From 54a1b59265a6095df786a7f3f2ce9eb41c8275c4 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Wed, 16 Feb 2022 21:23:37 +0100 Subject: Add CVE-2022-0559/radare2 --- data/CVE/2022.list | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/data/CVE/2022.list b/data/CVE/2022.list index c77f93dc3a..2cb8c3aefd 100644 --- a/data/CVE/2022.list +++ b/data/CVE/2022.list @@ -1386,7 +1386,9 @@ CVE-2022-0561 (Null source pointer passed as an argument to memcpy() function wi CVE-2022-0560 (Open Redirect in Packagist microweber/microweber prior to 1.2.11. ...) NOT-FOR-US: microweber CVE-2022-0559 (Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. ...) - TODO: check + - radare2 + NOTE: https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e + NOTE: https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e CVE-2022-0558 (Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber ...) NOT-FOR-US: microweber CVE-2022-0557 (OS Command Injection in Packagist microweber/microweber prior to 1.2.1 ...) -- cgit v1.2.3