Show filters
42 Total Results
Displaying 1-10 of 42
Sort by:
Attacker Value
Unknown

CVE-2020-18770

Disclosure Date: August 22, 2023 (last updated October 08, 2023)
An issue was discovered in function zzip_disk_entry_to_file_header in mmapped.c in zziplib 0.13.69, which will lead to a denial-of-service.
Attacker Value
Unknown

CVE-2023-26130

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other misbehaviors. **Note:** This issue is present due to an incomplete fix for [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-2366507).
Attacker Value
Unknown

CVE-2021-39432

Disclosure Date: November 04, 2022 (last updated December 22, 2024)
diplib v3.0.0 is vulnerable to Double Free.
Attacker Value
Unknown

CVE-2021-32841

Disclosure Date: January 26, 2022 (last updated October 07, 2023)
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins with the destination directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 contains a patch for this vulnerability.
Attacker Value
Unknown

CVE-2021-32842

Disclosure Date: January 26, 2022 (last updated October 07, 2023)
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.
Attacker Value
Unknown

CVE-2021-32840

Disclosure Date: January 26, 2022 (last updated October 07, 2023)
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3.
Attacker Value
Unknown

CVE-2021-38714

Disclosure Date: August 24, 2021 (last updated February 23, 2025)
In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability is found in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file.
Attacker Value
Unknown

CVE-2020-18442

Disclosure Date: June 18, 2021 (last updated February 22, 2025)
Infinite Loop in zziplib v0.13.69 allows remote attackers to cause a denial of service via the return value "zzip_file_read" in the function "unzzip_cat_file".
Attacker Value
Unknown

CVE-2021-21240

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
Attacker Value
Unknown

CVE-2020-11078

Disclosure Date: May 20, 2020 (last updated February 21, 2025)
In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.