cve_id
stringlengths
13
16
cve_published
stringlengths
23
23
cve_descriptions
stringlengths
54
1.07k
cve_metrics
dict
cve_references
listlengths
1
34
cve_configurations
listlengths
1
5
url
stringlengths
39
77
cve_tags
listlengths
1
4
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
3
88.6k
issue_title
stringlengths
3
335
issue_comments_url
stringlengths
58
81
issue_comments_count
int64
0
146
issue_created_at
stringlengths
20
20
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
39
62
issue_github_id
int64
128M
2.09B
issue_number
int64
1
122k
CVE-2023-36274
2023-06-23T15:15:10.213
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/677#BUG2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8B002438-509E-462D-B17E-129197C3E4B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/LibreDWG/libredwg/issues/677#BUG2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I was testing my fuzzer and found two bugs in dwg2dxf, which is different from #368 and #484 ## environment ubuntu 20.04, GCC 9.4.0, libredwg latest commit 77a85621de6e2c7ea44bc48c02e52dac97778ecb compile with ``` ./autogen.sh && ./configure --disable-shared && make -j$(nproc) ``` ## BUG1 ``` /li...
[FUZZ] two bugs in dwg2dxf
https://api.github.com/repos/LibreDWG/libredwg/issues/677/comments
2
2023-03-30T04:10:56Z
2023-04-04T14:03:23Z
https://github.com/LibreDWG/libredwg/issues/677
1,646,878,719
677
CVE-2023-36632
2023-06-25T18:15:09.313
The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and a...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://docs.python.org/3/library/email.html" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://docs.python.org/3/library/email.utils.html" }, { "source": "cve@mitre.org", "ta...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBFABA38-746A-451D-A9DB-8AF31A4AE9B3", "versionEndExcluding": null, "versionEndIncluding": "3.11.4", "versionStartExcludin...
https://github.com/python/cpython/issues/103800
[ "Exploit", "Issue Tracking" ]
github.com
[ "python", "cpython" ]
# Bug report We did a fuzzing test on Python3.9.15, a recursion error happened. ```python from email.utils import * import email import email.utils import re class demoCls(): def __init__(self): pass def demoFunc(self, arg): try: ret = email.utils.parseaddr(arg)...
RecursionError in email.utils.parseaddr
https://api.github.com/repos/python/cpython/issues/103800/comments
2
2023-04-24T21:53:40Z
2023-04-25T17:55:49Z
https://github.com/python/cpython/issues/103800
1,682,097,315
103,800
CVE-2023-33661
2023-06-29T00:15:09.567
Multiple cross-site scripting (XSS) vulnerabilities were discovered in Church CRM v4.5.3 in GroupReports.php via GroupRole, ReportModel, and OnlyCart parameters.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM/CRM/issues/6474" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C5A21E4C-1CE8-4C97-9374-DD8EBDB942D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/ChurchCRM/CRM/issues/6474
[ "Exploit", "Issue Tracking" ]
github.com
[ "ChurchCRM", "CRM" ]
**If you have the ChurchCRM software running, please file an issue using the _Report an issue_ in the help menu.** #### On what page in the application did you find this issue? /churchcrm/GroupReports.php #### On what type of server is this running? Dedicated / Shared hosting? Linux / Windows? Linux #### What ...
XSS exists in the group report page
https://api.github.com/repos/ChurchCRM/CRM/issues/6474/comments
2
2023-04-21T19:07:58Z
2023-11-05T01:05:42Z
https://github.com/ChurchCRM/CRM/issues/6474
1,678,971,305
6,474
CVE-2020-22151
2023-07-03T21:15:09.240
Permissions vulnerability in Fuel-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted zip file to the assests parameter of the upload function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/551" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/551
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
1. First create a php file that executes the command and compress the php file into a zip <img width="606" alt="1" src="https://user-images.githubusercontent.com/9522862/74303980-98127100-4d96-11ea-9b59-101e6d44d889.png"> <img width="320" alt="2" src="https://user-images.githubusercontent.com/9522862/74304008-b11b22...
getshell in assets
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/551/comments
1
2020-02-12T04:56:19Z
2020-09-30T20:49:24Z
https://github.com/daylightstudio/FUEL-CMS/issues/551
563,752,895
551
CVE-2020-22152
2023-07-03T21:15:09.293
Cross Site Scripting vulnerability in daylight studio FUEL- CMS v.1.4.6 allows a remote attacker to execute arbitrary code via the page title, meta description and meta keywords of the pages function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/552" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/552
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
Stored xss in Page title, Meta description, Meta keywords of pages <img width="1140" alt="xss1" src="https://user-images.githubusercontent.com/9522862/74311085-9a31fb00-4da9-11ea-84a0-b65eb76ba02b.png"> <img width="1146" alt="xss2" src="https://user-images.githubusercontent.com/9522862/74311126-aae27100-4da9-11ea-9f8...
XSS in pages
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/552/comments
0
2020-02-12T07:10:34Z
2021-04-15T18:33:49Z
https://github.com/daylightstudio/FUEL-CMS/issues/552
563,798,483
552
CVE-2020-22153
2023-07-03T21:15:09.340
File Upload vulnerability in FUEL-CMS v.1.4.6 allows a remote attacker to execute arbitrary code via a crafted .php file to the upload parameter in the navigation function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/553" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "F67321E5-38B6-455B-8BD2-B8C71878FC72", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/553
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
<img width="837" alt="c1" src="https://user-images.githubusercontent.com/9522862/74326653-bc397680-4dc5-11ea-9e41-c24b32bf4bad.png"> upload function: <img width="1006" alt="c2" src="https://user-images.githubusercontent.com/9522862/74326673-c3608480-4dc5-11ea-89d8-9246baff623c.png"> $This-> fuel-> navigation-> u...
Code execution in navigation/upload
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/553/comments
0
2020-02-12T10:44:49Z
2020-09-30T21:04:55Z
https://github.com/daylightstudio/FUEL-CMS/issues/553
563,911,041
553
CVE-2020-22597
2023-07-03T21:15:09.383
An issue in Jerrscript- project Jerryscrip v. 2.3.0 allows a remote attacker to execute arbitrary code via the ecma_builtin_array_prototype_object_slice parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3637" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCC6C843-EE98-4852-8D03-7FC19D2E821C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/3637
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision `655110a` commit ###### Build steps ```sh python tools/build.py --clean --compile-flag=-fsanitize=address ``` ###### Test case ``` a = [] for(var i=0; i<100; i++) a.push(i) a.slice(0, {valueOf: function(){a.length=0; return 100;}}) ``` ###### Output ``` ==34465==ERROR: Addr...
SEGV on ecma_builtin_array_prototype_object_slice
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3637/comments
0
2020-03-24T14:11:59Z
2020-03-27T20:24:09Z
https://github.com/jerryscript-project/jerryscript/issues/3637
586,989,326
3,637
CVE-2023-2727
2023-07-03T21:15:09.480
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/06/2" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking" ], "url": "https://github.com/kubernetes/kubern...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "44D47082-4E70-4CBE-B52B-B2A83903F17B", "versionEndExcluding": null, "versionEndIncluding": "1.24.14", "versionStar...
https://github.com/kubernetes/kubernetes/issues/118640
[ "Issue Tracking" ]
github.com
[ "kubernetes", "kubernetes" ]
### CVE-2023-2727: Bypassing policies imposed by the ImagePolicyWebhook admission plugin CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N) A security issue was discovered in Kubernetes where users may be able to launch...
CVE-2023-2727, CVE-2023-2728: Bypassing policies imposed by the ImagePolicyWebhook and bypassing mountable secrets policy imposed by the ServiceAccount admission plugin
https://api.github.com/repos/kubernetes/kubernetes/issues/118640/comments
10
2023-06-13T14:42:06Z
2024-07-01T15:57:09Z
https://github.com/kubernetes/kubernetes/issues/118640
1,755,056,681
118,640
CVE-2023-36258
2023-07-03T21:15:09.797
An issue in LangChain before 0.0.236 allows an attacker to execute arbitrary code because Python code with os.system, exec, or eval can be used.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation" ], "url": "https://github.com/hwchase17/langchain/issues/5872" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.199:*:*:*:*:*:*:*", "matchCriteriaId": "99FB5025-85A6-41B6-B0DC-7D34C5FCFB6A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/hwchase17/langchain/issues/5872
[ "Exploit", "Issue Tracking", "Mitigation" ]
github.com
[ "hwchase17", "langchain" ]
### System Info langchain version: `0.0.194` os: `ubuntu 20.04` python: `3.9.13` ### Who can help? _No response_ ### Information - [ ] The official example notebooks/scripts - [X] My own modified scripts ### Related Components - [ ] LLMs/Chat Models - [ ] Embedding Models - [ ] Prompts / Promp...
Prompt injection which leads to arbitrary code execution in `langchain.chains.PALChain`
https://api.github.com/repos/langchain-ai/langchain/issues/5872/comments
5
2023-06-08T08:45:37Z
2023-08-29T16:31:34Z
https://github.com/langchain-ai/langchain/issues/5872
1,747,393,600
5,872
CVE-2023-36189
2023-07-06T14:15:10.707
SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/hwchase17/langchain/issues/5923" }, { "source": "cve@mitre.org", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "0D9CEC27-1B1B-4365-82F1-2538DD3F158D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
https://github.com/hwchase17/langchain/issues/5923
[ "Exploit" ]
github.com
[ "hwchase17", "langchain" ]
### System Info There is no safeguard in SQLDatabaseChain to prevent a malicious user from sending a prompt such as "Drop Employee table". SQLDatabaseChain should have a facility to intercept and review the SQL before sending it to the database. Creating this separately from https://github.com/hwchase17/langch...
SQLDatabaseChain has SQL injection issue
https://api.github.com/repos/langchain-ai/langchain/issues/5923/comments
7
2023-06-09T07:19:24Z
2024-03-13T16:12:29Z
https://github.com/langchain-ai/langchain/issues/5923
1,749,279,355
5,923
CVE-2023-36189
2023-07-06T14:15:10.707
SQL injection vulnerability in langchain before v0.0.247 allows a remote attacker to obtain sensitive information via the SQLDatabaseChain component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://gist.github.com/rharang/9c58d39db8c01db5b7c888e467c0533f" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/hwchase17/langchain/issues/5923" }, { "source": "cve@mitre.org", "t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "0D9CEC27-1B1B-4365-82F1-2538DD3F158D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
https://github.com/langchain-ai/langchain/issues/5923#issuecomment-1696053841
null
github.com
[ "langchain-ai", "langchain" ]
### System Info There is no safeguard in SQLDatabaseChain to prevent a malicious user from sending a prompt such as "Drop Employee table". SQLDatabaseChain should have a facility to intercept and review the SQL before sending it to the database. Creating this separately from https://github.com/hwchase17/langch...
SQLDatabaseChain has SQL injection issue
https://api.github.com/repos/langchain-ai/langchain/issues/5923/comments
7
2023-06-09T07:19:24Z
2024-03-13T16:12:29Z
https://github.com/langchain-ai/langchain/issues/5923
1,749,279,355
5,923
CVE-2023-37132
2023-07-06T15:15:16.253
A stored cross-site scripting (XSS) vulnerability in the custom variables module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/45" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/45
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
123
123
https://api.github.com/repos/weng-xianhu/eyoucms/issues/45/comments
0
2023-06-27T03:33:35Z
2024-03-22T06:49:26Z
https://github.com/weng-xianhu/eyoucms/issues/45
1,776,028,889
45
CVE-2023-37133
2023-07-06T15:15:16.297
A stored cross-site scripting (XSS) vulnerability in the Column management module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/46" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/46
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
123
123
https://api.github.com/repos/weng-xianhu/eyoucms/issues/46/comments
0
2023-06-27T06:11:29Z
2024-03-22T06:49:27Z
https://github.com/weng-xianhu/eyoucms/issues/46
1,776,161,891
46
CVE-2023-37134
2023-07-06T15:15:16.343
A stored cross-site scripting (XSS) vulnerability in the Basic Information module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/47" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/47
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
123
123
https://api.github.com/repos/weng-xianhu/eyoucms/issues/47/comments
0
2023-06-27T06:31:23Z
2024-03-22T06:49:27Z
https://github.com/weng-xianhu/eyoucms/issues/47
1,776,185,888
47
CVE-2023-37135
2023-07-06T15:15:16.387
A stored cross-site scripting (XSS) vulnerability in the Image Upload module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/48" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/48
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
123
123
https://api.github.com/repos/weng-xianhu/eyoucms/issues/48/comments
0
2023-06-27T07:00:09Z
2024-03-22T06:49:27Z
https://github.com/weng-xianhu/eyoucms/issues/48
1,776,227,201
48
CVE-2023-37136
2023-07-06T15:15:16.430
A stored cross-site scripting (XSS) vulnerability in the Basic Website Information module of eyoucms v1.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/49" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/49
[ "Exploit", "Issue Tracking" ]
github.com
[ "weng-xianhu", "eyoucms" ]
123
123
https://api.github.com/repos/weng-xianhu/eyoucms/issues/49/comments
0
2023-06-27T08:57:00Z
2024-03-22T06:49:27Z
https://github.com/weng-xianhu/eyoucms/issues/49
1,776,421,874
49
CVE-2023-36201
2023-07-07T16:15:09.827
An issue in JerryscriptProject jerryscript v.3.0.0 allows an attacker to obtain sensitive information via a crafted script to the arrays.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5026" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5026
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
# Version *Version: 3.0.0* ( 6fe763f ) # Execution steps ```bash /root/.jsvu/jerry Testcase.js ``` # Test case 1 ```javascript var foo = function(it) { var a = [...it, , ]; print(a); print(a.length); }; var Parameter0 = [1, 2]; foo(Parameter0); ``` ## Output 1 ``` 1,2 2 ```...
Array concatenation exception
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5026/comments
1
2022-09-27T01:43:11Z
2022-10-04T10:41:02Z
https://github.com/jerryscript-project/jerryscript/issues/5026
1,386,949,916
5,026
CVE-2023-37174
2023-07-11T23:15:09.120
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the dump_isom_scene function at /mp4box/filedump.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2505" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*", "matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/gpac/gpac/issues/2505
[ "Exploit", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes. The following is the details. ## Title: SEGV on unknown address 0x000000012c29 **1. Description** A SEGV on unknown address 0x000000012c29 has occurred in function dump_isom_scene /root/gpac/applications/mp4box/filedump.c:226:2 when running...
SEGV on unknown address 0x000000012c29
https://api.github.com/repos/gpac/gpac/issues/2505/comments
0
2023-06-27T08:29:57Z
2023-06-27T13:29:56Z
https://github.com/gpac/gpac/issues/2505
1,776,376,880
2,505
CVE-2023-37765
2023-07-11T23:15:09.167
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_dump_vrml_sffield function at /lib/libgpac.so.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2515" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*", "matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/gpac/gpac/issues/2515
[ "Exploit", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes. The following is the details. ## Title: SEGV on unknown address 0x000000000003(0x000000000009) **1. Description** A SEGV on unknown address 0x000000000003(0x000000000009) has occurred in function dump_isom_scene /root/gpac/applications/mp4bo...
SEGV on unknown address 0x000000000003(0x000000000009)
https://api.github.com/repos/gpac/gpac/issues/2515/comments
0
2023-07-04T05:41:47Z
2023-07-04T15:06:27Z
https://github.com/gpac/gpac/issues/2515
1,787,186,997
2,515
CVE-2023-37766
2023-07-11T23:15:09.210
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf_isom_remove_user_data function at /lib/libgpac.so.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2516" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*", "matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/gpac/gpac/issues/2516
[ "Exploit", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes. The following is the details. ## Title: SEGV on unknown address 0x000000000038 **1. Description** SEGV on unknown address 0x000000000038 has occurred in function set_file_udta /root/gpac/applications/mp4box/fileimport.c:70:14 when running p...
SEGV on unknown address 0x000000000038
https://api.github.com/repos/gpac/gpac/issues/2516/comments
0
2023-07-04T13:14:59Z
2023-07-04T15:06:27Z
https://github.com/gpac/gpac/issues/2516
1,787,914,764
2,516
CVE-2023-37767
2023-07-11T23:15:09.250
GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the BM_ParseIndexValueReplace function at /lib/libgpac.so.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/gpac/gpac/issues/2514" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:*:*", "matchCriteriaId": "264FC010-3E8E-4717-8828-B8F53234EECB", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/gpac/gpac/issues/2514
[ "Exploit", "Vendor Advisory" ]
github.com
[ "gpac", "gpac" ]
Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes. The following is the details. ## Title: SEGV on unknown address 0x000000000000 **1. Description** A SEGV on unknown address 0x000000000000 has occurred in function dump_isom_scene /root/gpac/applications/mp4box/filedump.c:209:14 when runnin...
SEGV on unknown address 0x000000000000
https://api.github.com/repos/gpac/gpac/issues/2514/comments
0
2023-07-04T05:31:02Z
2023-07-04T15:06:27Z
https://github.com/gpac/gpac/issues/2514
1,787,177,384
2,514
CVE-2022-30858
2023-07-17T19:15:09.137
An issue was discovered in ngiflib 0.4. There is SEGV in SDL_LoadAnimatedGif when use SDLaffgif. poc : ./SDLaffgif CA_file2_0
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Marsman1996/pocs/blob/master/ngiflib/CVE-2022-30858/README.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ngiflib_project:ngiflib:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EEFD7EDE-41CD-4646-BBC8-6500AFC1985E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/miniupnp/ngiflib/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "miniupnp", "ngiflib" ]
I use **llvm-10** and **AddressSanitizer** to build SDLaffgif. The [poc](https://github.com/GHTHYS/poc/blob/main/CA_file2_0) file is : ```./SDLaffgif CA_file2_0 ./SDLaffgif CA_file2_0 ``` The ASAN information : ```================================================================= ==15828==ERROR: Address...
SDL_LoadAnimatedGif SEGV
https://api.github.com/repos/miniupnp/ngiflib/issues/22/comments
0
2022-05-11T19:34:06Z
2023-03-04T10:49:35Z
https://github.com/miniupnp/ngiflib/issues/22
1,233,098,266
22
CVE-2023-37139
2023-07-18T20:15:09.737
ChakraCore branch master cbb9b was discovered to contain a stack overflow vulnerability via the function Js::ScopeSlots::IsDebuggerScopeSlotArray().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chakra-core/ChakraCore/issues/6884" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/chakra-core/ChakraCore/issues/6884
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chakra-core", "ChakraCore" ]
Branch: `master` Commit : `cbb9b101d18e4c1682ca39a52a201d8e4241ea17` POC : ``` function Run() { var intl = new Intl.Collator(); intl.compare('a','b');/**bp:resume('step_into');locals()**/ let C1 = class NotC1 { attemptOuterBindingChange() { C1 = 1; } attemptInnerBindingChange() { NotC1 ...
dynamic-stack-buffer-overflow in release build
https://api.github.com/repos/chakra-core/ChakraCore/issues/6884/comments
0
2023-04-09T03:05:13Z
2023-04-21T02:43:38Z
https://github.com/chakra-core/ChakraCore/issues/6884
1,659,728,699
6,884
CVE-2023-37140
2023-07-18T20:15:09.790
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::DiagScopeVariablesWalker::GetChildrenCount().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chakra-core/ChakraCore/issues/6885" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/chakra-core/ChakraCore/issues/6885
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chakra-core", "ChakraCore" ]
Branch: `master` Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17` POC: ``` function Run() { function f1() { var m = 31; m++; var coll = new Intl.Collator(); m += f2(); return m; } function f2() { return 100; } function test6() { ...
SEGV (/root/ChakraCore-latest/out/Release/ch+0x8bcaaf) in Js::DiagScopeVariablesWalker::GetChildrenCount()
https://api.github.com/repos/chakra-core/ChakraCore/issues/6885/comments
1
2023-04-09T03:16:59Z
2023-04-21T02:42:47Z
https://github.com/chakra-core/ChakraCore/issues/6885
1,659,731,495
6,885
CVE-2023-37141
2023-07-18T20:15:09.843
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::ProfilingHelpers::ProfiledNewScArray().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chakra-core/ChakraCore/issues/6886" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/chakra-core/ChakraCore/issues/6886
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chakra-core", "ChakraCore" ]
Branch: `master` Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17` POC is: ``` function attach(f) { (function (r) { WScript.Attach(r); })(f); } async function mainTest(notAttachCall) { if (notAttachCall) { for (let i = 0; i < 1; []) { await attach(mainTest); } ...
SEGV (/root/ChakraCore-latest/out/Release/ch+0xe248a5) in Js::ProfilingHelpers::ProfiledNewScArray(unsigned int, Js::FunctionBody*, unsigned short)
https://api.github.com/repos/chakra-core/ChakraCore/issues/6886/comments
1
2023-04-09T03:28:26Z
2023-04-21T02:41:02Z
https://github.com/chakra-core/ChakraCore/issues/6886
1,659,733,406
6,886
CVE-2023-37142
2023-07-18T20:15:09.890
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::EntryPointInfo::HasInlinees().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chakra-core/ChakraCore/issues/6887" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/chakra-core/ChakraCore/issues/6887
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chakra-core", "ChakraCore" ]
Branch: `master` Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17` POC is: ``` async function f1() { await null; throw WScript.f2a(f1()); } f1(); async function f2() { async function f2a() { throw "err"; } async function f2b() { try { var p = f2a(); ...
SEGV (/root/ChakraCore-latest/out/Release/ch+0x6e3fff) in Js::EntryPointInfo::HasInlinees()
https://api.github.com/repos/chakra-core/ChakraCore/issues/6887/comments
2
2023-04-09T03:34:13Z
2023-04-21T02:46:29Z
https://github.com/chakra-core/ChakraCore/issues/6887
1,659,734,429
6,887
CVE-2023-37143
2023-07-18T20:15:09.947
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function BackwardPass::IsEmptyLoopAfterMemOp().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/chakra-core/ChakraCore/issues/6888" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF3889F-978A-4F39-9A0D-E633A887059B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/chakra-core/ChakraCore/issues/6888
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "chakra-core", "ChakraCore" ]
Branch: `master` Commit: `cbb9b101d18e4c1682ca39a52a201d8e4241ea17` POC is: ``` let xxx = new Uint32Array(0x10000); xxx.slice = Array.prototype.slice; function jit(arr, index){ let ut = arr.slice(0,0); //become definite Uint32Array but |arr| is a VirtualUint32Array for(let i = 0; i < (i + ...
SEGV on unknown address 0x000000000000
https://api.github.com/repos/chakra-core/ChakraCore/issues/6888/comments
1
2023-04-09T04:55:55Z
2023-04-21T02:47:23Z
https://github.com/chakra-core/ChakraCore/issues/6888
1,659,749,340
6,888
CVE-2023-37748
2023-07-19T17:15:22.323
ngiflib commit 5e7292 was discovered to contain an infinite loop via the function DecodeGifImg at ngiflib.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/miniupnp/ngiflib/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/miniupnp/ngiflib/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniupnp_project:ngiflib:-:*:*:*:*:*:*:*", "matchCriteriaId": "715C2B2D-5B40-4194-A5C4-0250F7B1BF54", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
https://github.com/miniupnp/ngiflib/issues/25
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "miniupnp", "ngiflib" ]
### Desctiption Infinite loop has occurred when running program gif2tga in function DecodeGifImg at ngiflib.c:556 ### Version ``` commit 5e7292bfabbeeee8dca0bf4c9a77ff10c8e3bf28 (HEAD -> master, origin/master, origin/HEAD) Author: Thomas Bernard <miniupnp@free.fr> Date: Thu Jun 29 01:57:28 2023 +0200 ``` ...
Infinite loop has occurred when running program gif2tga in function DecodeGifImg at ngiflib.c
https://api.github.com/repos/miniupnp/ngiflib/issues/25/comments
0
2023-06-29T12:57:56Z
2023-06-29T21:35:53Z
https://github.com/miniupnp/ngiflib/issues/25
1,780,772,488
25
CVE-2023-37645
2023-07-20T22:15:10.307
eyoucms v1.6.3 was discovered to contain an information disclosure vulnerability via the component /custom_model_path/recruit.filelist.txt.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weng-xianhu/eyoucms/issues/50" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "0DDC6EF0-7D79-4155-B984-0BA7756C05EC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/weng-xianhu/eyoucms/issues/50
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weng-xianhu", "eyoucms" ]
eyoucms 1.6.3 has an information leakage vulnerability A bug was found. There is information leakage. Tests are executed only in the test environment. No illegal operation Software Link :https://github.com/weng-xianhu/eyoucms Website : http://www.eyoucms.com/ Access the file recruit.filelist.txt to obtain ...
eyoucms 1.6.3 has an information leakage vulnerability
https://api.github.com/repos/weng-xianhu/eyoucms/issues/50/comments
0
2023-06-30T03:24:55Z
2024-03-22T06:46:37Z
https://github.com/weng-xianhu/eyoucms/issues/50
1,781,811,190
50
CVE-2023-3852
2023-07-23T22:15:09.477
A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/upload.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PAR...
[ { "source": "cna@vuldb.com", "tags": [ "Patch", "VDB Entry" ], "url": "https://github.com/OpenRapid/rapidcms/commit/4dff387283060961c362d50105ff8da8ea40bcbe" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yuque:rapidcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BB24E33-E6BE-4A10-A4B9-5BF1C11E44F3", "versionEndExcluding": null, "versionEndIncluding": "1.3.1", "versionStartExcludin...
https://github.com/OpenRapid/rapidcms/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OpenRapid", "rapidcms" ]
# RapidCMS exists arbitrary file upload vulnerability An arbitrary file upload vulnerability in `/admin/upload.php` allows attackers to getshell Firstly, we can register an admin account [username:admin / password:admin] .Then enter the website backend and click the article editing button. <img width="664" alt="截屏20...
Arbitrary file upload vulnerability
https://api.github.com/repos/OpenRapid/rapidcms/issues/1/comments
1
2023-07-10T09:30:18Z
2023-07-11T15:00:08Z
https://github.com/OpenRapid/rapidcms/issues/1
1,796,360,665
1
CVE-2023-3745
2023-07-24T16:15:13.130
A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-3745" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA9905B3-D649-46D9-9F93-BD74D9964B61", "versionEndExcluding": "6.9-11-0", "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/1857
[ "Exploit", "Issue Tracking" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
heap-buffer-overflow in /MagickCore/quantum-private.h
https://api.github.com/repos/ImageMagick/ImageMagick/issues/1857/comments
4
2020-03-02T14:01:45Z
2023-07-18T15:28:06Z
https://github.com/ImageMagick/ImageMagick/issues/1857
573,994,956
1,857
CVE-2023-37049
2023-07-26T13:15:10.173
emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\template.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:emlog:emlog:2.1.9:-:*:*:*:*:*:*", "matchCriteriaId": "C692BE5B-CD83-4E6F-BA14-823B539FF406", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding"...
https://github.com/Num-Nine/CVE/issues/1
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
First log in to the home page of the background using the administrator account Open the admin\template.php template **../../hello.txt** This location is the root directory file to be deleted poc: GET /emlog/admin/template.php?action=del&tpl=**../../hello.txt**&token=c5bc68077f6da2a911df58e6cde92cbc2d0514fd HTT...
emlogcms has an arbitrary file deletion vulnerability
https://api.github.com/repos/QianGeG/CVE/issues/1/comments
0
2023-06-23T13:54:27Z
2023-06-23T13:54:27Z
https://github.com/QianGeG/CVE/issues/1
1,771,506,262
1
CVE-2023-37732
2023-07-26T21:15:10.153
Yasm v1.3.0.78 was found prone to NULL Pointer Dereference in /libyasm/intnum.c and /elf/elf.c, which allows the attacker to cause a denial of service via a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/ChanStormstout/02eea9cf5c002b42b2ff3de5ca939520" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/yasm/yasm/issues/233" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.78.g4dc8:*:*:*:*:*:*:*", "matchCriteriaId": "0D988178-CCB8-439D-A35D-AF759EC16189", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/yasm/yasm/issues/233
[ "Exploit" ]
github.com
[ "yasm", "yasm" ]
# Description While fuzzing yasm, a SEGV occured which was positioned in yasm/libyasm/intnum.c:399:19 in yasm_intnum_copy. This bug may allow attackers to cause a crash or denial of service via a designed crafted files. # Operating system Ubuntu 20.04.6 LTS # ASAN info ``` ./bin/yasm -p gas -f elf32 -g dwarf2 ....
SEGV in yasm/libyasm/intnum.c's function :yasm_intnum_copy
https://api.github.com/repos/yasm/yasm/issues/233/comments
0
2023-06-29T13:07:01Z
2023-06-30T15:08:56Z
https://github.com/yasm/yasm/issues/233
1,780,786,529
233
CVE-2023-38992
2023-07-28T15:15:12.030
jeecg-boot v3.5.1 was discovered to contain a SQL injection vulnerability via the title parameter at /sys/dict/loadTreeData.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/5173" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "52891D2B-E0C4-4263-9804-45F1551B5142", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
https://github.com/jeecgboot/jeecg-boot/issues/5173
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.5.1 ##### 前端版本:vue3版?还是 vue2版? vue3 ##### 问题描述: 存在sql注入,可以获取所有表的信息 类: org.jeecg.modules.system.controller.SysDictController 方法: loadTreeData URL:/sys/dict/loadTreeData ##### 截图&代码: 这里演示使用zhangsan的token登录之后,查询admin的id和密码,结果如下 ![da095b7d51c9ceaf88c61efebf2f7b05](https://github.com/jeecgboot/...
SQL注入
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/5173/comments
15
2023-07-21T10:02:06Z
2023-09-04T09:31:35Z
https://github.com/jeecgboot/JeecgBoot/issues/5173
1,815,528,659
5,173
CVE-2023-38988
2023-07-28T21:15:14.213
An issue in the delete function in the OaNotifyController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete notifications created by Administrators.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/thinkgem/jeesite/issues/517" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeesite:jeesite:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6C335A4-A2F6-43E7-A432-2568E1D3460B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/thinkgem/jeesite/issues/517
[ "Exploit", "Issue Tracking" ]
github.com
[ "thinkgem", "jeesite" ]
普通用户可以删除管理员添加的通知 Regular users can delete notifications added by administrators. 问题代码出现在com.thinkgem.jeesite.modules.oa.web.OaNotifyController类中的delete方法中 The problematic code appears in the 'delete' method of the 'OaNotifyController' class in com.thinkgem.jeesite.modules.oa.web. 管理员添加了一条通知 The administrator add...
普通用户可以删除管理员添加的通知
https://api.github.com/repos/thinkgem/jeesite/issues/517/comments
1
2023-07-19T16:42:19Z
2023-07-19T17:06:48Z
https://github.com/thinkgem/jeesite/issues/517
1,812,317,640
517
CVE-2023-38989
2023-07-31T18:15:10.320
An issue in the delete function in the UserController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete the Administrator's role information.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkgem/jeesite/issues/518" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeesite:jeesite:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6C335A4-A2F6-43E7-A432-2568E1D3460B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/thinkgem/jeesite/issues/518
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thinkgem", "jeesite" ]
管理员角色对普通用户是不可见的,但是普通用户可以通过id来删除管理员的角色信息,以下展示了普通用户请求url:http://localhost:8080/jeesite/a/sys/user/delete?id=2 删除id为2的管理员的角色信息 The administrator role is not visible to regular users, but regular users can still delete the administrator's role information by using the 'id'. The following shows an example of a regular user...
普通用户可以删除不可见的管理员信息
https://api.github.com/repos/thinkgem/jeesite/issues/518/comments
0
2023-07-19T17:14:34Z
2023-07-19T17:14:34Z
https://github.com/thinkgem/jeesite/issues/518
1,812,369,969
518
CVE-2023-38990
2023-08-02T00:15:18.293
An issue in the delete function in the MenuController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete menus created by the Administrator.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/thinkgem/jeesite/issues/519" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeesite:jeesite:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6C335A4-A2F6-43E7-A432-2568E1D3460B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/thinkgem/jeesite/issues/519
[ "Exploit", "Vendor Advisory" ]
github.com
[ "thinkgem", "jeesite" ]
济南综合部这个普通用户可以随意删除管理员用户创建的菜单。 The ordinary user "济南综合部" can freely delete menus created by administrator users. 问题代码发生在com.thinkgem.jeesite.modules.sys.web.MenuController中的delete方法中 The problematic code occurs in the 'delete' method of the 'MenuController' class in com.thinkgem.jeesite.modules.sys.web. 这里登录济南综合部...
济南市场部随意删除菜单信息
https://api.github.com/repos/thinkgem/jeesite/issues/519/comments
0
2023-07-20T17:14:46Z
2023-07-20T17:14:46Z
https://github.com/thinkgem/jeesite/issues/519
1,814,459,162
519
CVE-2023-39113
2023-08-02T23:15:10.413
ngiflib commit fb271 was discovered to contain a segmentation violation via the function "main" at gif2tag.c. This vulnerability is triggered when running the program gif2tga.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/miniupnp/ngiflib/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ngiflib_project:ngiflib:*:*:*:*:*:*:*:*", "matchCriteriaId": "C43BC274-1B97-4506-AE3C-3A4CDA665FF7", "versionEndExcluding": "2023-07-14", "versionEndIncluding": null, "versio...
https://github.com/miniupnp/ngiflib/issues/27
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "miniupnp", "ngiflib" ]
### Description SEGV on unknown address has occurred when running program gif2tga in function main at gif2tga.c:169:5 ### Version ``` commit fb2713a548a530c13f14b586a479818cb0182a5e (HEAD -> master, origin/master, origin/HEAD) Author: Thomas Bernard <miniupnp@free.fr> Date: Thu Jun 29 23:35:16 2023 +0200 ```...
SEGV on unknown address has occurred when running program gif2tga in function main at gif2tag.c
https://api.github.com/repos/miniupnp/ngiflib/issues/27/comments
1
2023-07-10T03:57:53Z
2023-07-14T23:48:31Z
https://github.com/miniupnp/ngiflib/issues/27
1,795,888,010
27
CVE-2023-38991
2023-08-04T00:15:13.870
An issue in the delete function in the ActModelController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete models created by the Administrator.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/thinkgem/jeesite/issues/520" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeesite:jeesite:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C6C335A4-A2F6-43E7-A432-2568E1D3460B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/thinkgem/jeesite/issues/520
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "thinkgem", "jeesite" ]
济南综合部这个普通用户可以随意删除管理员用户创建的模型。 The ordinary user "济南综合部" can freely delete models created by administrator users. 问题代码发生在com.thinkgem.jeesite.modules.act.web.ActModelController 中的delete方法中 The problematic code occurs in the 'delete' method of the 'ActModelController' class in com.thinkgem.jeesite.modules.sys.web. ...
普通用户可以随意删除管理员用户创建的模型
https://api.github.com/repos/thinkgem/jeesite/issues/520/comments
0
2023-07-20T17:40:10Z
2023-07-20T17:40:10Z
https://github.com/thinkgem/jeesite/issues/520
1,814,496,355
520
CVE-2023-38686
2023-08-04T16:15:10.550
Sydent is an identity server for the Matrix communications protocol. Prior to version 2.5.6, if configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a man-in-the-middle (MITM) attack. Attackers with privileged access to the ne...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", ...
[ { "source": "security-advisories@github.com", "tags": [ "Technical Description" ], "url": "https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:matrix:sydent:*:*:*:*:*:*:*:*", "matchCriteriaId": "591FD375-A95C-4A68-A63F-E7DC33B4533A", "versionEndExcluding": "2.5.6", "versionEndIncluding": null, "versionStartExcluding...
https://github.com/python/cpython/issues/91826
[ "Issue Tracking" ]
github.com
[ "python", "cpython" ]
**Feature or enhancement** I was [surprised](https://twitter.com/the_compiler/status/1517456299260362752) that Python does not verify hostnames by default for the stdlib modules for SMTP, IMAP, FTP, POP and NNTP. I believe the "insecure by default" behavior is no longer appropriate even for those protocol (at least ...
Enable TLS certificate validation by default for SMTP/IMAP/FTP/POP/NNTP protocols
https://api.github.com/repos/python/cpython/issues/91826/comments
25
2022-04-22T15:50:14Z
2024-01-04T11:23:39Z
https://github.com/python/cpython/issues/91826
1,212,522,412
91,826
CVE-2023-36095
2023-08-05T03:15:13.580
An issue in Harrison Chase langchain v.0.0.194 allows an attacker to execute arbitrary code via the python exec calls in the PALChain, affected functions include from_math_prompt and from_colored_object_prompt.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://langchain.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/hwchase17/langchain" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.194:*:*:*:*:*:*:*", "matchCriteriaId": "7186FBDD-894A-41C2-A682-D7B2B95107C9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/langchain-ai/langchain/issues/5872
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "langchain-ai", "langchain" ]
### System Info langchain version: `0.0.194` os: `ubuntu 20.04` python: `3.9.13` ### Who can help? _No response_ ### Information - [ ] The official example notebooks/scripts - [X] My own modified scripts ### Related Components - [ ] LLMs/Chat Models - [ ] Embedding Models - [ ] Prompts / Promp...
Prompt injection which leads to arbitrary code execution in `langchain.chains.PALChain`
https://api.github.com/repos/langchain-ai/langchain/issues/5872/comments
5
2023-06-08T08:45:37Z
2023-08-29T16:31:34Z
https://github.com/langchain-ai/langchain/issues/5872
1,747,393,600
5,872
CVE-2020-24187
2023-08-11T14:15:10.237
An issue was discovered in ecma-helpers.c in jerryscript version 2.3.0, allows local attackers to cause a denial of service (DoS) (Null Pointer Dereference).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/jerryscript/NULL-dereference-ecma_get_lex_env_type" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "BCC6C843-EE98-4852-8D03-7FC19D2E821C", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/4076
[ "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision commit : https://github.com/jerryscript-project/jerryscript/commit/227007eda75d86db1bb32ea380cf9650122d6920 version : v2.3.0 ###### Build platform Ubuntu 16.04.1 LTS (4.15.0-45-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off -...
Memory corruption in in ecma_get_lex_env_type (jerryscript/jerry-core/ecma/base/ecma-helpers.c:276)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4076/comments
0
2020-07-28T06:48:28Z
2020-07-31T15:19:06Z
https://github.com/jerryscript-project/jerryscript/issues/4076
666,814,219
4,076
CVE-2020-24221
2023-08-11T14:15:10.297
An issue was discovered in GetByte function in miniupnp ngiflib version 0.4, allows local attackers to cause a denial of service (DoS) via crafted .gif file (infinite loop).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/miniupnp/ngiflib/issues/17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniupnp_project:ngiflib:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5BE2BAA9-5D76-4039-A655-3F478ED5D601", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
https://github.com/miniupnp/ngiflib/issues/17
[ "Exploit", "Vendor Advisory" ]
github.com
[ "miniupnp", "ngiflib" ]
I used the command line gif2tga --outbase /dev/null path_to_file to run gif2tga and got a timeout. The program didn't return or repsond. The system is ubuntu 16.04.6 amd-64, source commit id is: 0245fd44cc5f8b084762cd5baa034239f0e952d9 compiled by gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.12) debug ...
I found a large or infinite loop in ngiflib
https://api.github.com/repos/miniupnp/ngiflib/issues/17/comments
2
2020-08-01T12:34:50Z
2021-08-11T13:46:57Z
https://github.com/miniupnp/ngiflib/issues/17
670,832,884
17
CVE-2020-24922
2023-08-11T14:15:10.627
Cross Site Request Forgery (CSRF) vulnerability in xxl-job-admin/user/add in xuxueli xxl-job version 2.2.0, allows remote attackers to execute arbitrary code and esclate privileges via crafted .html file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/xuxueli/xxl-job/issues/1921" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7AE69F1-6781-47B8-933D-989F4EF5ED19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/xuxueli/xxl-job/issues/1921
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "xuxueli", "xxl-job" ]
After the administrator logged in, open the following a page poc: one.html---add a admin ``` <html><body> <script type="text/javascript"> function post(url,fields) { var p = document.createElement("form"); p.action = url; p.innerHTML = fields; p.target = "_self"; p.method = "post"; document.body.appendChil...
There is a CSRF vulnerability that can add the administrator account
https://api.github.com/repos/xuxueli/xxl-job/issues/1921/comments
0
2020-08-22T04:23:06Z
2020-08-22T04:23:06Z
https://github.com/xuxueli/xxl-job/issues/1921
683,924,702
1,921
CVE-2020-24950
2023-08-11T14:15:10.690
SQL Injection vulnerability in file Base_module_model.php in Daylight Studio FUEL-CMS version 1.4.9, allows remote attackers to execute arbitrary code via the col parameter to function list_items.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/daylightstudio/FUEL-CMS/issues/562" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "EA87F758-58A0-409A-910F-46A592120B0B", "versionEndExcluding": null, "versionEndIncluding": null, "version...
https://github.com/daylightstudio/FUEL-CMS/issues/562
[ "Exploit", "Vendor Advisory" ]
github.com
[ "daylightstudio", "FUEL-CMS" ]
#### Environment Version: 1.4.9 #### Vulnerability Parameter Name:col Parameter Type: GET Attack Pattern: extractvalue(1,concat(char(126),(select/**/current_user()))) #### Step step 1 ![Snip20200825_6](https://user-images.githubusercontent.com/22740508/91111884-32dbf880-e6b4-11ea-84f1-14b804918449.png)...
Vulnerability - SQL Injection
https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/562/comments
2
2020-08-25T01:24:52Z
2020-09-23T16:44:49Z
https://github.com/daylightstudio/FUEL-CMS/issues/562
685,086,783
562
CVE-2020-28848
2023-08-11T14:15:11.170
CSV Injection vulnerability in ChurchCRM version 4.2.0, allows remote attackers to execute arbitrary code via crafted CSV file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM/CRM/issues/5465" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EDB0F0E9-42D2-41C7-98DB-CA0E67B98DC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/ChurchCRM/CRM/issues/5465
[ "Exploit", "Issue Tracking" ]
github.com
[ "ChurchCRM", "CRM" ]
**Vulnerability Name:** CSV Injection/ Formula Injection **Severity:** High **Description:** CSV Injection (aka Excel Macro Injection or Formula Injection) exists in List Event Types feature in ChurchCRM v4.2.0 via Name field that is mistreated while exporting to a CSV file. **Impact:** Arbitrary formulas can be inj...
CSV Injection Vulnerability
https://api.github.com/repos/ChurchCRM/CRM/issues/5465/comments
7
2020-10-24T05:01:52Z
2024-01-08T02:08:20Z
https://github.com/ChurchCRM/CRM/issues/5465
728,661,432
5,465
CVE-2020-28849
2023-08-11T14:15:11.237
Cross Site Scripting (XSS) vulnerability in ChurchCRM version 4.2.1, allows remote attckers to execute arbitrary code and gain sensitive information via crafted payload in Add New Deposit field in View All Deposit module.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/ChurchCRM/CRM/issues/5477" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B81A55D-F3F1-4217-BAED-3DC4A7F24DF9", "versionEndExcluding": null, "versionEndIncluding": "4.2.1", "versionStartExc...
https://github.com/ChurchCRM/CRM/issues/5477
[ "Exploit", "Issue Tracking" ]
github.com
[ "ChurchCRM", "CRM" ]
**Name:** Stored Cross Site Scripting leading to Remote File Inclusion vulnerability **Description:** ChurchCRM application allows stored XSS , via 'Add new Deposit' module, that is rendered upon 'View All Deposits' page visit. Cross Site Scripting (also referred to as XSS) is a vulnerability that allows an attacker...
Cross Site Scripting Vulnerability leading to Remote File Inclusion
https://api.github.com/repos/ChurchCRM/CRM/issues/5477/comments
5
2020-10-29T13:29:35Z
2024-03-04T02:13:11Z
https://github.com/ChurchCRM/CRM/issues/5477
732,315,548
5,477
CVE-2023-38860
2023-08-15T17:15:11.737
An issue in LangChain v.0.0.231 allows a remote attacker to execute arbitrary code via the prompt parameter.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/hwchase17/langchain/issues/7641" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.231:*:*:*:*:*:*:*", "matchCriteriaId": "F477D71B-7192-463A-94B4-99EB77D322C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/hwchase17/langchain/issues/7641
[ "Exploit", "Issue Tracking" ]
github.com
[ "hwchase17", "langchain" ]
### System Info LangChain 0.0.231, Windows 10, Python 3.10.11 ### Who can help? _No response_ ### Information - [X] The official example notebooks/scripts - [ ] My own modified scripts ### Related Components - [ ] LLMs/Chat Models - [ ] Embedding Models - [ ] Prompts / Prompt Templates / Prompt Selectors - [ ] O...
RCE vulnerability in CPAL (causal program-aided language) chain
https://api.github.com/repos/langchain-ai/langchain/issues/7641/comments
1
2023-07-13T07:26:31Z
2023-08-29T18:44:50Z
https://github.com/langchain-ai/langchain/issues/7641
1,802,378,837
7,641
CVE-2023-38898
2023-08-15T17:15:12.187
An issue in Python cpython v.3.7 allows an attacker to obtain sensitive information via the _asyncio._swap_current_task component. NOTE: this is disputed by the vendor because (1) neither 3.7 nor any other release is affected (it is a bug in some 3.12 pre-releases); (2) there are no common scenarios in which an adversa...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/python/cpython/issues/105987" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:3.13.0:alpha0:*:*:*:*:*:*", "matchCriteriaId": "3BA51E41-D221-431F-870F-536AF2867B50", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
https://github.com/python/cpython/issues/105987
[ "Exploit", "Issue Tracking", "Patch" ]
github.com
[ "python", "cpython" ]
First appeared in a474e04388c2ef6aca75c26cb70a1b6200235feb, where given function was introduced. Repro: ```python import _asyncio class DummyLoop: pass class DummyTask: pass l = DummyLoop() _asyncio._swap_current_task(l, DummyTask()) t = _asyncio._swap_current_task(l, None) ``` Output: ``` ...
Crash in `_asyncio._swap_current_task` due to improper reference counting
https://api.github.com/repos/python/cpython/issues/105987/comments
0
2023-06-22T14:41:40Z
2023-06-26T08:24:45Z
https://github.com/python/cpython/issues/105987
1,769,831,570
105,987
CVE-2023-39659
2023-08-15T17:15:12.930
An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/langchain-ai/langchain/issues/7700" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAFE4797-0C2C-4BBF-87A5-8747A3539923", "versionEndExcluding": null, "versionEndIncluding": "0.0.232", "versionStartE...
https://github.com/langchain-ai/langchain/issues/7700
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "langchain-ai", "langchain" ]
### System Info langchain: 0.0.232 os: ubuntu 20.04 python: 3.9.13 ### Who can help? _No response_ ### Information - [ ] The official example notebooks/scripts - [X] My own modified scripts ### Related Components - [ ] LLMs/Chat Models - [ ] Embedding Models - [ ] Prompts / Prompt Templates / ...
Prompt injection which leads to arbitrary code execution
https://api.github.com/repos/langchain-ai/langchain/issues/7700/comments
5
2023-07-14T10:11:00Z
2023-10-27T19:17:54Z
https://github.com/langchain-ai/langchain/issues/7700
1,804,604,289
7,700
CVE-2023-38905
2023-08-17T19:15:12.873
SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a local attacker to cause a denial of service via the Benchmark, PG_Sleep, DBMS_Lock.Sleep, Waitfor, DECODE, and DBMS_PIPE.RECEIVE_MESSAGE functions.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/wealeson1/e24fc8575f4e051320d69e9a75080642" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jeec...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CCC4761-FDE8-4C1D-99BA-74DB3DEB267A", "versionEndExcluding": null, "versionEndIncluding": "3.5.0", "versionStartExclud...
https://github.com/jeecgboot/jeecg-boot/issues/4737
[ "Exploit", "Issue Tracking" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.5.0 ##### 前端版本:vue3版?还是 vue2版? vue3版 ##### 问题描述: /sys/duplicate/check 接口SQL注入,checksql可以被绕过。 ##### 截图&代码: 延时10秒。 <img width="1165" alt="image" src="https://user-images.githubusercontent.com/46522822/226792979-cf92d1d9-4579-433e-af85-1cb901480015.png"> 不延时。 <img width="1173" alt="image" src=...
[CVE-2023-38905] sys/duplicate/check SQL注入
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/4737/comments
4
2023-03-22T03:23:48Z
2023-09-04T09:30:59Z
https://github.com/jeecgboot/JeecgBoot/issues/4737
1,634,994,366
4,737
CVE-2023-4446
2023-08-21T01:15:10.320
A vulnerability, which was classified as critical, was found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file template/default/category.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/OpenRapid/rapidcms/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/OpenRapid/rapidcms/issues/3
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "OpenRapid", "rapidcms" ]
RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in `template/default/category.php` . For more details, see: [RapidCMS-SQLi-1.pdf](https://github.com/OpenRapid/rapidcms/files/12329060/RapidCMS-SQLi-1.pdf)
SQL injection vulnerability exists in RapidCMS Dev.1.3.1
https://api.github.com/repos/OpenRapid/rapidcms/issues/3/comments
0
2023-08-13T08:23:15Z
2023-08-13T08:24:48Z
https://github.com/OpenRapid/rapidcms/issues/3
1,848,481,794
3
CVE-2023-4447
2023-08-21T02:15:10.120
A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. This vulnerability affects unknown code of the file admin/article-chat.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be use...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/OpenRapid/rapidcms/issues/4" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://vuldb.com/?cti...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/OpenRapid/rapidcms/issues/4
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "OpenRapid", "rapidcms" ]
RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in `admin/article-chat.php` . For more details, see: [RapidCMS-SQLi-2.pdf](https://github.com/OpenRapid/rapidcms/files/12329065/RapidCMS-SQLi-2.pdf)
SQL injection vulnerability exists in RapidCMS Dev.1.3.1
https://api.github.com/repos/OpenRapid/rapidcms/issues/4/comments
0
2023-08-13T08:26:23Z
2023-08-13T08:26:23Z
https://github.com/OpenRapid/rapidcms/issues/4
1,848,482,818
4
CVE-2023-4448
2023-08-21T02:15:10.227
A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to th...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/OpenRapid/rapidcms/commit/4dff387283060961c362d50105ff8da8ea40bcbe#diff-fc57d4c69cf5912c6edb5233c6df069a91106ebd481c115faf1ea124478b26d0" }, { "source": "cna@vuldb.com", "tags": [ "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/OpenRapid/rapidcms/issues/5
[ "Issue Tracking", "Patch" ]
github.com
[ "OpenRapid", "rapidcms" ]
RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`. For more details, see: [RapidCMS-PasswordReset.pdf](https://github.com/OpenRapid/rapidcms/files/12329073/RapidCMS-PasswordReset.pdf)
Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1
https://api.github.com/repos/OpenRapid/rapidcms/issues/5/comments
1
2023-08-13T08:32:42Z
2023-08-14T06:42:27Z
https://github.com/OpenRapid/rapidcms/issues/5
1,848,485,398
5
CVE-2023-38961
2023-08-21T17:15:47.973
Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0.0 allows a remote attacker to execute arbitrary code via the scanner_is_context_needed component in js-scanner-until.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5092" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
https://github.com/jerryscript-project/jerryscript/issues/5092
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: https://github.com/jerryscript-project/jerryscript/commit/05dbbd134c3b9e2482998f267857dd3722001cd7 Version: v3.0.0 ###### Build platform Ubuntu 20.04.5 LTS (Linux 5.4.0-144-generic x86_64) ###### Build steps ```sh python ./tools/build.py --clean --compile-flag=-m32 --compi...
heap-buffer-overflow in scanner_is_context_needed
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5092/comments
0
2023-06-24T08:32:20Z
2023-06-24T08:32:20Z
https://github.com/jerryscript-project/jerryscript/issues/5092
1,772,536,756
5,092
CVE-2021-40211
2023-08-22T19:16:21.427
An issue was discovered with ImageMagick 7.1.0-4 via Division by zero in function ReadEnhMetaFile of coders/emf.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/4097" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.1.0-4:*:*:*:*:*:*:*", "matchCriteriaId": "7C1767C6-89C1-4D1E-93E0-AC04EF098E16", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
https://github.com/ImageMagick/ImageMagick/issues/4097
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0 ### Operating system All system ### Operating system, version and so on All system,the latest version ### Description pBits can be controlled by an attacker,a division-by-zero exception can happen in function ReadEnhMetaFile() of coders/emf.c at line 428,431. ![222]...
Division by zero in ReadEnhMetaFile() of coders/emf.c
https://api.github.com/repos/ImageMagick/ImageMagick/issues/4097/comments
0
2021-08-21T07:53:53Z
2021-08-21T11:34:44Z
https://github.com/ImageMagick/ImageMagick/issues/4097
976,075,255
4,097
CVE-2022-48541
2023-08-22T19:16:31.443
A memory leak in ImageMagick 7.0.10-45 and 6.9.11-22 allows remote attackers to perform a denial of service via the "identify -help" command.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/2889" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg000...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:6.9.11-22:*:*:*:*:*:*:*", "matchCriteriaId": "C5EDF13D-9DE8-4890-82CD-E6977434E531", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
https://github.com/ImageMagick/ImageMagick/issues/2889
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/ImageMagick/ImageMagick/issues) and [closed](https://github.com/ImageMagick/ImageMagick/issues?q=is%3Aissue+is%3Aclosed) issues to...
Memory leak in identify -help
https://api.github.com/repos/ImageMagick/ImageMagick/issues/2889/comments
1
2020-11-30T15:25:48Z
2020-11-30T17:44:27Z
https://github.com/ImageMagick/ImageMagick/issues/2889
753,571,210
2,889
CVE-2022-48570
2023-08-22T19:16:32.157
Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality re...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/992" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/weidai1...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA9C8B3-FB1A-4E7F-A316-DACCCF660D08", "versionEndExcluding": null, "versionEndIncluding": "8.4.0", "versionStartE...
https://github.com/weidai11/cryptopp/issues/992
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
github.com
[ "weidai11", "cryptopp" ]
@dwmcrobb discovered a latent bug in `FixedSizeSecBlock`. It was reported at [GH #988](https://github.com/weidai11/cryptopp/issues/988). In the 988 bug we fixed the pointer problem and cleaned up the class. Since the `FixedSizeSecBlock` overhaul we started seeing failures on AppVeyor, which tests the Windows gear. F...
AppVeyor failures after fixing FixedSizeSecBlock
https://api.github.com/repos/weidai11/cryptopp/issues/992/comments
29
2020-12-28T11:39:40Z
2021-03-17T22:01:10Z
https://github.com/weidai11/cryptopp/issues/992
775,357,638
992
CVE-2023-36281
2023-08-22T19:16:36.457
An issue in langchain v.0.0.171 allows a remote attacker to execute arbitrary code via a JSON file to load_prompt. This is related to __subclasses__ or a template.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://aisec.today/LangChain-2e6244a313dd46139c5ef28cbcab9e55" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.171:*:*:*:*:*:*:*", "matchCriteriaId": "D8235D79-2666-4DEE-B6A2-A5DE48FB42C6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/hwchase17/langchain/issues/4394
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "hwchase17", "langchain" ]
### System Info windows 11 ### Who can help? _No response_ ### Information - [X] The official example notebooks/scripts - [ ] My own modified scripts ### Related Components - [ ] LLMs/Chat Models - [ ] Embedding Models - [X] Prompts / Prompt Templates / Prompt Selectors - [ ] Output Parsers - ...
Template injection to arbitrary code execution
https://api.github.com/repos/langchain-ai/langchain/issues/4394/comments
4
2023-05-09T12:28:24Z
2023-10-10T15:15:44Z
https://github.com/langchain-ai/langchain/issues/4394
1,701,910,416
4,394
CVE-2023-38666
2023-08-22T19:16:39.170
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4encrypt.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/784" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*", "matchCriteriaId": "A003FBD1-339C-409D-A304-7FEE97E23250", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/axiomatic-systems/Bento4/issues/784
[ "Exploit", "Issue Tracking" ]
github.com
[ "axiomatic-systems", "Bento4" ]
# Summary Hi, developers of Bento4: I tested the binary mp4encrypt with my fuzzer, and a crash incurred—SEGV on unknown address. The following is the details. # Bug Detected SEGV on unknown address in mp4encrypt. ``` root@2e47aa8b3277:/fuzz-mp4encrypt-ACBC/mp4encrypt# ./mp4encrypt --method MARLIN-IPMP-ACBC .....
SEGV on unknown address 0x000000000028 in mp4encrypt
https://api.github.com/repos/axiomatic-systems/Bento4/issues/784/comments
0
2022-10-02T04:35:03Z
2023-05-29T02:51:17Z
https://github.com/axiomatic-systems/Bento4/issues/784
1,393,638,825
784
CVE-2023-41105
2023-08-23T07:15:08.590
An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but t...
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/python/cpython/issues/106242" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/python/cpython/pull/107981" }, { "source": "cve@m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "matchCriteriaId": "445B042E-9410-42E8-8749-A5EAEF2FF93D", "versionEndExcluding": null, "versionEndIncluding": "3.11.4", "versionStartExcludin...
https://github.com/python/cpython/issues/106242
[ "Issue Tracking", "Patch" ]
github.com
[ "python", "cpython" ]
# Bug report Looks like `posix._path_normpath` has slightly different behaviour to the python implementation of `normpath` defined in `posixpath`, as such `os.path.normpath` behaves differently on Python 3.11 (where `posix._path_normpath` is used if it exists) vs 3.10 on posix systems: Python 3.10: ```python >>...
os.path.normpath truncates input on null bytes in 3.11, but not 3.10
https://api.github.com/repos/python/cpython/issues/106242/comments
9
2023-06-29T12:51:07Z
2023-08-28T14:00:55Z
https://github.com/python/cpython/issues/106242
1,780,762,234
106,242
CVE-2023-39562
2023-08-28T19:15:07.747
GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to contain a heap-use-after-free via the gf_bs_align function at bitstream.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ChanStormstout/Pocs/blob/master/gpac_POC/id%3A000000%2Csig%3A06%2Csrc%3A003771%2Ctime%3A328254%2Cexecs%3A120473%2Cop%3Ahavoc%2Crep%3A8" }, { "source": "cve@mitre.org", "tags": [ "Explo...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:2.3:2.3-dev-rev449-g5948e4f70-master:*:*:*:*:*:*", "matchCriteriaId": "EE4D79B3-5867-4201-AB50-8CF590E4260B", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/gpac/gpac/issues/2537
[ "Exploit", "Issue Tracking" ]
github.com
[ "gpac", "gpac" ]
# Description While fuzzing yasm, a "heap-use-after-free" crash occurs,which was positioned in /gpac/src/utils/bitstream.c:1225:19 in gf_bs_align. This bug may allow attackers to cause remote malicious code execution and denial of service via crafted files. # Software version info ``` /AFLplusplus/my_test/fuzz_g...
A `heap-use-after-free` crash in bitstream.c:1225:19 in gf_bs_align
https://api.github.com/repos/gpac/gpac/issues/2537/comments
0
2023-07-24T13:14:16Z
2023-07-24T14:34:56Z
https://github.com/gpac/gpac/issues/2537
1,818,405,399
2,537
CVE-2023-40781
2023-08-28T22:15:09.157
Buffer Overflow vulnerability in Libming Libming v.0.4.8 allows a remote attacker to cause a denial of service via a crafted .swf file to the makeswf function.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/libming/libming/issues/288" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
https://github.com/libming/libming/issues/288
[ "Issue Tracking", "Patch" ]
github.com
[ "libming", "libming" ]
A heap buffer overflow occurs when makeswf parse a invalid swf file, and the filename extension is `.swf`. ## Test Environment Ubuntu 20.04, 64 bit libming (master 04aee52) ## Steps to reproduce 1. compile libming with ASAN ``` $ CC="clang -fsanitize=address,fuzzer-no-link -g" CFLAGS+=" -fcommon" ./configu...
heap-buffer-overflow in r_readc() at fromswf.c:264
https://api.github.com/repos/libming/libming/issues/288/comments
0
2023-08-09T02:43:36Z
2023-08-09T02:43:36Z
https://github.com/libming/libming/issues/288
1,842,363,544
288
CVE-2023-40969
2023-09-01T11:15:42.800
Senayan Library Management Systems SLIMS 9 Bulian v9.6.1 is vulnerable to Server Side Request Forgery (SSRF) via admin/modules/bibliography/pop_p2p.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SSRF-pop_p2p.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/s...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "548C3132-1CC1-446F-90FC-3411038DFAAB", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/slims/slims9_bulian/issues/204
[ "Exploit", "Issue Tracking" ]
github.com
[ "slims", "slims9_bulian" ]
# The bug A Server Side Request Forgery exists in `admin/modules/bibliography/pop_p2p.php` at the code below ```php $detail_uri = $_GET['uri'] . "/index.php?p=show_detail&inXML=true&id=" . $_GET['biblioID']; // parse XML $data = modsXMLsenayan($detail_uri, 'uri'); ``` # To Reproduce **Steps to reproduce t...
[Security Bugs] Server Side Request Forgery at pop_p2p.php
https://api.github.com/repos/slims/slims9_bulian/issues/204/comments
2
2023-08-17T17:57:57Z
2023-08-30T07:30:34Z
https://github.com/slims/slims9_bulian/issues/204
1,855,462,115
204
CVE-2023-40970
2023-09-01T11:15:42.923
Senayan Library Management Systems SLIMS 9 Bulian v 9.6.1 is vulnerable to SQL Injection via admin/modules/circulation/loan_rules.php.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-loan_rules.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.co...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slims:senayan_library_management_system:9.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "548C3132-1CC1-446F-90FC-3411038DFAAB", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/slims/slims9_bulian/issues/205
[ "Exploit", "Issue Tracking" ]
github.com
[ "slims", "slims9_bulian" ]
# The bug A SQL Injection exists in `admin/modules/circulation/loan_rules.php` at the code below ```php /* RECORD OPERATION */ if (isset($_POST['saveData'])) { $data['member_type_id'] = $_POST['memberTypeID']; $data['coll_type_id'] = $_POST['collTypeID']; $data['gmd_id'] = $_POST['gmdID']; $da...
[Security Bugs] SQL Injection at loan_rules.php
https://api.github.com/repos/slims/slims9_bulian/issues/205/comments
3
2023-08-18T14:09:37Z
2023-09-01T06:50:58Z
https://github.com/slims/slims9_bulian/issues/205
1,856,790,763
205
CVE-2023-36100
2023-09-01T16:15:07.967
An issue was discovered in IceCMS version 2.0.1, allows attackers to escalate privileges and gain sensitive information via UserID parameter in api/User/ChangeUser.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Thecosy/IceCMS/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macwk:icecms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8043F07-E915-49DC-A4D8-DC34AC2B9770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Thecosy/IceCMS/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Thecosy", "IceCMS" ]
api:/api/User/ChangeUser/(self_token) Calling this interface, we can modify the information of any user by modifying the UserID field.there will be no validation ![image](https://github.com/Thecosy/IceCMS/assets/93959921/cefd80d4-27c4-40ef-b46e-83b763d6b706) Try to log in to user test39, it goes well ![image](https...
Vulnerabilities that allow arbitrary information traversal and modification by any user
https://api.github.com/repos/Thecosy/IceCMS/issues/15/comments
2
2023-06-08T09:14:09Z
2023-06-12T10:06:59Z
https://github.com/Thecosy/IceCMS/issues/15
1,747,451,208
15
CVE-2023-39631
2023-09-01T16:15:08.370
An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary code via the evaluate function in the numexpr library.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/langchain-ai/langchain/issues/8363" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:langchain:langchain:0.0.245:*:*:*:*:*:*:*", "matchCriteriaId": "6573CC2E-2720-44F4-B560-17D6A56BDD3F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/langchain-ai/langchain/issues/8363
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "langchain-ai", "langchain" ]
### System Info Langchain version: 0.0.244 Numexpr version: 2.8.4 Python version: 3.10.11 ### Who can help? @hwchase17 @vowelparrot ### Information - [ ] The official example notebooks/scripts - [ ] My own modified scripts ### Related Components - [ ] LLMs/Chat Models - [ ] Embedding Models - [ ] Prompts / ...
Arbitrary code execution in LLMMathChain
https://api.github.com/repos/langchain-ai/langchain/issues/8363/comments
33
2023-07-27T16:00:56Z
2024-03-13T16:12:31Z
https://github.com/langchain-ai/langchain/issues/8363
1,824,692,692
8,363
CVE-2023-42268
2023-09-08T19:15:44.200
Jeecg boot up to v3.5.3 was discovered to contain a SQL injection vulnerability via the component /jeecg-boot/jmreport/show.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/5311" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB2E1EE1-D408-4689-8A4F-CDF2C09DAC83", "versionEndExcluding": null, "versionEndIncluding": "3.5.3", "versionStartExclud...
https://github.com/jeecgboot/jeecg-boot/issues/5311
[ "Exploit", "Issue Tracking" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### 版本号: 3.5.3 ##### 前端版本:vue3版?还是 vue2版? vue3 ##### 问题描述: /jeecg-boot/jmreport/show接口存在sql注入,攻击者可以利用布尔盲注绕过防护。 ##### 截图&代码: org/jeecg/modules/jmreport/common/b/i.class ![1](https://cosmoslin.oss-cn-chengdu.aliyuncs.com/img2/%E6%88%AA%E5%B1%8F2023-08-25%2022.29.49-2974060.png) 黑名单如下:" exec |peformance_s...
jeecgboot3.5.3 存在未授权sql注入(布尔盲注绕过)
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/5311/comments
5
2023-08-25T14:24:01Z
2023-09-21T03:43:26Z
https://github.com/jeecgboot/JeecgBoot/issues/5311
1,867,152,632
5,311
CVE-2023-42276
2023-09-08T22:15:11.740
hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonArray.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dromara/hutool/issues/3286" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*", "matchCriteriaId": "EBFA93D9-F18F-4939-BF26-89603CD7148D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/dromara/hutool/issues/3286
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: 1.8.0_362 hutool版本: 5.8.21 ### 问题描述(包括截图) 1. 复现代码 ```java import cn.hutool.json.JSONObject; public class JSONObjectTest { public static void main(String[] args) { JSONArray jSONArray = new JSONArray(); Object element = new Object(); jSONArray.add(1...
`JSONArray`的`add()`方法抛出OutOfMemory异常
https://api.github.com/repos/dromara/hutool/issues/3286/comments
2
2023-08-30T09:51:25Z
2023-09-12T03:28:46Z
https://github.com/dromara/hutool/issues/3286
1,873,333,053
3,286
CVE-2023-42277
2023-09-08T22:15:11.863
hutool v5.8.21 was discovered to contain a buffer overflow via the component jsonObject.putByPath.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dromara/hutool/issues/3285" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*", "matchCriteriaId": "EBFA93D9-F18F-4939-BF26-89603CD7148D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/dromara/hutool/issues/3285
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: 1.8.0_362 hutool版本: 5.8.21 ### 问题描述(包括截图) 1. 复现代码 ```java import cn.hutool.json.JSONObject; public class JSONObjectTest { public static void main(String[] args) { JSONObject jSONObject = new JSONObject(); Object value = new Object(); jSONObject.putBy...
`putByPath()`方法抛出OutOfMemory异常
https://api.github.com/repos/dromara/hutool/issues/3285/comments
1
2023-08-30T08:22:07Z
2023-08-30T13:52:31Z
https://github.com/dromara/hutool/issues/3285
1,873,179,897
3,285
CVE-2023-42278
2023-09-08T22:15:12.037
hutool v5.8.21 was discovered to contain a buffer overflow via the component JSONUtil.parse().
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/dromara/hutool/issues/3289" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hutool:hutool:5.8.21:*:*:*:*:*:*:*", "matchCriteriaId": "EBFA93D9-F18F-4939-BF26-89603CD7148D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
https://github.com/dromara/hutool/issues/3289
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "dromara", "hutool" ]
### 版本情况 JDK版本: 1.8.0_362 hutool版本: 5.8.21 ### 问题描述(包括截图) 1. 复现代码 ```java import cn.hutool.json.JSONUtil; public class JSONOUtilTest { public static void main(String[] args) { String s = "{\"G\":00,[,,[0E5,6E9,6E5,6E9,6E5,6E9,6E5,6E9,6E9,6E5,true,6E5,6E9,6E5,6E9,6956,EE,5E9,6E5,RE,6E9...
`JSONUtil.parse()`方法解析特定输入时,会导致服务挂起和崩溃,存在安全隐患
https://api.github.com/repos/dromara/hutool/issues/3289/comments
5
2023-09-04T02:58:25Z
2023-09-14T07:12:52Z
https://github.com/dromara/hutool/issues/3289
1,879,420,551
3,289
CVE-2023-41000
2023-09-11T15:16:02.307
GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2550" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF", "versionEndExcluding": null, "versionEndIncluding": "2.2.1", "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2550
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [Y ] I looked for a similar issue and couldn't find any. - [Y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [Y] I give enough information for contributors to reproduce my issue **Description** There is a Null Pointer Dereference detected by Ad...
Null Pointer Dereference in function BS_ReadByte
https://api.github.com/repos/gpac/gpac/issues/2550/comments
4
2023-08-08T07:09:38Z
2023-09-11T12:40:06Z
https://github.com/gpac/gpac/issues/2550
1,840,701,677
2,550
CVE-2023-5015
2023-09-17T02:15:07.430
A vulnerability was found in UCMS 1.4.7. It has been classified as problematic. Affected is an unknown function of the file ajax.php?do=strarraylist. The manipulation of the argument strdefault leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ucms_project:ucms:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "5498798F-9AC7-4309-B2E9-90B8959E70F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/Num-Nine/CVE/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
1.Download address: https://github.com/forget-code/ucms 2.Vulnerability file location: http://127.0.0.1/CVE-Target/ucms-master/ucms/ajax.php? do=strarraylist 3.You need to manually create the cache and uploadfile directories during program installation 4.Ucms-master /ucms/ajax.php installed successfully? do=st...
The ucms has xss
https://api.github.com/repos/QianGeG/CVE/issues/3/comments
0
2023-09-06T03:31:30Z
2023-09-06T03:31:30Z
https://github.com/QianGeG/CVE/issues/3
1,883,115,340
3
CVE-2023-5031
2023-09-18T02:15:51.220
A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/article/article-add.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/1" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory" ], "url": "https://vuldb.com/?ctiid.239875" }, { "source": "cn...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/yhy217/rapidcms-vul/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "yhy217", "rapidcms-vul" ]
**RapidCMS Dev.1.3.1 was discovered to contain SQL injection(post) vulnerability in /admin/article/article-add-run.php. ** [Vulnerability Type] SQL INJECTION [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] RapidCMS Dev.1.3.1 [Affected Component] File: /admin/article/a...
the sql injection in background of rapidcms ---1
https://api.github.com/repos/yhy217/rapidcms-vul/issues/1/comments
0
2023-09-17T09:38:55Z
2023-09-17T10:04:06Z
https://github.com/yhy217/rapidcms-vul/issues/1
1,899,721,898
1
CVE-2023-5032
2023-09-18T04:15:11.327
A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/article/article-edit-run.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/2" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/yhy217/rapidcms-vul/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yhy217", "rapidcms-vul" ]
SQL injection vulnerability exists in RapidCMS Dev.1.3.1 [Suggested description] RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /admin/article/article-edit-run.php [Vulnerability Type] SQL INJECTION [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product C...
SQL injection vulnerability exists in RapidCMS Dev.1.3.1
https://api.github.com/repos/yhy217/rapidcms-vul/issues/2/comments
0
2023-09-17T14:41:57Z
2023-09-17T14:55:15Z
https://github.com/yhy217/rapidcms-vul/issues/2
1,899,806,533
2
CVE-2023-5033
2023-09-18T05:15:07.417
A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /admin/category/cate-edit-run.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/3" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/yhy217/rapidcms-vul/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yhy217", "rapidcms-vul" ]
SQL injection vulnerability exists in RapidCMS Dev.1.3.1 [Suggested description] RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /admin/category/cate-edit-run.php [Vulnerability Type] SQL INJECTION [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] ...
SQL injection vulnerability exists in RapidCMS Dev.1.3.1 --2
https://api.github.com/repos/yhy217/rapidcms-vul/issues/3/comments
0
2023-09-17T15:10:01Z
2023-09-17T15:10:01Z
https://github.com/yhy217/rapidcms-vul/issues/3
1,899,815,211
3
CVE-2023-43616
2023-09-20T06:15:10.523
An issue was discovered in Croc through 9.6.5. A sender can cause a receiver to overwrite files during ZIP extraction.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
https://github.com/schollz/croc/issues/594
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
As mentioned in issue #593 there is a check on the receiver side of Croc whether an incoming file path will overwrite an existing file, and Croc will ask the user interactively whether it should be overwritten, if it already exists. This check works reasonably well, even if symlinks are involved. I did not look that de...
Interactive File Overwrite Prompt can be Circumvented by Sending ZIP file
https://api.github.com/repos/schollz/croc/issues/594/comments
4
2023-09-08T11:23:36Z
2024-05-20T15:33:12Z
https://github.com/schollz/croc/issues/594
1,887,485,959
594
CVE-2023-43617
2023-09-20T06:15:10.617
An issue was discovered in Croc through 9.6.5. When a custom shared secret is used, the sender and receiver may divulge parts of this secret to an untrusted Relay, as part of composing a room name.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/cr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
https://github.com/schollz/croc/issues/596
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
The leading three characters of the shared secret are implicitly used to select a common "room name" at the relay so that sender and receiver can find each other (croc.go:827, croc.go:769, croc.go:572, croc.go:483). When using shared secrets generated by Croc this is fine, because they are formatted just so that the...
Use of Parts of the Shared Secret as Room Name
https://api.github.com/repos/schollz/croc/issues/596/comments
4
2023-09-08T11:39:58Z
2024-05-20T16:08:51Z
https://github.com/schollz/croc/issues/596
1,887,513,001
596
CVE-2023-43618
2023-09-20T06:15:10.693
An issue was discovered in Croc through 9.6.5. The protocol requires a sender to provide its local IP addresses in cleartext via an ips? message.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/croc/issues/597" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
https://github.com/schollz/croc/issues/597
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
As a typical part of the Croc protocol (if no explicit `--ip` is passed), the receiver will ask the sender about its locally assigned IP addresses via the `ips?` message (croc.go:792). This message and its reply are sent unencrypted. I assume there is no encryption, because the receiver might still switch the connectio...
Unencrypted "ips?" Message Leaks Information from the Sender Side
https://api.github.com/repos/schollz/croc/issues/597/comments
4
2023-09-08T11:48:36Z
2024-05-20T16:38:45Z
https://github.com/schollz/croc/issues/597
1,887,526,520
597
CVE-2023-43619
2023-09-20T06:15:10.773
An issue was discovered in Croc through 9.6.5. A sender may send dangerous new files to a receiver, such as executable content or a .ssh/authorized_keys file.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/cr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
https://github.com/schollz/croc/issues/593
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
If more than one file is transferred via Croc then, before the transfer starts, the receiver only sees a summary line about the files about to be received, like: Accept 2 files (159 B)? (Y/n) Only after confirming this dialog the full file reception list will be printed, like: Receiving (<-[ip]:[port])...
Possible (Concealed) Creation of Files in Dangerous Path Locations
https://api.github.com/repos/schollz/croc/issues/593/comments
16
2023-09-08T11:12:32Z
2024-07-24T12:45:10Z
https://github.com/schollz/croc/issues/593
1,887,469,185
593
CVE-2023-43620
2023-09-20T06:15:10.870
An issue was discovered in Croc through 9.6.5. A sender may place ANSI or CSI escape sequences in a filename to attack the terminal device of a receiver.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrit...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/cr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
https://github.com/schollz/croc/issues/595
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
Filenames on Linux can contain arbitrary characters except for the path separator '/'. Thus filenames can also contain possibly dangerous characters like ASCII control codes (newline, linefeed, etc.) or even complete ANSI/CSI terminal escape sequences. On the Croc receiver side the filenames communicated by the send...
Escape Sequences in Filenames are not Filtered
https://api.github.com/repos/schollz/croc/issues/595/comments
5
2023-09-08T11:29:52Z
2024-07-24T12:50:32Z
https://github.com/schollz/croc/issues/595
1,887,497,669
595
CVE-2023-43621
2023-09-20T06:15:10.950
An issue was discovered in Croc through 9.6.5. The shared secret, located on a command line, can be read by local users who list all processes and their arguments.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/21/5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/schollz/cr...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schollz:croc:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B173A01-5175-444D-9651-68AD4E2C30C2", "versionEndExcluding": null, "versionEndIncluding": "9.6.5", "versionStartExcluding"...
https://github.com/schollz/croc/issues/598
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "schollz", "croc" ]
On the sender side a custom shared secret can be specified via the `croc send --code <SECRET>` command line. On the receiver side the shared secret, custom or not, is typically passed on the command line using the `croc <SECRET>` command line . The latter invocation variant is actively advocated by the output displayed...
Shared Secret Passed on Command Line Possibly Leaks to other Local Users
https://api.github.com/repos/schollz/croc/issues/598/comments
5
2023-09-08T11:55:03Z
2024-05-20T16:48:04Z
https://github.com/schollz/croc/issues/598
1,887,535,896
598
CVE-2023-42331
2023-09-20T20:15:11.853
A file upload vulnerability in EliteCMS v1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*", "matchCriteriaId": "6A277BC1-8C5E-49E5-A76C-8E1DFE30420E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/Num-Nine/CVE/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
1.Loopholes in the http://127.0.0.1/CVE-Target/elitecms/admin/manage_uploads.php 2.Upload an a.php content as <? php phpinfo(); ? > 3.Click add image 4.Go to http://127.0.0.1/CVE-Target/elitecms/uploads/a.php
Any file is uploaded to eliteCMS
https://api.github.com/repos/QianGeG/CVE/issues/2/comments
0
2023-09-04T16:12:33Z
2023-09-04T16:12:33Z
https://github.com/QianGeG/CVE/issues/2
1,880,577,320
2
CVE-2023-42331
2023-09-20T20:15:11.853
A file upload vulnerability in EliteCMS v1.01 allows a remote attacker to execute arbitrary code via the manage_uploads.php component.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "ur...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*", "matchCriteriaId": "6A277BC1-8C5E-49E5-A76C-8E1DFE30420E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
https://github.com/Num-Nine/CVE/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
null
Any file is uploaded to eliteCMS1.01
https://api.github.com/repos/QianGeG/CVE/issues/4/comments
1
2023-09-19T02:52:11Z
2023-09-19T02:56:23Z
https://github.com/QianGeG/CVE/issues/4
1,902,114,633
4
CVE-2023-36109
2023-09-20T22:15:12.750
Buffer Overflow vulnerability in JerryScript version 3.0, allows remote attackers to execute arbitrary code via ecma_stringbuilder_append_raw component at /jerry-core/ecma/base/ecma-helpers-string.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://github.com/Limesss/CVE-2023-36109/tree/main" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/5080" } ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DB8D818-8F21-4FD3-8D4D-A024A6346CB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
https://github.com/jerryscript-project/jerryscript/issues/5080
[ "Exploit", "Issue Tracking" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Version: v3.0.0 ###### Build platform Linux cqian-s2 5.4.0-148-generic #165-Ubuntu SMP Tue Apr 18 08:53:12 UTC 2023 x86_64 x86_64 x86_64 GNU/Linu ###### Build steps python ./tools/build.py --clean --debug --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-f...
==1327323==ERROR: AddressSanitizer: memcpy-param-overlap: memory ranges [0x55fb3005c209,0x55fc3005c205) and [0x55fc3005c0f8, 0x55fd3005c0f4) overlap
https://api.github.com/repos/jerryscript-project/jerryscript/issues/5080/comments
0
2023-05-10T17:32:09Z
2023-09-22T10:24:05Z
https://github.com/jerryscript-project/jerryscript/issues/5080
1,704,361,322
5,080
CVE-2023-43338
2023-09-23T00:15:20.170
Cesanta mjs v2.20.0 was discovered to contain a function pointer hijacking vulnerability via the function mjs_get_ptr(). This vulnerability allows attackers to execute arbitrary code via a crafted input.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "in...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/cesanta/mjs/issues/250" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/cesanta/mjs/issues/250
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "cesanta", "mjs" ]
# Function Pointer Hijack mjs/mjs.c in mjs_execute ## Affected Projects mjs 2.20.0 (https://github.com/cesanta/mjs) ## Problem Type CWE-822 (Untrusted Pointer Dereference) ## Description I discovered a vulnerability that could potentially lead to function pointer hijacking. I believe this is a logical vulnera...
Function Pointer Hijack mjs/mjs.c in mjs_execute
https://api.github.com/repos/cesanta/mjs/issues/250/comments
1
2023-09-17T15:24:27Z
2023-09-23T01:24:00Z
https://github.com/cesanta/mjs/issues/250
1,899,819,562
250
CVE-2023-5258
2023-09-29T12:15:13.093
A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenRapid/rapidcms/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/4" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/OpenRapid/rapidcms/issues/9
[ "Issue Tracking" ]
github.com
[ "OpenRapid", "rapidcms" ]
RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /resource/addgood.php For more details, see: https://github.com/yhy217/rapidcms-vul/issues/4
SQL injection vulnerability exists in RapidCMS Dev.1.3.1 --3
https://api.github.com/repos/OpenRapid/rapidcms/issues/9/comments
0
2023-09-18T03:27:14Z
2023-09-18T09:28:01Z
https://github.com/OpenRapid/rapidcms/issues/9
1,900,098,851
9
CVE-2023-5258
2023-09-29T12:15:13.093
A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenRapid/rapidcms/issues/9" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/4" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/yhy217/rapidcms-vul/issues/4
[ "Exploit", "Issue Tracking" ]
github.com
[ "yhy217", "rapidcms-vul" ]
[Suggested description] RapidCMS Dev.1.3.1 was discovered to contain SQL injection vulnerability in /resource/addgood.php [Vulnerability Type] SQL INJECTION [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] RapidCMS Dev.1.3.1 [Affected Component] File: /resource/a...
SQL injection vulnerability exists in RapidCMS Dev.1.3.1
https://api.github.com/repos/yhy217/rapidcms-vul/issues/4/comments
0
2023-09-18T03:26:39Z
2023-09-18T03:26:39Z
https://github.com/yhy217/rapidcms-vul/issues/4
1,900,098,176
4
CVE-2023-5262
2023-09-29T14:15:11.163
A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenRapid/rapidcms/issues/10" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/5" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/OpenRapid/rapidcms/issues/10
[ "Issue Tracking" ]
github.com
[ "OpenRapid", "rapidcms" ]
RapidCMS exists arbitrary file upload vulnerability in Icon upload operation For more details, see: https://github.com/yhy217/rapidcms-vul/issues/5
RapidCMS exists arbitrary file upload vulnerability in Icon upload operation
https://api.github.com/repos/OpenRapid/rapidcms/issues/10/comments
0
2023-09-18T09:26:24Z
2023-09-18T09:27:21Z
https://github.com/OpenRapid/rapidcms/issues/10
1,900,525,198
10
CVE-2023-5262
2023-09-29T14:15:11.163
A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclose...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cna@vuldb.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/OpenRapid/rapidcms/issues/10" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/yhy217/rapidcms-vul/issues/5" }, { "so...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D66CF166-4A08-45F5-9577-38D3CE25AFBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
https://github.com/yhy217/rapidcms-vul/issues/5
[ "Exploit", "Issue Tracking" ]
github.com
[ "yhy217", "rapidcms-vul" ]
[Suggested description] An arbitrary file upload vulnerability in /admin/config/uploadicon.php which allows attackers to getshell RapidCMS Dev.1.3.1 was discovered to contain an arbitrary file upload vulnerability in /admin/config/uploadicon.php which leads to getshell [Vulnerability Type] arbitrary file upload ...
RapidCMS has an arbitrary file upload vulnerability
https://api.github.com/repos/yhy217/rapidcms-vul/issues/5/comments
0
2023-09-18T09:19:43Z
2023-09-18T09:31:07Z
https://github.com/yhy217/rapidcms-vul/issues/5
1,900,514,277
5
CVE-2023-42298
2023-10-12T04:15:13.053
An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/gpac/gpac/issues/2567" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF", "versionEndExcluding": null, "versionEndIncluding": "2.2.1", "versionStartExcluding": n...
https://github.com/gpac/gpac/issues/2567
[ "Issue Tracking", "Patch" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Y] I looked for a similar issue and couldn't find any. - [Y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [Y] I give enough info...
Integer overflow issue in bifs/unquantize.c:298
https://api.github.com/repos/gpac/gpac/issues/2567/comments
1
2023-08-29T07:37:50Z
2023-10-11T01:35:00Z
https://github.com/gpac/gpac/issues/2567
1,871,078,948
2,567
CVE-2023-45909
2023-10-18T23:15:08.300
zzzcms v2.2.0 was discovered to contain an open redirect vulnerability.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Num-Nine/CVE/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zzzcms:zzzphp:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "410E39C6-3A1E-4E57-A6F9-CB2A08A76B80", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
https://github.com/Num-Nine/CVE/issues/7
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Num-Nine", "CVE" ]
Name of the affected product:zzzcms The affected version:2.2.0 Vulnerability type:Cross-site redirection 1. Download address: http://115.29.55.18/zzzphp.zip http://www.zzzcms.com/a/news/31_313.html 2. Feel free to register a user after installation Go to Message management: /? gbook/23 Copy...
zzzcms-V2.2.0 has cross-site redirection vulnerability
https://api.github.com/repos/QianGeG/CVE/issues/7/comments
0
2023-10-09T08:50:13Z
2023-10-09T08:50:13Z
https://github.com/QianGeG/CVE/issues/7
1,932,585,751
7
CVE-2023-46332
2023-10-23T16:15:09.457
WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataSegment::Drop(), which lead to segmentation fault.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/2311" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "A9DCC3A8-9035-4F70-B914-493DD3140821", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/WebAssembly/wabt/issues/2311
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ```shell OS : Linux 5.10.16.3-microsoft-standard-WSL2 #1 SMP Fri Apr 2 22:23:49 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Commit : 0e78c24fd231d5ee67ccd271bfa317faa963281c Version : 1.0.33 (git~1.0.33-35-gdddc03d3) Clang Verison : 12.0.1 Build : mkdir...
Out-of-Bound Memory Write in DataSegment::Drop()
https://api.github.com/repos/WebAssembly/wabt/issues/2311/comments
0
2023-10-08T07:46:31Z
2023-10-08T18:41:21Z
https://github.com/WebAssembly/wabt/issues/2311
1,931,692,043
2,311
CVE-2023-46331
2023-10-23T17:15:08.590
WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegment::IsValidRange(), which lead to segmentation fault.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/WebAssembly/wabt/issues/2310" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:webassembly_binary_toolkit:1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "A9DCC3A8-9035-4F70-B914-493DD3140821", "versionEndExcluding": null, "versionEndIncluding": null, ...
https://github.com/WebAssembly/wabt/issues/2310
[ "Issue Tracking", "Vendor Advisory" ]
github.com
[ "WebAssembly", "wabt" ]
### Environment ```shell OS : Linux 5.10.16.3-microsoft-standard-WSL2 #1 SMP Fri Apr 2 22:23:49 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Commit : 0e78c24fd231d5ee67ccd271bfa317faa963281c Version : 1.0.33 (git~1.0.33-35-gdddc03d3) Clang Verison : 12.0.1 Build : mkdir...
Out-of-Bound Memory Read in DataSegment::IsValidRange()
https://api.github.com/repos/WebAssembly/wabt/issues/2310/comments
0
2023-10-08T07:32:47Z
2023-10-08T18:41:08Z
https://github.com/WebAssembly/wabt/issues/2310
1,931,687,191
2,310
CVE-2022-4886
2023-10-25T20:15:09.790
Ingress-nginx `path` sanitization can be bypassed with `log_format` directive.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "inte...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/5" }, { "source": "jordan@liggitt.net", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "54E2DB85-1B0E-44DC-928F-28B1E1B74728", "versionEndExcluding": "1.8.0", "versionEndIncluding": null, "versionSta...
https://github.com/kubernetes/ingress-nginx/issues/10570
[ "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was discovered in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where a user that can create or update ingress objects can use directives to bypass the sanitization of the `spec.rules[].http.paths[].path` field of an Ingress object (in the `networking.k8s.io` or `exten...
CVE-2022-4886: Ingress-nginx `path` sanitization can be bypassed
https://api.github.com/repos/kubernetes/ingress-nginx/issues/10570/comments
8
2023-10-25T15:48:08Z
2024-03-25T12:20:18Z
https://github.com/kubernetes/ingress-nginx/issues/10570
1,961,737,985
10,570
CVE-2023-5043
2023-10-25T20:15:18.037
Ingress nginx annotation injection causes arbitrary command execution.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/4" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B", "versionEndExcluding": "1.9.0", "versionEndIncluding": null, "versionSta...
https://github.com/kubernetes/ingress-nginx/issues/10571
[ "Issue Tracking", "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/configuration-snippet annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the...
CVE-2023-5043: Ingress nginx annotation injection causes arbitrary command execution
https://api.github.com/repos/kubernetes/ingress-nginx/issues/10571/comments
25
2023-10-25T15:48:20Z
2023-11-16T13:41:13Z
https://github.com/kubernetes/ingress-nginx/issues/10571
1,961,738,338
10,571
CVE-2023-5044
2023-10-25T20:15:18.187
Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integr...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/10/25/3" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Vendor Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1FAA6D4-954E-4E5F-AB9A-61E1A3F9CD9B", "versionEndExcluding": "1.9.0", "versionEndIncluding": null, "versionSta...
https://github.com/kubernetes/ingress-nginx/issues/10572
[ "Issue Tracking", "Mitigation", "Vendor Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was identified in [ingress-nginx](https://github.com/kubernetes/ingress-nginx) where the nginx.ingress.kubernetes.io/permanent-redirect annotation on an Ingress object (in the `networking.k8s.io` or `extensions` API group) can be used to inject arbitrary commands, and obtain the cred...
CVE-2023-5044: Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation
https://api.github.com/repos/kubernetes/ingress-nginx/issues/10572/comments
13
2023-10-25T15:48:28Z
2024-01-03T12:53:47Z
https://github.com/kubernetes/ingress-nginx/issues/10572
1,961,738,590
10,572
CVE-2023-5793
2023-10-26T18:15:08.817
A vulnerability was found in flusity CMS and classified as problematic. This issue affects the function loadCustomBlocCreateForm of the file /core/tools/customblock.php of the component Dashboard. The manipulation of the argument customblock_place leads to cross site scripting. The attack may be initiated remotely. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/81252bc764e1de2422e79e36194bba1289e7a0a5" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/flusity/flusity-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fluisity:fluisity:*:*:*:*:*:*:*:*", "matchCriteriaId": "93C33CF6-8C36-4B0D-B551-B9CAB1C59219", "versionEndExcluding": "2023-10-24", "versionEndIncluding": null, "versionStart...
https://github.com/flusity/flusity-CMS/issues/1
[ "Exploit", "Issue Tracking" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 ![de54a801af30a62252c8c0649f8397e](https://github.com/flusity/flusity-CMS/assets/113713406/1fabe5d5-d7d7-4297-9932-8e564e8894cc) Select block ![e3b1a788af0f2b176401ca2fbcc72fd](https://github.com/flusity/flusity-CMS/assets/113...
Customblock in customblock.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/1/comments
2
2023-10-23T07:43:56Z
2024-04-19T02:35:15Z
https://github.com/flusity/flusity-CMS/issues/1
1,956,552,703
1
CVE-2023-42188
2023-10-27T00:15:09.287
IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF).
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "inte...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/Thecosy/IceCMS/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://topdayplus.github.io/2023/10/2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:macwk:icecms:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8043F07-E915-49DC-A4D8-DC34AC2B9770", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
https://github.com/Thecosy/IceCMS/issues/17
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
github.com
[ "Thecosy", "IceCMS" ]
After the administrator open the following page, and click the the Submit request, square message with ID 264 will be deleted. ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://192.168.146.129:8181/square/DelectSquareById/264"> <input type="submit" value="Submit ...
There is a CSRF vulnerability that can delete the message
https://api.github.com/repos/Thecosy/IceCMS/issues/17/comments
0
2023-08-30T14:50:03Z
2023-08-30T14:50:03Z
https://github.com/Thecosy/IceCMS/issues/17
1,873,843,313
17
CVE-2023-5810
2023-10-27T01:15:32.317
A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", ...
[ { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*", "matchCriteriaId": "9989CEDF-D8FF-40B5-8E62-E4ABECFDBADC", "versionEndExcluding": "2023-10-24", "versionEndIncluding": null, "versionStartEx...
https://github.com/flusity/flusity-CMS/issues/2
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "flusity", "flusity-CMS" ]
After installation, log in to the backend using the default account password tester/1234 select posts ![image](https://github.com/flusity/flusity-CMS/assets/113713406/f5b40b5c-fd5b-4b35-99e3-2d5305974934) enter payload `?edit_post_id=3);</script><script>alert(1024)</script>` ![image](https://github.com/flusity...
edit_post_id in posts.php_ XSS (Cross Site Scripting) exists for the place parameter
https://api.github.com/repos/flusity/flusity-CMS/issues/2/comments
4
2023-10-24T10:36:35Z
2023-10-24T17:50:22Z
https://github.com/flusity/flusity-CMS/issues/2
1,958,967,105
2