Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-27828
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
JasPer jpc encoder 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
JasPer是Michael Adams个人开发者的一个基于C的用于处理图像的工具。该软件支持ISO / IEC 15444-1中定义的JPEG-2000格式,主要用于图像的编码和处理。 jasper中的 jpc encoder 2.0.23之前版本存在安全漏洞,攻击者可利用该漏洞提供给jasper的精心设计的输入可能会导致任意的越界写入。这可能会潜在地影响数据机密性、完整性或应用程序可用性。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-jasper prior to 2.0.23 -
II. Public POCs for CVE-2020-27828
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-27828
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2020-27828

No comments yet


Leave a comment