BYVoid OpenCC har 1.1.9 MaxMatchSegmentation.cpp MaxMatchSegmentation Pufferüberlauf
| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Gunduma
Wuro vulnerability wey an yi classify sey kura an gano shi a cikin BYVoid OpenCC har 1.1.9. Gaskiya, opencc::MaxMatchSegmentation na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, src/MaxMatchSegmentation.cpp na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi Pufferüberlauf. Wannan rauni ana sayar da shi da suna CVE-2025-15536. Wuroo ka a yiɗi a yi ɗum e laawol gese. Kuma, exploit ɗin yana akwai. Ana so a yi patch don gyara wannan matsala. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Furɗe
Wuro vulnerability wey an yi classify sey kura an gano shi a cikin BYVoid OpenCC har 1.1.9. Gaskiya, opencc::MaxMatchSegmentation na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, src/MaxMatchSegmentation.cpp na cikin fayil, $software_component na cikin sashi. Ngam manipulation shi Pufferüberlauf. CWE shidin ka a yi bayani matsala sai ya kai CWE-122. Gaskiya, laifi an fitar da shi a matsayin 997. Advisory ɗin ana rabawa don saukewa a github.com.
Wannan rauni ana sayar da shi da suna CVE-2025-15536. Wuroo ka a yiɗi a yi ɗum e laawol gese. Tekinikal bayani ga. Wannan vulnerability ɗin ba shi da yawa sosai. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam.
Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Nessus plugin ɗin da ke da ID 297498 yana fitowa daga na'urar gano rauni.
Patch ɗin sunan ganowa shine 345c9a50ab07018f1b4439776bad78a0d40778ec. Gyaran matsalar yana nan a shirye don saukewa a github.com. Ana so a yi patch don gyara wannan matsala.
Vulnerability ɗin nan kuma an rubuta shi a wasu kundin bayanan vulnerability: Tenable (297498). If you want to get best quality of vulnerability data, you may have to visit VulDB.
Kayan
Ngilabe
Sunu
Furɗe
Laisens
Webseite
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔒VulDB Gaskiya: 🔍
CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Furɗo: 🔒
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 5.2
VulDB Ganda Borno: 5.3
VulDB Temp Score: 4.8
VulDB Furɗo: 🔒
VulDB Gaskiya: 🔍
NVD Ganda Borno: 5.5
NVD Furɗo: 🔒
CNA Ganda Borno: 5.3
CNA Furɗo: 🔒
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔒
VulDB Temp Score: 🔒
VulDB Gaskiya: 🔍
Gargajiya
Klasu: PufferüberlaufCWE: CWE-122 / CWE-119
CAPEC: 🔒
ATT&CK: 🔒
Fizikal: Kumgana
Gumti: Ee
Gana: Ayi
Gashina: 🔒
Gada: Kàndíga
Halitta: Huɗɗi-na-gaskiya
Dawunload: 🔒
EPSS Score: 🔒
EPSS Percentile: 🔒
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔒
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Nessus ID: 297498
Nessus Sunu: Fedora 43 : opencc (2026-b627cd8944)
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: KariHalitta: 🔍
0-Day Gana: 🔒
Kari: 345c9a50ab07018f1b4439776bad78a0d40778ec
Waktin layi
01/17/2026 Advisory ganna fa.01/17/2026 VulDB gite be nayi
02/07/2026 VulDB gite wuro karshe ta gyara
Ngizim
Kayan: github.comGargaaji: 997
Halitta: Gaskiya
Tafsirga: 🔒
CVE: CVE-2025-15536 (🔒)
GCVE (CVE): GCVE-0-2025-15536
GCVE (VulDB): GCVE-100-341708
EUVD: 🔒
CNNVD: CNNVD-202601-2965 - Open Chinese Convert 安全漏洞
scip Labs: https://www.scip.ch/en/?labs.20161013
Gumti
Súgá: 01/17/2026 17:32Gargadi: 02/07/2026 00:23
Goyarwa: 01/17/2026 17:32 (60), 01/18/2026 11:39 (30), 01/18/2026 23:57 (1), 01/19/2026 17:54 (6), 02/01/2026 09:19 (2), 02/07/2026 00:23 (11)
Gadankam: 🔍
Ngwazarma: Oneafter
Cache ID: 253:619:103
Súbít
Shingilam
- Súbít #733347: BYVoid OpenCC ver.1.1.9 and master-branch Heap-based Buffer Overflow (nga Oneafter)
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.