 1 Crash state: WelsDec::CWelsDecoder::SetOption decoder_fuzzer.cpp WelsCommon::WelsFree ```
null
2022-04-13T03:04:37.579466Z
2020-07-01T00:00:16.726929Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18747', 'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'}
{'https://github.com/cisco/openh264/commit/2091de60c6a235a3236475d2208139f6a8862f48'}
{'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'}
{'https://github.com/cisco/openh264/commit/e3b90efed243779b5c4961c2f9d6f1cedfeb1f46'}
OSS-Fuzz
OSV-2020-105
Segv on unknown address in cbor_typeof
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21387 ``` Crash type: Segv on unknown address Crash state: cbor_typeof _cbor_nested_describe _cbor_nested_describe ```
null
2022-04-13T03:04:41.481665Z
2020-06-24T01:51:14.307336Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21387', 'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'}
{'https://github.com/PJK/libcbor/commit/6e6050e9ca2a898de1c6b0f3babadb745b5047da'}
{'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'}
{'https://github.com/PJK/libcbor/commit/3bfb7acb29d9812ffe8085af77c7fac72f76d33a'}
OSS-Fuzz
OSV-2020-1820
Stack-buffer-overflow in hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25815 ``` Crash type: Stack-buffer-overflow READ 2 Crash state: hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha hermes::regex::Parser<hermes::regex::Regex<hermes::regex::UTF16RegexTraits>, cha ```
null
2022-04-13T03:04:31.093016Z
2020-09-21T00:00:18.040780Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=25815', 'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'}
{'https://github.com/facebook/hermes/commit/58f7c31e9da3ac8cdf894307080929fa93648870'}
{'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'}
{'https://github.com/facebook/hermes/commit/c593863a881796f8bf4f4faea1fa179edf5d532f'}
OSS-Fuzz
OSV-2020-781
Heap-buffer-overflow in __libcpp_memchr
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23328 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: __libcpp_memchr memchr pcpp::HeaderField::HeaderField ```
null
2022-04-13T03:04:38.663249Z
2020-07-14T05:37:32.830824Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23328', 'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'}
{'https://github.com/seladb/PcapPlusPlus/commit/aeaa2e1cd094ff2083517bf4c987dc3a1380ec71'}
{'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'}
{'https://github.com/seladb/PcapPlusPlus/commit/a8d169ceec0a1f72157ac76474519112aadbcd63'}
OSS-Fuzz
OSV-2021-1353
Heap-buffer-overflow in MqttClient_DecodePacket
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39056 ``` Crash type: Heap-buffer-overflow WRITE 1 Crash state: MqttClient_DecodePacket MqttClient_WaitType MqttClient_Unsubscribe ```
null
2022-04-13T03:04:34.005024Z
2021-09-22T00:01:32.692141Z
HIGH
null
null
{'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39056'}
{'https://github.com/wolfSSL/wolfMQTT/commit/237f693c5731dcbd6adc9de69d9f575421c4414e'}
{'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2'}
{'https://github.com/wolfSSL/wolfMQTT/commit/84d4b53122e0fa0280c7872350b89d5777dabbb2'}
OSS-Fuzz
OSV-2018-114
Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10933 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: BEInt<unsigned int, 4>::operator unsigned int OT::OffsetTo<OT::UnsizedArrayOf<OT::IntType<short, 2u> >, OT::IntType<unsigned i AAT::KerxSubTableFormat2::get_kerning ```
null
2022-04-13T03:04:33.142061Z
2021-01-13T00:00:52.786317Z
MEDIUM
null
null
{'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=10933'}
{'https://github.com/harfbuzz/harfbuzz/commit/c9165f5450b99e6d93e2a168b198384a221eef58'}
{'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42'}
{'https://github.com/harfbuzz/harfbuzz/commit/de6e414c565de5f27b9da8c7b8b11f88659a4c42'}
OSS-Fuzz
OSV-2021-447
Heap-buffer-overflow in luaG_runerror
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31331 ``` Crash type: Heap-buffer-overflow READ 8 Crash state: luaG_runerror luaD_pretailcall luaV_execute ```
null
2022-04-13T03:36:53.712818Z
2021-02-25T00:02:41.560298Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31331', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979', 'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6'}
{'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6'}
{'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979'}
{'https://github.com/lua/lua/commit/5d8ce05b3f6fad79e37ed21c1076e47a322472c6', 'https://github.com/lua/lua/commit/c03c527fd207b4ad8f5a8e0f4f2c176bd227c979'}
OSS-Fuzz
OSV-2021-914
UNKNOWN READ in mrb_vm_ci_env
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35718 ``` Crash type: UNKNOWN READ Crash state: mrb_vm_ci_env cipop mrb_vm_exec ```
null
2022-04-13T03:04:39.759907Z
2021-07-03T00:01:26.278614Z
MEDIUM
null
null
{'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35718'}
{'https://github.com/mruby/mruby/commit/99dbcec89c892bc90f36fbf38e46a9ec971e3a77'}
{'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4'}
{'https://github.com/mruby/mruby/commit/a624da6fdb160b9a70a96c1ffe9dec017d7f5cb4'}
OSS-Fuzz
OSV-2020-1898
Heap-buffer-overflow in WelsDec::UpdateP16x16RefIdx
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26078 ``` Crash type: Heap-buffer-overflow WRITE 2 Crash state: WelsDec::UpdateP16x16RefIdx WelsDec::PredBDirectTemporal WelsDec::ParseInterBInfo ```
null
2022-04-13T03:04:37.589868Z
2020-10-02T00:00:14.116993Z
HIGH
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26078', 'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'}
{'https://github.com/cisco/openh264/commit/66ef706acd55b0b8daec32ca299d2586a1f473c9'}
{'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'}
{'https://github.com/cisco/openh264/commit/f1bb6d3acb057785b4d89e8228e23cc4fc9caa12'}
OSS-Fuzz
OSV-2020-447
UNKNOWN READ in yyparse
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17968 ``` Crash type: UNKNOWN READ Crash state: yyparse mrb_parser_parse mrb_parse_nstring ```
null
2022-04-13T03:04:39.703625Z
2020-07-01T00:00:10.057682Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=17968', 'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'}
{'https://github.com/mruby/mruby/commit/ec6c8b2a3c5c499d8832ef82a2ad941cbac4a80a'}
{'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'}
{'https://github.com/mruby/mruby/commit/264239f78fb9ec8047cf04b82f547fc41d65ab28'}
OSS-Fuzz
OSV-2020-502
Heap-use-after-free in WelsDec::SetUnRef
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18644 ``` Crash type: Heap-use-after-free WRITE 1 Crash state: WelsDec::SetUnRef WelsDec::WelsResetRefPic WelsFreeDynamicMemory ```
null
2022-04-13T03:04:37.542309Z
2020-07-01T00:00:13.377454Z
HIGH
null
null
{'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18644'}
{'https://github.com/cisco/openh264/commit/c185ac351eff0ae277bfe14a3b2ad52e9ed8ab81'}
{'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec'}
{'https://github.com/cisco/openh264/commit/2c13955d0649b2afc575bc5416dcedeffc8c01ec'}
OSS-Fuzz
OSV-2020-34
UNKNOWN READ in parquet::LevelDecoder::SetData
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20666 ``` Crash type: UNKNOWN READ Crash state: parquet::LevelDecoder::SetData parquet::ColumnReaderImplBase<parquet::PhysicalType< parquet::ColumnReaderImplBase<parquet::PhysicalType< ```
null
2022-04-13T03:04:32.024330Z
2020-06-24T01:51:11.146400Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20666', 'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'}
{'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'}
{'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'}
{'https://github.com/apache/arrow/commit/d2ab289294f5eaa175e6bc4ab5fb74b5ea013f6e'}
OSS-Fuzz
OSV-2021-152
Stack-buffer-overflow in ot::NetworkData::ServerTlv::GetServer16
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5878 ``` Crash type: Stack-buffer-overflow READ 2 Crash state: ot::NetworkData::ServerTlv::GetServer16 ot::NetworkData::Leader::RlocLookup ot::NetworkData::Leader::RegisterNetworkData ```
null
2022-04-13T03:04:38.987900Z
2021-01-13T21:56:33.613485Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5878', 'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'}
{'https://github.com/openthread/openthread/commit/9190aa21c4b3983c05aad6be8fd5d62942b8cbd8'}
{'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'}
{'https://github.com/openthread/openthread/commit/9ec07205cc17c2de80b06a8b1e181abde4fdbb1e'}
OSS-Fuzz
OSV-2021-1216
Global-buffer-overflow in fr_is_base16_nstd
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38283 ``` Crash type: Global-buffer-overflow READ 1 Crash state: fr_is_base16_nstd fr_base16_decode_nstd fr_value_box_from_str ```
null
2022-04-13T03:04:40.152583Z
2021-09-10T00:00:35.488094Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38283', 'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'}
{'https://github.com/FreeRADIUS/freeradius-server/commit/6c6878ce4cdc5ac58e5115553656e05c9695544e'}
{'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'}
{'https://github.com/FreeRADIUS/freeradius-server/commit/3b49098069f85d9d725a7657dcd09df1ee38f25e'}
OSS-Fuzz
OSV-2021-1646
Heap-buffer-overflow in uncompress_b44_impl
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41625 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: uncompress_b44_impl default_decompress_chunk exr_decoding_run ```
null
2022-04-13T03:21:51.316157Z
2021-12-04T00:01:33.435462Z
MEDIUM
null
null
{'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41625', 'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06'}
{'https://github.com/AcademySoftwareFoundation/openexr/commit/40eb606dc5e8b04b7634f8a4a15f44b4e2044191', 'https://github.com/AcademySoftwareFoundation/openexr/commit/57b05e055c7065ac5873f64e42350449be1eccb8'}
{'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95', 'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06'}
{'https://github.com/AcademySoftwareFoundation/openexr/commit/e598a72aa0166bfab8947eb691ba473a54bfed06', 'https://github.com/AcademySoftwareFoundation/openexr/commit/236c4b2782d787d56ddc586ed4a313c1d31acd95'}
OSS-Fuzz
OSV-2022-321
Stack-use-after-scope in std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<g
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46468 ``` Crash type: Stack-use-after-scope WRITE 1 Crash state: std::__1::__function::__func<bool grk::WaveletReverse::decompress_partial_tile<g tf::Executor::_invoke tf::Executor::_consume_task ```
null
2022-04-13T03:04:39.574474Z
2022-04-09T00:00:21.286205Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46468', 'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'}
{'https://github.com/GrokImageCompression/grok/commit/a27b85d5d31dc6da58aa8af859e63448a6384150'}
{'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'}
{'https://github.com/GrokImageCompression/grok/commit/12ef5ef65d81862f0dcad9fafdbabb3c93a72934'}
OSS-Fuzz
OSV-2021-1083
Heap-buffer-overflow in flb_hash_get_by_id
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36718 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: flb_hash_get_by_id utils_fuzzer.c ```
null
2022-04-13T03:38:50.195219Z
2021-08-01T00:00:59.162586Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36718', 'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'}
{'https://github.com/fluent/fluent-bit//commit/10ceb5b2ab6635a000f3eceaa267e1e34496de6b'}
{'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'}
{'https://github.com/fluent/fluent-bit//commit/05144b2d99a4d88db561d0329e4bd97453d466e1'}
OSS-Fuzz
OSV-2020-797
Use-of-uninitialized-value in MipsAsmParser::isPicAndNotNxxAbi
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22778 ``` Crash type: Use-of-uninitialized-value Crash state: MipsAsmParser::isPicAndNotNxxAbi MipsAsmParser::processInstruction MipsAsmParser::MatchAndEmitInstruction ```
null
2022-04-13T03:04:37.905755Z
2020-07-14T05:37:37.559643Z
MEDIUM
null
null
{'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22778'}
{'https://github.com/keystone-engine/keystone/commit/d49b6fa4013efb919d434bfd439311d6cb67a0f7'}
{'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871'}
{'https://github.com/keystone-engine/keystone/commit/e1547852d9accb9460573eb156fc81645b8e1871'}
OSS-Fuzz
OSV-2017-78
Negative-size-param in UA_SecureChannel_processChunk
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3609 ``` Crash type: Negative-size-param Crash state: UA_SecureChannel_processChunk processCompleteChunk UA_Connection_processChunks ```
null
2022-04-13T03:04:41.415024Z
2021-01-13T21:57:35.111717Z
null
null
null
{'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3609'}
{'https://github.com/open62541/open62541/commit/84d46ddefe21c7eb5f678a5046fa200ac1b4e617'}
{'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b'}
{'https://github.com/open62541/open62541/commit/3e9fdcb66c5a1adf0e1cdc9485b4e6efe8103e1b'}
OSS-Fuzz
OSV-2020-328
UNKNOWN READ in dotnet_parse_tilde_2
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16448 ``` Crash type: UNKNOWN READ Crash state: dotnet_parse_tilde_2 dotnet_parse_tilde dotnet_parse_com ```
null
2022-04-13T03:25:20.410918Z
2020-07-01T00:00:03.116576Z
MEDIUM
null
null
{'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc', 'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16448'}
{'https://github.com/VirusTotal/yara/commit/aa182b4f928e54189fe51606d4dc419e7b27022f'}
{'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc'}
{'https://github.com/VirusTotal/yara/commit/1e403e9259a1abedf108ab86f711ba52c907226d', 'https://github.com/VirusTotal/yara/commit/595c612780d5d469f5ab5d592f30b649bcf3f1cc'}
OSS-Fuzz
OSV-2017-97
Use-after-poison in rawspeed::unroll_loop_t<void rawspeed::LJpegDecompressor::decodeN<4>
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4451 ``` Crash type: Use-after-poison WRITE 2 Crash state: rawspeed::unroll_loop_t<void rawspeed::LJpegDecompressor::decodeN<4> void rawspeed::LJpegDecompressor::decodeN<4> rawspeed::AbstractLJpegDecompressor::decode ```
null
2022-04-13T03:04:36.488088Z
2021-01-13T21:57:40.779998Z
HIGH
null
null
{'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4451'}
{'https://github.com/darktable-org/rawspeed/commit/45e6fd6c608326ae7df6419c62cc8db6a2f15281'}
{'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09'}
{'https://github.com/darktable-org/rawspeed/commit/580add2219c696e425087bc61b952f4ccb295f09'}
OSS-Fuzz
OSV-2022-264
Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessRow
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=45822 ``` Crash type: Heap-buffer-overflow READ 4 Crash state: jxl::N_AVX2::BlendingStage::ProcessRow jxl::LowMemoryRenderPipeline::RenderRect jxl::LowMemoryRenderPipeline::ProcessBuffers ```
null
2022-04-13T03:04:38.130266Z
2022-03-21T00:00:16.278407Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=45822', 'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'}
{'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'}
{'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'}
{'https://github.com/libvips/libvips/commit/eaf34b8f13d22b35acf2e07775c12ae5ccd615fd'}
OSS-Fuzz
OSV-2021-282
Heap-buffer-overflow in LibRaw_buffer_datastream::read
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30324 ``` Crash type: Heap-buffer-overflow WRITE {*} Crash state: LibRaw_buffer_datastream::read LibRaw::uncompressed_fp_dng_load_raw LibRaw::unpack ```
null
2022-04-13T03:04:39.979494Z
2021-02-06T00:00:24.519678Z
HIGH
null
null
{'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30324'}
{'https://github.com/libraw/libraw/commit/4c954948ba2de262b9cb23a1843fb8651aa3dcc1'}
{'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e'}
{'https://github.com/libraw/libraw/commit/363e91ea656f4ce46584b4b0af6285030f236b7e'}
OSS-Fuzz
OSV-2021-778
UNKNOWN READ in helper_uc_tracecode
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34457 Crash type: UNKNOWN READ Crash state: helper_uc_tracecode
null
2021-05-20T00:01:16.313394Z
2021-05-20T00:01:16.313104Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34457', 'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'}
{'https://github.com/unicorn-engine/unicorn/commit/34ddafcbcf6d16508a63623a68715394ea4e12d8'}
{'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'}
{'https://github.com/unicorn-engine/unicorn/commit/52f90cda023abaca510d59f021c88629270ad6c0'}
OSS-Fuzz
OSV-2021-902
Heap-buffer-overflow in ebitmap_match_any
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35553 ``` Crash type: Heap-buffer-overflow READ 8 Crash state: ebitmap_match_any avtab_map cil_check_neverallow ```
null
2022-04-13T03:04:42.344343Z
2021-06-27T00:01:23.702334Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35553', 'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'}
{'https://github.com/SELinuxProject/selinux/commit/37863b0b1444c85a1ddc6c333c8bfea0c678c592'}
{'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'}
{'https://github.com/SELinuxProject/selinux/commit/9af91692416d01814f4b2ac22e39d3b57993af4f'}
OSS-Fuzz
OSV-2018-102
Heap-buffer-overflow in r_read_le32
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11303 ``` Crash type: Heap-buffer-overflow READ 1 Crash state: r_read_le32 r_bin_file_get_strings r_bin_object_set_items ```
null
2022-04-13T03:04:36.594467Z
2021-01-13T00:00:44.549063Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=11303', 'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a', 'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3'}
{'https://github.com/radare/radare2/commit/d8269a9e2bacbcfbd76fac63b461cea523460d7c'}
{'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a', 'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3'}
{'https://github.com/radare/radare2/commit/e3de9f0d4f9d6ed86cead11cdd0d6c339e0305e3', 'https://github.com/radare/radare2/commit/dc185e242a2dcac8eeb0f32a9450ddbaa4d6da7a'}
OSS-Fuzz
OSV-2021-514
UNKNOWN READ in _fini
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31953 ``` Crash type: UNKNOWN READ Crash state: _fini ```
null
2022-04-13T03:04:32.242907Z
2021-03-12T00:00:13.850530Z
MEDIUM
null
null
{'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31953'}
{'https://github.com/SerenityOS/serenity/commit/51b880b0383089822f513330cd64f93b54b9f21c'}
{'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0'}
{'https://github.com/SerenityOS/serenity/commit/09bd5f8772156f0031a3fa914bed2371429d09a0'}
OSS-Fuzz
OSV-2018-417
UNKNOWN READ in boost::sub_match<std::__1::__wrap_iter<char const*> >::sub_match
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9539 ``` Crash type: UNKNOWN READ Crash state: boost::sub_match<std::__1::__wrap_iter<char const*> >::sub_match _ZNSt3__16vectorIN5boost9sub_matchINS_11__wrap_iterIPKcEEEENS_9allocatorIS7_EEE1 boost::match_results<std::__1::__wrap_iter<char const*>, std::__1::allocator<boo ```
null
2022-04-13T03:04:40.905295Z
2021-01-15T00:01:14.949558Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9539', 'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'}
{'https://github.com/boostorg/boost/commit/d81afd08ff461a21836f71829fd21dabf57f80a9', 'https://github.com/boostorg/boost/commit/9f411f107c378e51c773657c196205eca093f51b'}
{'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'}
{'https://github.com/boostorg/boost/commit/812a820e234fd3cb1f857d16b6b5c51ed0b1201d'}
OSS-Fuzz
OSV-2021-144
Use-of-uninitialized-value in rawspeed::RawImageData::checkMemIsInitialized
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7171 ``` Crash type: Use-of-uninitialized-value Crash state: rawspeed::RawImageData::checkMemIsInitialized Cr2Decompressor.cpp rawspeed::alignedMalloc ```
null
2022-04-13T03:04:36.476158Z
2021-01-13T21:56:24.820945Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7171', 'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'}
{'https://github.com/darktable-org/rawspeed/commit/ad4f8565aa1ed3d2a9afb4ac56e17eeb06f70b8d'}
{'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'}
{'https://github.com/darktable-org/rawspeed/commit/d4852ee6da667d164373600d1bc8d205e2cdef6c'}
OSS-Fuzz
OSV-2020-847
Use-of-uninitialized-value in ycck_cmyk_convert
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18732 ``` Crash type: Use-of-uninitialized-value Crash state: ycck_cmyk_convert sep_upsample process_data_simple_main ```
null
2022-04-13T03:04:31.574083Z
2020-07-14T22:13:44.357655Z
MEDIUM
null
null
{'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18732'}
{'https://github.com/qpdf/qpdf/commit/0ae344d002755d1f218fe4fbd818a814bc3ebdbc'}
{'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95'}
{'https://github.com/qpdf/qpdf/commit/232f5fc9f3bed8e1b02bca5d10b2eca444e30f95'}
OSS-Fuzz
OSV-2020-22
Container-overflow in parquet::schema::Unflatten
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20897 ``` Crash type: Container-overflow READ 4 Crash state: parquet::schema::Unflatten parquet::FileMetaData::FileMetaDataImpl::FileMetaDataImpl parquet::FileMetaData::FileMetaData ```
null
2022-04-13T03:04:31.828829Z
2020-06-24T01:51:10.604817Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20897', 'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'}
{'https://github.com/apache/arrow/commit/431fdbfbc0fb4bb16c4a89298404ad16784db2a0'}
{'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'}
{'https://github.com/apache/arrow/commit/6b87c6c9fb00ade7eff909afa4a6a61464cd516c'}
OSS-Fuzz
OSV-2020-514
UNKNOWN READ in asn1_item_print_ctx
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14546 ``` Crash type: UNKNOWN READ Crash state: asn1_item_print_ctx asn1_template_print_ctx asn1_item_print_ctx ```
null
2022-04-13T03:04:38.813418Z
2020-07-01T00:00:13.902833Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14546', 'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'}
{'https://github.com/libressl-portable/portable/commit/23fa9a51d8f50a563566455dd9428c3525c9216d'}
{'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'}
{'https://github.com/libressl-portable/portable/commit/dd210a6fc3e621feadfb212031e596eb18c252e5'}
OSS-Fuzz
OSV-2021-847
Heap-buffer-overflow in frame_get_vlmetalayers
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35086 ``` Crash type: Heap-buffer-overflow READ {*} Crash state: frame_get_vlmetalayers frame_to_schunk blosc2_schunk_from_buffer ```
null
2022-04-13T03:04:40.375178Z
2021-06-10T00:01:13.857277Z
MEDIUM
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35086', 'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'}
{'https://github.com/Blosc/c-blosc2/commit/4d2510757d797781aed92193012294e7732afe9a'}
{'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'}
{'https://github.com/Blosc/c-blosc2/commit/1600817ed4961b13bbe6eed5f308c9abc78eee1e'}