[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2020-37239":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-17T05:03:47.720Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":20,"aliases":35,"duplicate_of":9,"upstream":36,"downstream":37,"duplicates":38,"related":39,"reserved_at":9,"published_at":40,"modified_at":40,"state":41,"summary":42,"references_raw":48,"kevs":68,"epss":9,"epss_history":69,"metrics":70,"affected":82},"CVE-2020-37239","libbabl 0.1.62 contains a broken double free detection vulnerability that allows attackers to bypass memory safety checks by exploiting signature overwriting in freed chunks. Attackers can call babl_free() twice on the same pointer without triggering detection, as libc's malloc metadata overwrites babl's signature field upon freeing, enabling potential memory corruption and code execution.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-415","Double Free","The product calls free() twice on the same memory address.","weakness","Draft","Variant","High",[],[21],{"_key":22,"name":23,"source":24,"url":25,"maturity":26,"reliability_score":27,"verified":28,"type":29,"platforms":30,"requires_auth":9,"exploitdb":32,"metasploit":9},"49259","libbabl 0.1.62 - Broken Double Free Detection (PoC)","exploit-database","https://www.exploit-db.com/exploits/49259","poc",0.5,false,"local",[31],"linux",{"verified":28,"type":29,"platform":31,"file":33,"codes":34},"exploits/linux/local/49259.c",[],[],[],[],[],[],"2026-05-16T15:25:55.585Z","Received",{"cisa_kev":28,"cisa_ransomware":28,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":43,"severity_score":44,"severity_version":45,"severity_source":46,"severity_vector":47,"severity_status":41},"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[49,54,59,63],{"url":25,"sources":50,"tags":52},[46,51],"nvd",[53],"Exploit",{"url":55,"sources":56,"tags":57},"https://www.gegl.org",[46,51],[58],"Product",{"url":60,"sources":61,"tags":62},"https://www.gegl.org/babl/",[46,51],[58],{"url":64,"sources":65,"tags":66},"https://www.vulncheck.com/advisories/libbabl-broken-double-free-detection-memory-safety",[46,51],[67],"Third Party Advisory",[],[],[71,78],{"source":46,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":72,"cvss_v4_0":75},{"baseScore":44,"baseSeverity":73,"vectorString":47,"impactScore":44,"exploitabilityScore":74},"CRITICAL",10,{"baseScore":76,"baseSeverity":73,"vectorString":77,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":51,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":79,"cvss_v4_0":80},{"baseScore":44,"baseSeverity":73,"vectorString":47,"impactScore":44,"exploitabilityScore":74},{"baseScore":76,"baseSeverity":73,"vectorString":81,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[83],{"ecosystem":9,"name":84,"vendor":85,"product":84,"cpe_part":86,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":87},"libbabl","gegl","a",[88],{"version":89,"is_range":28,"range_type":46,"version_start":89,"version_start_type":90,"version_end":89,"version_end_type":90,"fixed_in":9},"0.1.62","including"]