Browse all 3 CVE security advisories affecting icsharpcode. AI-powered Chinese analysis, POCs, and references for each vulnerability.
icsharpcode develops open-source development tools, most notably the .NET decompiler ILSpy. Historically, vulnerabilities in their products have included remote code execution and cross-site scripting, often stemming from unsafe deserialization and improper input validation. While no major security incidents have been widely documented, their CVE history reflects common risks in code analysis tools. The project maintains a moderate security profile with three recorded vulnerabilities, primarily related to memory corruption and unsafe handling of user-supplied data. Their codebase generally follows secure coding practices, though older versions have shown susceptibility to classic exploitation vectors in decompilation and assembly tools.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-32841 | Path Traversal in SharpZipLib — sharpziplibCWE-22 | 4.0 | Medium | 2022-01-26 |
| CVE-2021-32842 | Path Traversal in SharpZipLib — sharpziplibCWE-22 | 4.0 | Medium | 2022-01-26 |
| CVE-2021-32840 | Path Traversal in SharpZipLib — sharpziplibCWE-22 | 7.3 | High | 2022-01-26 |
This page lists every published CVE security advisory associated with icsharpcode. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.