CVE-2023-23556
https://notcve.org/view.php?id=CVE-2023-23556
An error in BigInt conversion to Number in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by a malicious attacker to execute arbitrary code due to an out-of-bound write. Note that this bug is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. • https://github.com/facebook/hermes/commit/a6dcafe6ded8e61658b40f5699878cd19a481f80 https://www.facebook.com/security/advisories/cve-2023-23556 • CWE-787: Out-of-bounds Write •
CVE-2022-36937
https://notcve.org/view.php?id=CVE-2022-36937
HHVM 4.172.0 and all prior versions use TLS 1.0 for secure connections when handling tls:// URLs in the stream extension. TLS1.0 has numerous published vulnerabilities and is deprecated. HHVM 4.153.4, 4.168.2, 4.169.2, 4.170.2, 4.171.1, 4.172.1, 4.173.0 replaces TLS1.0 with TLS1.3. Applications that call stream_socket_server or stream_socket_client functions with a URL starting with tls:// are affected. • https://github.com/facebook/hhvm/commit/083f5ffdee661f61512909d16f9a5b98cff3cf0b https://hhvm.com/blog/2023/01/20/security-update.html •
CVE-2023-30792
https://notcve.org/view.php?id=CVE-2023-30792
Anchor tag hrefs in Lexical prior to v0.10.0 would render javascript: URLs, allowing for cross-site scripting on link clicks in cases where input was being parsed from untrusted sources. • https://github.com/facebook/lexical/releases/tag/v0.10.0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-4899 – zstd: mysql: buffer overrun in util.c
https://notcve.org/view.php?id=CVE-2022-4899
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun. Se encontró una vulnerabilidad en zstd v1.4.10, donde un atacante puede proporcionar una cadena vacía como argumento a la herramienta de línea de comando para provocar una saturación del búfer. • https://github.com/facebook/zstd/issues/3200 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN https://security.netapp.com/advisory/ntap-20230725-0005 https://access.redhat.com/security/cve/CVE-2022-4899 https:/ • CWE-400: Uncontrolled Resource Consumption •
CVE-2022-36938
https://notcve.org/view.php?id=CVE-2022-36938
DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file. La función DexLoader get_stringidx_fromdex() en Redex antes del commit 3b44c64 puede cargar una dirección fuera de límite al cargar la tabla de índice de cadenas, lo que potencialmente permite la ejecución remota de código durante el procesamiento de un archivo APK de Android de terceros. • https://github.com/facebook/redex/commit/3b44c640346b77bfb7ef36e2413688dd460288d2 • CWE-125: Out-of-bounds Read CWE-1284: Improper Validation of Specified Quantity in Input •