Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-32742
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vapor is a web framework for Swift. In versions 4.47.1 and prior, bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the impacted function directly or through other dependencies. The vulnerability is patched in version 4.47.2. As a workaround, one may use an alternative to Vapor's built-in `Data.init(base32Encoded:)`.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
vapor 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
vapor是个人开发者的一个 Swift 的 Web 开发框架。可用于开发高性能的Web应用,支持 iOS、OS X 和 Ubuntu 系统。 Vapor 4.47.1及更早版本中存在代码问题漏洞,该漏洞源于‘Data.init(base32Encoded:)’函数中的错误为应用程序打开了暴露服务器内存和/或使服务器崩溃(拒绝服务)的可能性功能。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
vaporvapor <= 4.47.1 -
II. Public POCs for CVE-2021-32742
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
Qwen3.6-35B-A3B · 7376 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month
III. Intelligence Information for CVE-2021-32742
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-32742

No comments yet


Leave a comment