cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 1.07k | cve_metrics dict | cve_references listlengths 1 34 | cve_configurations listlengths 1 5 | url stringlengths 39 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 58 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 39 62 | issue_github_id int64 128M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-5811 | 2023-10-27T01:15:32.383 | A vulnerability, which was classified as problematic, was found in flusity CMS. Affected is the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument menu_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public an... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/flusity/flusity-CMS/commit/6943991c62ed87c7a57989a0cb7077316127def8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6",
"versionEndExcluding": null,
"versionEndIncluding": "2.304",
"versionStartExcludi... | https://github.com/flusity/flusity-CMS/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234
select posts

enter payload
`?menu_id=3);</script><script>alert(1024)</script>`
 exists for the place parameter | https://api.github.com/repos/flusity/flusity-CMS/issues/3/comments | 3 | 2023-10-24T10:40:44Z | 2024-04-19T02:35:06Z | https://github.com/flusity/flusity-CMS/issues/3 | 1,958,975,399 | 3 |
CVE-2023-5812 | 2023-10-27T02:15:07.477 | A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/flusity/flusity-CMS/issues/4"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flusity:flusity:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C3388B-D2C5-4EBE-9001-E438E4F263D6",
"versionEndExcluding": null,
"versionEndIncluding": "2.304",
"versionStartExcludi... | https://github.com/flusity/flusity-CMS/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"flusity",
"flusity-CMS"
] | After installation, log in to the backend using the default account password tester/1234
select files

select upload_file
;
$data['loan_limit'] = trim($_POST['loanLimit']);
$data['loan_periode'] = trim($_POST['loanPeriode']);
$data['enable_reserve'] = $_POST['enable... | Vuln0wned Report: SQL Injection in member_type.php | https://api.github.com/repos/slims/slims9_bulian/issues/216/comments | 2 | 2023-10-08T16:42:47Z | 2023-11-29T10:20:40Z | https://github.com/slims/slims9_bulian/issues/216 | 1,931,906,656 | 216 |
CVE-2023-3676 | 2023-10-31T21:15:08.550 | A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/119339"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | https://github.com/kubernetes/kubernetes/issues/119339 | [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8)
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those no... | CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation | https://api.github.com/repos/kubernetes/kubernetes/issues/119339/comments | 3 | 2023-07-14T18:27:48Z | 2023-10-31T20:30:00Z | https://github.com/kubernetes/kubernetes/issues/119339 | 1,805,330,606 | 119,339 |
CVE-2023-3955 | 2023-10-31T21:15:08.613 | A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/119595"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Technical Description"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4C81ED-BB69-490B-BABA-89C2501A5E6D",
"versionEndExcluding": "1.24.17",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/119595 | [
"Exploit",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8)
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those no... | CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation | https://api.github.com/repos/kubernetes/kubernetes/issues/119595/comments | 2 | 2023-07-26T15:30:50Z | 2023-11-01T00:33:34Z | https://github.com/kubernetes/kubernetes/issues/119595 | 1,822,677,454 | 119,595 |
CVE-2023-46930 | 2023-11-01T14:15:38.250 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2666 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff6697edd in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
... | SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14 | https://api.github.com/repos/gpac/gpac/issues/2666/comments | 0 | 2023-10-25T06:06:04Z | 2023-10-26T10:37:04Z | https://github.com/gpac/gpac/issues/2666 | 1,960,612,139 | 2,666 |
CVE-2023-46931 | 2023-11-01T14:15:38.640 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf."
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2664 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/gpac
### Description
Heap-buffer-overflow in MP4Box.
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Pl... | heap-buffer-overflow in ffdmx_parse_side_data /afltest/gpac/src/filters/ff_dmx.c:202:14 in gpac/MP4Box | https://api.github.com/repos/gpac/gpac/issues/2664/comments | 0 | 2023-10-24T13:31:01Z | 2023-10-26T10:37:05Z | https://github.com/gpac/gpac/issues/2664 | 1,959,261,781 | 2,664 |
CVE-2023-46927 | 2023-11-01T15:15:08.707 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2657 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac
### Description
Heap-buffer-overflow in MP4Box.
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Ple... | heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac | https://api.github.com/repos/gpac/gpac/issues/2657/comments | 0 | 2023-10-22T20:14:14Z | 2023-10-23T13:23:29Z | https://github.com/gpac/gpac/issues/2657 | 1,956,040,458 | 2,657 |
CVE-2023-46928 | 2023-11-01T15:15:08.753 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2661 | [
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff6798224 in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Pleas... | SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42 | https://api.github.com/repos/gpac/gpac/issues/2661/comments | 0 | 2023-10-24T08:08:44Z | 2023-10-26T10:37:05Z | https://github.com/gpac/gpac/issues/2661 | 1,958,731,162 | 2,661 |
CVE-2023-3893 | 2023-11-03T18:15:08.623 | A security issue was discovered in Kubernetes where a user that can
create pods on Windows nodes running kubernetes-csi-proxy may be able to
escalate to admin privileges on those nodes. Kubernetes clusters are
only affected if they include Windows nodes running
kubernetes-csi-proxy.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/119594"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-sec... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:csi_proxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A1845E5-AD91-4083-8836-4C0E4547C5A4",
"versionEndExcluding": null,
"versionEndIncluding": "1.1.2",
"versionStartEx... | https://github.com/kubernetes/kubernetes/issues/119594 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/av:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (8.8)
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to... | CVE-2023-3893: Insufficient input sanitization on kubernetes-csi-proxy leads to privilege escalation | https://api.github.com/repos/kubernetes/kubernetes/issues/119594/comments | 5 | 2023-07-26T15:30:26Z | 2023-11-04T16:10:06Z | https://github.com/kubernetes/kubernetes/issues/119594 | 1,822,676,744 | 119,594 |
CVE-2022-3172 | 2023-11-03T20:15:08.550 | A security issue was discovered in kube-apiserver that allows an
aggregated API server to redirect client traffic to any URL. This could
lead to the client performing unexpected actions as well as forwarding
the client's API server credentials to third parties.
| {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/112513"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-sec... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:apiserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D740494E-6332-4421-BE43-C0CEB179CBA6",
"versionEndExcluding": null,
"versionEndIncluding": "1.21.14",
"versionStart... | https://github.com/kubernetes/kubernetes/issues/112513 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L) (5.1, medium)
A security issue was discovered in kube-apiserver that allows an aggregated API server to redirect client traffic to any URL. This could lead to the clien... | CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF) | https://api.github.com/repos/kubernetes/kubernetes/issues/112513/comments | 4 | 2022-09-16T13:14:50Z | 2022-11-10T03:57:00Z | https://github.com/kubernetes/kubernetes/issues/112513 | 1,375,935,782 | 112,513 |
CVE-2023-33478 | 2023-11-07T15:15:10.630 | RemoteClinic 2.0 has a SQL injection vulnerability in the ID parameter of /medicines/stocks.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/22"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | https://github.com/remoteclinic/RemoteClinic/issues/22 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ### Vulnerable code:
[Line 51 in stocks.php](https://github.com/remoteclinic/RemoteClinic/blob/master/medicines/stocks.php#L51)
```php
$sql=mysqli_query($con, "select * from p_stock where branch='$id' order by code asc limit
20000")or die(mysqli_error());
```
User data flows into this manually-constructed SQ... | SQL injection vulnerability in `id` parameter of `/medicines/stocks.php` | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/22/comments | 1 | 2023-05-05T12:17:42Z | 2023-11-09T15:25:43Z | https://github.com/remoteclinic/RemoteClinic/issues/22 | 1,697,523,258 | 22 |
CVE-2023-33479 | 2023-11-07T15:15:10.690 | RemoteClinic version 2.0 contains a SQL injection vulnerability in the /staff/edit.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/23"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | https://github.com/remoteclinic/RemoteClinic/issues/23 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ### Vulnerable code:
[Line 62 in staff/edit.php](https://github.com/remoteclinic/RemoteClinic/blob/master/staff/edit.php#L62)
```php
$profile=mysqli_fetch_object(mysqli_query($con, "select * from p_staff_dir where id='$id'"))
```
User data flows into this manually-constructed SQL string, leading to SQL injection... | SQL injection vulnerability in `id` parameter of `/staff/edit.php` | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/23/comments | 1 | 2023-05-05T12:49:47Z | 2023-11-09T15:24:25Z | https://github.com/remoteclinic/RemoteClinic/issues/23 | 1,697,567,092 | 23 |
CVE-2023-33480 | 2023-11-07T15:15:10.743 | RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access co... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/24"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | https://github.com/remoteclinic/RemoteClinic/issues/24 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ## Vulnerability chain in RemoteClinic application
### Vulnerability description
The RemoteClinic application contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target s... | Privilege escalation and arbitrary file upload vulnerability leading to Remote Code Execution | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/24/comments | 1 | 2023-05-06T03:16:43Z | 2023-11-09T15:20:47Z | https://github.com/remoteclinic/RemoteClinic/issues/24 | 1,698,401,625 | 24 |
CVE-2023-33481 | 2023-11-07T15:15:10.793 | RemoteClinic 2.0 is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of patients/index.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/25"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | https://github.com/remoteclinic/RemoteClinic/issues/25 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | ## Description
The web application is vulnerable to a time-based blind SQL injection attack in the 'start' GET parameter of `patients/index.php`. An attacker can inject malicious SQL statements into the application, causing it to respond with a time-delayed response that indicates the vulnerability. Exploiting this ... | SQL injection vulnerability in the 'start' GET parameter of `patients/index.php` | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/25/comments | 1 | 2023-05-06T03:48:39Z | 2023-11-09T15:21:52Z | https://github.com/remoteclinic/RemoteClinic/issues/25 | 1,698,412,619 | 25 |
CVE-2023-46001 | 2023-11-07T22:15:11.473 | Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/gpac/gpac/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev573-g201320819-master:*:*:*:*:*:*:*",
"matchCriteriaId": "63154633-0211-47E2-861B-3FB9BE27BA70",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2629 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
root@4dd48d09e778:~/gpac/bin/gcc# ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev573-g201320819-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC:... | SEGV in gpac/src/isomedia/isom_read.c:2807:51 in gf_isom_get_user_data | https://api.github.com/repos/gpac/gpac/issues/2629/comments | 0 | 2023-10-10T04:03:18Z | 2023-10-11T10:57:17Z | https://github.com/gpac/gpac/issues/2629 | 1,934,290,908 | 2,629 |
CVE-2023-47346 | 2023-11-13T22:15:07.740 | Buffer Overflow vulnerability in free5gc 3.3.0, UPF 1.2.0, and SMF 1.2.0 allows attackers to cause a denial of service via crafted PFCP messages. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/482"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/free5gc/free5gc/issues/482 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] | ## Describe the bug
While testing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when it receives special kind of PFCP messages (the secondary IE type is larger than 0x7fff). This could cause DOS of any UPF instance, all memory issues due to this kind of PFCP messages are ca... | [Bugs] UPF crash caused by PFCP messages whose 2rd IE type larger than 0x7fff | https://api.github.com/repos/free5gc/free5gc/issues/482/comments | 3 | 2023-09-22T02:57:53Z | 2023-11-02T04:51:21Z | https://github.com/free5gc/free5gc/issues/482 | 1,908,102,486 | 482 |
CVE-2023-47384 | 2023-11-14T20:15:08.417 | MP4Box GPAC v2.3-DEV-rev617-g671976fcc-master was discovered to contain a memory leak in the function gf_isom_add_chapter at /isomedia/isom_write.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2672"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2672 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1、Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Config... | Memory Leak in gf_isom_add_chapter isomedia/isom_write.c:3182 | https://api.github.com/repos/gpac/gpac/issues/2672/comments | 0 | 2023-11-01T09:16:33Z | 2023-12-04T10:07:48Z | https://github.com/gpac/gpac/issues/2672 | 1,971,994,862 | 2,672 |
CVE-2023-5528 | 2023-11-14T21:15:14.123 | A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/kubernetes/kubernetes/issues/121879"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
],
"url": "https://groups.google.com/g/kubernetes-security-anno... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25FFBC6E-DCE9-4596-8ABE-AC6B6564AA40",
"versionEndExcluding": "1.25.16",
"versionEndIncluding": null,
"versionStar... | https://github.com/kubernetes/kubernetes/issues/121879 | [
"Issue Tracking",
"Patch"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) - **HIGH** (7.2)
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin... | CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes | https://api.github.com/repos/kubernetes/kubernetes/issues/121879/comments | 1 | 2023-11-14T15:54:16Z | 2023-11-16T13:42:24Z | https://github.com/kubernetes/kubernetes/issues/121879 | 1,993,034,362 | 121,879 |
CVE-2023-48087 | 2023-11-15T15:15:07.453 | xxl-job-admin 2.4.0 is vulnerable to Insecure Permissions via /xxl-job-admin/joblog/clearLog and /xxl-job-admin/joblog/logDetailCat. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3330"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/xuxueli/xxl-job/issues/3330 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xuxueli",
"xxl-job"
] | ### Environment
MySQL 5.7.44, XXL-Job-Admin 2.4.0
Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin)
Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor)
### Vulnerability Information
It was found that the direct query of xxl-job-admin/joblog/clearLog and /xxl-job-admin/joblog/logDetailPage does not validat... | Permission Vulnerability of Path /xxl-job-admin/joblog/clearLog & /xxl-job-admin/joblog/logDetailCat | https://api.github.com/repos/xuxueli/xxl-job/issues/3330/comments | 2 | 2023-11-08T02:32:23Z | 2023-11-23T10:17:00Z | https://github.com/xuxueli/xxl-job/issues/3330 | 1,982,605,023 | 3,330 |
CVE-2023-48088 | 2023-11-15T15:15:07.510 | xxl-job-admin 2.4.0 is vulnerable to Cross Site Scripting (XSS) via /xxl-job-admin/joblog/logDetailPage. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3329"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/xuxueli/xxl-job/issues/3329 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xuxueli",
"xxl-job"
] | ### Environment
MySQL 5.7.44, XXL-Job-Admin 2.4.0
Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin)
Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor)
### Vulnerability Information
During the query of /xxl-job-admin/joblog/logDetailPage, the xxl-job-admin will query the related log directly in the machin... | XSS attack appears in /xxl-job-admin/joblog/logDetailPage | https://api.github.com/repos/xuxueli/xxl-job/issues/3329/comments | 1 | 2023-11-08T02:03:54Z | 2023-11-23T09:50:55Z | https://github.com/xuxueli/xxl-job/issues/3329 | 1,982,577,272 | 3,329 |
CVE-2023-48089 | 2023-11-15T15:15:07.553 | xxl-job-admin 2.4.0 is vulnerable to Remote Code Execution (RCE) via /xxl-job-admin/jobcode/save. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/xuxueli/xxl-job/issues/3333"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xuxueli:xxl-job:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "122ECDB6-272C-4B31-907E-E9FFB36305EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/xuxueli/xxl-job/issues/3333 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"xuxueli",
"xxl-job"
] | ### Environment
MySQL 5.7.44, XXL-Job-Admin 2.4.0
Virtual Machine 1: Ubuntu 22.04.3 (as XXL-Job-Admin)
Virtual Machine 2: Ubuntu 22.04.3 (as XXL-Job-Executor)
### Vulnerability Information
It was found that the /xxl-job-admin/jobcode/save does not validate user privilege. The modification of code in running cron... | Remote Code Execution in /xxl-job-admin/jobcode/save | https://api.github.com/repos/xuxueli/xxl-job/issues/3333/comments | 4 | 2023-11-08T14:08:58Z | 2024-01-31T07:07:15Z | https://github.com/xuxueli/xxl-job/issues/3333 | 1,983,699,885 | 3,333 |
CVE-2023-48011 | 2023-11-15T19:15:07.693 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2611"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2611 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
```
# Asan
```
[33m[iso file] extra box ... | heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples | https://api.github.com/repos/gpac/gpac/issues/2611/comments | 0 | 2023-10-08T16:10:40Z | 2023-10-12T14:08:21Z | https://github.com/gpac/gpac/issues/2611 | 1,931,883,357 | 2,611 |
CVE-2023-48013 | 2023-11-15T19:15:07.753 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2612"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2612 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
```
# Asan
```
/home/user/vul/MP4Box_cra... | double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17 | https://api.github.com/repos/gpac/gpac/issues/2612/comments | 0 | 2023-10-08T16:13:47Z | 2023-10-12T14:17:39Z | https://github.com/gpac/gpac/issues/2612 | 1,931,884,388 | 2,612 |
CVE-2023-48014 | 2023-11-15T19:15:07.803 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2613"
}... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev566-g50c2ab06f-master:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEFB340-26A2-43CD-A8DC-518262E4DC36",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2613 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | # Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.2.0-33-generic #33~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 10:33:52 UTC 2 x86_64 x86_64 x86_64 GNU/Linux
```
# Asan
```
/home/user/vul/MP4Box_cra... | stack-buffer-overflow in /gpac/src/media_tools/av_parsers.c:7735:42 in hevc_parse_vps_extension | https://api.github.com/repos/gpac/gpac/issues/2613/comments | 0 | 2023-10-08T16:15:17Z | 2023-10-12T14:46:27Z | https://github.com/gpac/gpac/issues/2613 | 1,931,886,016 | 2,613 |
CVE-2023-47345 | 2023-11-15T22:15:27.877 | Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP message with malformed PFCP Heartbeat message whose Recovery Time Stamp IE length is mutated to zero. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/483"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/free5gc/free5gc/issues/483 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] | [Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero
## Describe the bug
While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Recovery Time Stamp IE length is mutated to zero. Th... | [Bugs] UPF crash caused by malformed PFCP messages whose 1st IE length is mutated to zero | https://api.github.com/repos/free5gc/free5gc/issues/483/comments | 4 | 2023-09-22T03:19:07Z | 2023-11-26T13:11:19Z | https://github.com/free5gc/free5gc/issues/483 | 1,908,115,920 | 483 |
CVE-2023-47347 | 2023-11-15T22:15:27.930 | Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/496"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/free5gc/free5gc/issues/496 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] | [Bugs] UPF crash caused by malformed PFCP message whose Sequence Number is mutated to overflow bytes
## Describe the bug
While fuzzing the free5gc UPF for some PFCP basic and security features, I could trigger several crashes when send malformed PFCP Heartbeat Request whose Sequence Number is mutated to overflow by... | [Bugs] UPF crash caused by malformed PFCP messages whose Sequence Number is mutated to overflow bytes | https://api.github.com/repos/free5gc/free5gc/issues/496/comments | 1 | 2023-10-24T11:07:44Z | 2023-11-26T13:36:56Z | https://github.com/free5gc/free5gc/issues/496 | 1,959,013,436 | 496 |
CVE-2023-47471 | 2023-11-16T04:15:06.857 | Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a local attacker to cause a denial of service via the slice_segment_header function in the slice.cc component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A736D1CB-9F33-4561-B10C-4074DF6C02F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/426 | [
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"strukturag",
"libde265"
] | # SEGV in libde265
### Description
Libde265 v1.0.12 was discovered to contain a SEGV via the function slice_segment_header::dump_slice_segment_header at slice.cc.
### Version
```shell
libde265/dec265 v1.0.12
```
### ASAN Log
./dec265/dec265 -c -d -f 153 poc1libde265
```shell
AddressSanitizer:DE... | SEGV in libde265 in slice_segment_header::dump_slice_segment_header | https://api.github.com/repos/strukturag/libde265/issues/426/comments | 1 | 2023-11-03T17:48:11Z | 2023-11-07T07:21:53Z | https://github.com/strukturag/libde265/issues/426 | 1,976,666,798 | 426 |
CVE-2023-47025 | 2023-11-16T23:15:08.123 | An issue in Free5gc v.3.3.0 allows a local attacker to cause a denial of service via the free5gc-compose component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/free5gc/free5gc/issues/501"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/free5gc/free5gc/issues/501 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"free5gc",
"free5gc"
] |
## Describe the bug
When I try to send a captured UE registration request message to the AMF, the log shows 'sctp accept from <nil>,' and the AMF crashes, causing disconnection for other UEs as well.
## To Reproduce
Steps to reproduce the behavior:
1. Using free5gc-compose to establish the AMF.
2. run free5gc ... | [Bugs]Amf crashed when failed to resolve the IP of ngap message , resulting in a null pointer reference. | https://api.github.com/repos/free5gc/free5gc/issues/501/comments | 1 | 2023-10-29T12:48:07Z | 2023-12-04T08:48:37Z | https://github.com/free5gc/free5gc/issues/501 | 1,966,977,323 | 501 |
CVE-2023-44796 | 2023-11-18T00:15:07.133 | Cross Site Scripting (XSS) vulnerability in LimeSurvey before version 6.2.9-230925 allows a remote attacker to escalate privileges via a crafted script to the _generaloptions_panel.php component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/Hebing123/CVE-2023-44796/issues/1"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/Hebing123/cve/issues/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05741E6D-3E8F-43BE-9EF7-4C535AAD6C3B",
"versionEndExcluding": "6.2.9",
"versionEndIncluding": null,
"versionStartE... | https://github.com/Hebing123/cve/issues/4 | null | github.com | [
"Hebing123",
"cve"
] | **LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in [limesurvey/limesurvey](https://huntr.com/repos/limesurvey/limesurvey)**
### **Description**
A regular user with "theme" privileges who maliciously sets the "templatename" during the importManifest process can lead to a stor... | LimeSurvey 6.2.9-230925 has a storage based XSS vulnerability caused by importManifest in limesurvey/limesurvey | https://api.github.com/repos/Hebing123/cve/issues/4/comments | 1 | 2023-12-14T03:31:28Z | 2024-03-11T06:23:47Z | https://github.com/Hebing123/cve/issues/4 | 2,040,839,627 | 4 |
CVE-2023-48039 | 2023-11-20T15:15:09.820 | GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leak in gf_mpd_parse_string media_tools/mpd.c:75. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2679"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2679 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1.Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configu... | memory leaks in gf_mpd_parse_string media_tools/mpd.c:75 | https://api.github.com/repos/gpac/gpac/issues/2679/comments | 0 | 2023-11-07T02:35:25Z | 2023-12-04T10:07:49Z | https://github.com/gpac/gpac/issues/2679 | 1,980,426,267 | 2,679 |
CVE-2023-48090 | 2023-11-20T15:15:09.863 | GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leaks in extract_attributes media_tools/m3u8.c:329. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2680"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2680 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1.Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configu... | memory leaks in extract_attributes media_tools/m3u8.c:329 | https://api.github.com/repos/gpac/gpac/issues/2680/comments | 0 | 2023-11-07T07:24:45Z | 2023-12-04T10:07:50Z | https://github.com/gpac/gpac/issues/2680 | 1,980,712,658 | 2,680 |
CVE-2023-46935 | 2023-11-21T07:15:09.967 | eyoucms v1.6.4 is vulnerable Cross Site Scripting (XSS), which can lead to stealing sensitive information of logged-in users. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/55"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/55 | [
"Exploit"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Software Link : https://github.com/weng-xianhu/eyoucms
Website : http://www.eyoucms.com/
Vulnerable version 1.6.4 download address :https://qiniu.eyoucms.com/source/EyouCMS-V1.6.4-UTF8-SP1_1015.zip
After the installation is complete, log in as admin, open the page
[
* PoC: [poc](https://drive.google.com/file/d/1ISOxgjmw9mPCs-vIh84hsgEB2MfMcwH... | Buffer over-read causes segmentation fault in pic_parameter_set::dump | https://api.github.com/repos/strukturag/libde265/issues/418/comments | 6 | 2023-08-30T14:08:02Z | 2023-11-22T19:19:54Z | https://github.com/strukturag/libde265/issues/418 | 1,873,762,647 | 418 |
CVE-2023-48880 | 2023-11-29T16:15:07.167 | A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Menu Name field at /login.php?m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/52"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/52 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | **Version**:
<=EyouCMS-V1.6.4-UTF8-SP1

**Description**:
1. Login to the back-end with an administrator account, click "Member Center", select "Function Configuration", then find "Frontend Style Settings"... | EyouCMS-V1.6.4-UTF8-SP1 has a vulnerability, Stored Cross-Site Scripting | https://api.github.com/repos/weng-xianhu/eyoucms/issues/52/comments | 1 | 2023-08-23T11:20:28Z | 2024-03-22T06:45:21Z | https://github.com/weng-xianhu/eyoucms/issues/52 | 1,863,129,078 | 52 |
CVE-2023-48881 | 2023-11-29T16:15:07.217 | A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field Title field at /login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/53"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | **Version**:
<=EyouCMS-V1.6.4-UTF8-SP1

**Description**:
1. Log in to the backend with an administrator account, click on "Feature Map" and add "Column Fields".
 vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Document Properties field at /login.php m=admin&c=Index&a=changeTableVal&_ajax=1&lang=cn. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/54"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8E52879A-3ABB-441B-B6A9-A91E6C700778",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/weng-xianhu/eyoucms/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | **Version**:
<=EyouCMS-V1.6.4-UTF8-SP1

**Description**:
1. Log in to the backend with an administrator account, click on "Function Map" and add "Document Properties".
 via crafted SQL statements. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1172"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1172 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```sql
CREATE TABLE v0 ( v1 DECIMAL ) ;
INSERT INTO v0 VALUES ( 0 ) ;
INSERT INTO v0 ( v1 ) SELECT CASE v1 WHEN 49 THEN v1 ELSE -128 END FROM v0 AS v2 , v0 , v0 AS v3 GROUP BY v1 , v1 ;
UPDATE v0 SET v1 = ( SELECT DISTINCT * FROM v0 ) ;
```
Server Log:
```
... | Fuzzer: Virtuoso 7.2.11 crashed by stack smashing | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1172/comments | 2 | 2023-11-14T14:41:15Z | 2023-11-20T16:31:19Z | https://github.com/openlink/virtuoso-opensource/issues/1172 | 1,992,885,538 | 1,172 |
CVE-2023-48946 | 2023-11-29T20:15:07.850 | An issue in the box_mpy function of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1178"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1178 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 INT ) ;
INSERT INTO v0 VALUES ( 2147483647 ) ;
INSERT INTO v0 VALUES ( -1 ) ;
INSERT INTO v0 ( v1 , v1 , v1 ) SELECT 54 , v1 , -128 FROM v0 AS v4 , v0 , v0 AS v3 NATURAL JOIN v0 AS v2 ;
UPDATE v0 SET v1 = NULL WHERE ( v1 * 2147483647 ... | Fuzzer: Virtuoso 7.2.11 crashed at box_mpy | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1178/comments | 1 | 2023-11-14T15:16:38Z | 2023-11-20T16:29:01Z | https://github.com/openlink/virtuoso-opensource/issues/1178 | 1,992,956,970 | 1,178 |
CVE-2023-48947 | 2023-11-29T20:15:07.897 | An issue in the cha_cmp function of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1179"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1179 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 INT ) ;
INSERT INTO v0 ( v1 , v1 , v1 ) VALUES ( 77 , -128 , -1 ) ;
INSERT INTO v0 VALUES ( 4 ) ;
SELECT CASE -128 / 56 WHEN v1 THEN 20 ELSE v1 + -2147483648 END , v1 FROM v0 UNION SELECT 19 , 0 * v1 FROM v0 GROUP BY v1 ;
```
backtrace:
``... | Fuzzer: Virtuoso 7.2.11 crashed at cha_cmp | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1179/comments | 1 | 2023-11-14T15:17:36Z | 2023-11-20T16:28:07Z | https://github.com/openlink/virtuoso-opensource/issues/1179 | 1,992,958,740 | 1,179 |
CVE-2023-48948 | 2023-11-29T20:15:07.940 | An issue in the box_div function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1176"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1176 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 INTEGER NOT NULL PRIMARY KEY ) ;
INSERT INTO v0 VALUES ( 95 ) ;
INSERT INTO v0 VALUES ( ( SELECT ( -1 , -1 ) * ( 31 , 84 ) FROM v0 WHERE v1 BETWEEN 'x' AND 'x' OR EXISTS ( SELECT v1 FROM v0 WHERE v1 NOT IN ( SELECT 20 FROM v0 WHERE ( v1 > 214... | Fuzzer: Virtuoso 7.2.11 crashed at box_div | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1176/comments | 1 | 2023-11-14T15:14:34Z | 2023-11-20T16:26:22Z | https://github.com/openlink/virtuoso-opensource/issues/1176 | 1,992,952,966 | 1,176 |
CVE-2023-48949 | 2023-11-29T20:15:07.990 | An issue in the box_add function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1173"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1173 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 FLOAT UNIQUE , v2 INT ) ;
INSERT INTO v0 VALUES ( NULL , 57 ) ;
INSERT INTO v0 VALUES ( -1 , ( SELECT 60 , v2 FROM v0 WHERE v2 = -1 ) ) ;
UPDATE v0 SET v1 = ( CASE WHEN v2 * v1 THEN 76 ELSE ( SELECT v2 FROM v0 WHERE v1 = -2147483648 / CASE WHEN... | Fuzzer: Virtuoso 7.2.11 crashed at box_add | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1173/comments | 5 | 2023-11-14T15:09:37Z | 2023-12-04T15:14:14Z | https://github.com/openlink/virtuoso-opensource/issues/1173 | 1,992,943,303 | 1,173 |
CVE-2023-48950 | 2023-11-29T20:15:08.033 | An issue in the box_col_len function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1174"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1174 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 nvarchar ) ;
INSERT INTO v0 VALUES ( 1 ) ;
INSERT INTO v0 SELECT MAX ( DISTINCT v1 ) FROM v0 ;
INSERT INTO v0 SELECT v1 FROM v0 WHERE ( SELECT ( SELECT v1 FROM v0 ) ) ;
```
backtrace:
```c
#0 0x86df90 (box_col_len+0x90)
#1 0x88c0af (... | Fuzzer: Virtuoso 7.2.11 crashed at box_col_len | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1174/comments | 1 | 2023-11-14T15:11:41Z | 2023-11-20T16:30:19Z | https://github.com/openlink/virtuoso-opensource/issues/1174 | 1,992,947,289 | 1,174 |
CVE-2023-48951 | 2023-11-29T20:15:08.087 | An issue in the box_equal function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1177"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1177 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 SMALLINT CHECK ( CONTAINS ( 'del' , 'reabbreviating' , 'diamonds' ) ) ) ;
```
backtrace:
```c
#0 0xdeab6a (box_equal+0xba)
#1 0x773df3 (sqlo_cname_ot+0x53)
#2 0x6e0161 (sqlo_df+0x461)
#3 0x6e0d6c (sqlo_df+0x106c)
#4 0x6e067f (sqlo_df+0x97f... | Fuzzer: Virtuoso 7.2.11 crashed at box_equal | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1177/comments | 1 | 2023-11-14T15:15:32Z | 2023-11-20T16:29:31Z | https://github.com/openlink/virtuoso-opensource/issues/1177 | 1,992,954,809 | 1,177 |
CVE-2023-48952 | 2023-11-29T20:15:08.133 | An issue in the box_deserialize_reusing function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/openlink/virtuoso-opensource/issues/1175"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.11:*:*:*:open_source:*:*:*",
"matchCriteriaId": "CFFFE658-0D7C-4439-B193-1595F8F965F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"ver... | https://github.com/openlink/virtuoso-opensource/issues/1175 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"openlink",
"virtuoso-opensource"
] | The PoC is generated by my DBMS fuzzer.
```SQL
CREATE TABLE v0 ( v1 INT , v2 BIGINT PRIMARY KEY) ;
INSERT INTO v0 VALUES ( 20 , -1 ) ;
SELECT v1 + 77 , v2 FROM v0 UNION SELECT v2 , CASE WHEN 92 THEN 86 ELSE ( ( 32433852.000000 , 70038895.000000 ) , ( 64572024.000000 , 4442219.000000 ) ) END FROM v0 ORDER BY v2 + ... | Fuzzer: Virtuoso 7.2.11 crashed at box_deserialize_reusing | https://api.github.com/repos/openlink/virtuoso-opensource/issues/1175/comments | 3 | 2023-11-14T15:13:36Z | 2023-12-04T14:53:16Z | https://github.com/openlink/virtuoso-opensource/issues/1175 | 1,992,951,081 | 1,175 |
CVE-2023-48813 | 2023-12-01T16:15:07.487 | Senayan Library Management Systems (Slims) 9 Bulian v9.6.1 is vulnerable to SQL Injection via admin/modules/reporting/customs/fines_report.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/komangsughosa/CVE-ID-not-yet/blob/main/slims/slims9_bulian-9.6.1-SQLI-fines_report.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/slims/slims9_bulian/issues/217 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"slims",
"slims9_bulian"
] | **Describe the bug**
A SQL Injection exists in admin/modules/reporting/customs/fines_report.php at the code below
```php
$selected_year = date('Y');
if (isset($_GET['year']) AND !empty($_GET['year'])) {
$selected_year = (integer)$_GET['year'];
}
// month
$selected_month = date('m');
... | [Security Bugs] SQL Injection at fines_report.php | https://api.github.com/repos/slims/slims9_bulian/issues/217/comments | 0 | 2023-11-13T00:00:09Z | 2023-11-13T00:00:09Z | https://github.com/slims/slims9_bulian/issues/217 | 1,989,644,007 | 217 |
CVE-2023-48893 | 2023-12-01T16:15:07.607 | SLiMS (aka SENAYAN Library Management System) through 9.6.1 allows admin/modules/reporting/customs/staff_act.php SQL Injection via startDate or untilDate. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/Vuln0wned/slims_owned/blob/main/slims/slims9-bulian-9.6.1-SQLI-staff_act.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/slims/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slims:senayan_library_management_system_bulian:9.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0439647C-9560-44A0-B186-BFDF828ECD17",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/slims/slims9_bulian/issues/209 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"slims",
"slims9_bulian"
] | ## The Bug
A SQL Injection exists in `admin/modules/reporting/customs/staff_act.php` at the code below
```php
// create datagrid
$reportgrid = new report_datagrid();
$reportgrid->setSQLColumn('u.realname AS \''.__('Real Name').'\'',
'u.username AS \''.__('Login Username').'\'',
'u.user_id AS \''._... | Vuln0wned Report: SQL Injection in staff_act.php | https://api.github.com/repos/slims/slims9_bulian/issues/209/comments | 0 | 2023-09-01T09:36:16Z | 2023-09-05T06:25:21Z | https://github.com/slims/slims9_bulian/issues/209 | 1,877,090,139 | 209 |
CVE-2023-49955 | 2023-12-07T13:15:07.690 | An issue was discovered in Dalmann OCPP.Core before 1.2.0 for OCPP (Open Charge Point Protocol) for electric vehicles. It does not validate the length of the chargePointVendor field in a BootNotification message, potentially leading to server instability and a denial of service when processing excessively large inputs.... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dallmann-consulting/OCPP.Core/issues/32"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dallmann-consulting:open_charge_point_protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1570FC53-9573-4F61-A082-9E51BE80961D",
"versionEndExcluding": "1.2.0",
"versionEndIncluding": null,
... | https://github.com/dallmann-consulting/OCPP.Core/issues/32 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dallmann-consulting",
"OCPP.Core"
] | **Description of the possible vulnerability**:
While performing black box testing on OCPP.Core on my local machine, I discovered a potential security vulnerability that might lead to a Denial of Service (DoS) attack.
**Details**:
- There appears to be no control over the length of the `chargePointVendor` property... | Possible DoS Vulnerability: No Control on length of 'chargePointVendor' property in 'BootNotification' OCPP message | https://api.github.com/repos/dallmann-consulting/OCPP.Core/issues/32/comments | 4 | 2023-11-02T14:29:58Z | 2023-11-30T19:19:39Z | https://github.com/dallmann-consulting/OCPP.Core/issues/32 | 1,974,386,343 | 32 |
CVE-2023-49956 | 2023-12-07T13:15:07.737 | An issue was discovered in Dalmann OCPP.Core before 1.3.0 for OCPP (Open Charge Point Protocol) for electric vehicles. A StopTransaction message with any random transactionId terminates active transactions. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dallmann-consulting/OCPP.Core/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dallmann-consulting:open_charge_point_protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C39AD5F2-CEA9-4F62-B0BA-34A433016635",
"versionEndExcluding": "1.3.0",
"versionEndIncluding": null,
... | https://github.com/dallmann-consulting/OCPP.Core/issues/34 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dallmann-consulting",
"OCPP.Core"
] | **Issue Description**:
The server allows a `StopTransaction` message to stop an active transaction using a random `transactionId` instead of requiring the specific `transactionId` assigned at the start of the transaction. This could potentially lead to unauthorized stopping of transactions.
**Steps to Reproduce**:
... | `StopTransaction`: a Transaction Can Be Stopped with Random Transaction ID | https://api.github.com/repos/dallmann-consulting/OCPP.Core/issues/34/comments | 2 | 2023-11-06T18:54:32Z | 2023-12-06T16:02:05Z | https://github.com/dallmann-consulting/OCPP.Core/issues/34 | 1,979,855,956 | 34 |
CVE-2023-49957 | 2023-12-07T13:15:07.790 | An issue was discovered in Dalmann OCPP.Core before 1.3.0 for OCPP (Open Charge Point Protocol) for electric vehicles. It permits multiple transactions with the same connectorId and idTag, contrary to the expected ConcurrentTx status. This could result in critical transaction management and billing errors. NOTE: the ve... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dallmann-consulting/OCPP.Core/issues/35"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dallmann-consulting:open_charge_point_protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C39AD5F2-CEA9-4F62-B0BA-34A433016635",
"versionEndExcluding": "1.3.0",
"versionEndIncluding": null,
... | https://github.com/dallmann-consulting/OCPP.Core/issues/35 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dallmann-consulting",
"OCPP.Core"
] | **Issue Description**:
The current implementation of the OCPP server does not adhere to the specified behavior in the OCPP documentation regarding concurrent transactions. The documentation states that if an `idTag` is already involved in an active transaction, any attempt to initiate a new transaction with the same `... | Multiple Transactions Allowed with Same connectorId and idTag | https://api.github.com/repos/dallmann-consulting/OCPP.Core/issues/35/comments | 2 | 2023-11-06T19:01:50Z | 2023-12-06T16:03:55Z | https://github.com/dallmann-consulting/OCPP.Core/issues/35 | 1,979,869,657 | 35 |
CVE-2023-49958 | 2023-12-07T13:15:07.833 | An issue was discovered in Dalmann OCPP.Core through 1.2.0 for OCPP (Open Charge Point Protocol) for electric vehicles. The server processes mishandle StartTransaction messages containing additional, arbitrary properties, or duplicate properties. The last occurrence of a duplicate property is accepted. This could be ex... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/dallmann-consulting/OCPP.Core/issues/36"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dallmann-consulting:open_charge_point_protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2779F2A-1D74-4C69-8151-B5E9D49F025A",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
... | https://github.com/dallmann-consulting/OCPP.Core/issues/36 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"dallmann-consulting",
"OCPP.Core"
] | **Issue Description**:
The server accepts additional, arbitrary properties in the `StartTransaction` message, and when duplicate properties are provided, it accepts the last occurrence without validation. For example, a message with two different `connectorId` properties is processed using the value of the last one.
... | Unvalidated Acceptance of Additional and Duplicate Properties in `StartTransaction` Message | https://api.github.com/repos/dallmann-consulting/OCPP.Core/issues/36/comments | 11 | 2023-11-06T19:10:53Z | 2023-12-28T12:59:10Z | https://github.com/dallmann-consulting/OCPP.Core/issues/36 | 1,979,885,162 | 36 |
CVE-2023-49492 | 2023-12-07T16:15:07.587 | DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the imgstick parameter at selectimages.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*",
"matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/Hebing123/cve/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | **Description**
DedeCMS-V5.7.111 has Reflective XSS vulnerabilities in imgstick and v parameters of selectimages.php
**Proof of Concept**
http://192.168.160.132:1434/uploads/include/dialog/select_images.php?activepath=/uploads/uploads/allimg&f=form1.pic1&imgstick=smallundefined%27%3E%3CScRiPt%20%3Ealert(document.c... | DedeCMS-V5.7.111 Reflective XSS vulnerability | https://api.github.com/repos/Hebing123/cve/issues/2/comments | 2 | 2023-11-23T10:03:34Z | 2024-05-14T09:53:12Z | https://github.com/Hebing123/cve/issues/2 | 2,007,862,637 | 2 |
CVE-2023-46871 | 2023-12-07T18:15:08.030 | GPAC version 2.3-DEV-rev602-ged8424300-master in MP4Box contains a memory leak in NewSFDouble scenegraph/vrml_tools.c:300. This vulnerability may lead to a denial of service. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/ReturnHere/d0899bb03b8f5e8fae118f2b76888486"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Adviso... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "373C4F43-207C-47CB-B454-BD90A52F0ECF",
"versionEndExcluding": null,
"versionEndIncluding": "2.3-dev-rev602-ged8424300-master",
... | https://github.com/gpac/gpac/issues/2658 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ ] I looked for a similar issue and couldn't find any.
- [ ] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ ] I give enough info... | Memory leaks in NewSFDouble scenegraph/vrml_tools.c:300 | https://api.github.com/repos/gpac/gpac/issues/2658/comments | 2 | 2023-10-23T06:39:49Z | 2023-12-09T11:54:02Z | https://github.com/gpac/gpac/issues/2658 | 1,956,459,097 | 2,658 |
CVE-2023-48958 | 2023-12-07T18:15:08.130 | gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in gf_mpd_resolve_url media_tools/mpd.c:4589. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/dr0v/1204f7a5f1e1497e7bca066638acfbf5"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https:/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2689 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | 1、Version
./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io/
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configu... | LeakSanitizer: detected memory leaks in in gf_mpd_resolve_url media_tools/mpd.c:4589 | https://api.github.com/repos/gpac/gpac/issues/2689/comments | 0 | 2023-11-16T01:53:56Z | 2023-11-16T10:21:02Z | https://github.com/gpac/gpac/issues/2689 | 1,995,888,449 | 2,689 |
CVE-2023-49460 | 2023-12-07T20:15:38.140 | libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::decode_uncompressed_image. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libheif/issues/1046"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libheif:1.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8776EE2B-B4B8-4509-BC0C-3668329FF6C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/strukturag/libheif/issues/1046 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"strukturag",
"libheif"
] | ### Description
AddressSanitizer: SEGV in `decode_uncompressed_image`
### Version
```
commit: 64ece913266609789f5dc70fe7de9eb759badd7f
heif-convert libheif version: 1.17.5
-------------------------------------------
Usage: heif-convert [options] <input-image> [output-image]
The program determines th... | AddressSanitizer: SEGV in `decode_uncompressed_image` | https://api.github.com/repos/strukturag/libheif/issues/1046/comments | 2 | 2023-11-22T12:10:09Z | 2023-12-14T15:36:32Z | https://github.com/strukturag/libheif/issues/1046 | 2,006,207,463 | 1,046 |
CVE-2023-49462 | 2023-12-07T20:15:38.190 | libheif v1.17.5 was discovered to contain a segmentation violation via the component /libheif/exif.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libheif/issues/1043"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libheif:1.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8776EE2B-B4B8-4509-BC0C-3668329FF6C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/strukturag/libheif/issues/1043 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libheif"
] | ### Description
SEGV `libheif/libheif/exif.cc:55` in `read16`
### Version
```
heif-convert libheif version: 1.17.5
-------------------------------------------
Usage: heif-convert [options] <input-image> [output-image]
The program determines the output file format from the output filename suffix.
Thes... | SEGV libheif/libheif/exif.cc:55 in read16 | https://api.github.com/repos/strukturag/libheif/issues/1043/comments | 2 | 2023-11-22T09:15:02Z | 2023-12-14T15:09:47Z | https://github.com/strukturag/libheif/issues/1043 | 2,005,894,442 | 1,043 |
CVE-2023-49463 | 2023-12-07T20:15:38.260 | libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/strukturag/libheif"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libheif/issues/1042"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libheif:1.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8776EE2B-B4B8-4509-BC0C-3668329FF6C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/strukturag/libheif/issues/1042 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libheif"
] | ### Description
SEGV `libheif/libheif/exif.cc:88` in `find_exif_tag`
### Version
```
heif-convert libheif version: 1.17.5
-------------------------------------------
Usage: heif-convert [options] <input-image> [output-image]
The program determines the output file format from the output filename suffix... | SEGV libheif/libheif/exif.cc:88 in find_exif_tag | https://api.github.com/repos/strukturag/libheif/issues/1042/comments | 1 | 2023-11-22T09:11:42Z | 2023-12-14T12:38:24Z | https://github.com/strukturag/libheif/issues/1042 | 2,005,888,692 | 1,042 |
CVE-2023-49464 | 2023-12-07T20:15:38.320 | libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libheif/issues/1044"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libheif:1.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8776EE2B-B4B8-4509-BC0C-3668329FF6C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/strukturag/libheif/issues/1044 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libheif"
] | ### Description
heap-use-after-free/SEGV/heap-buffer-overflow `libheif/libheif/uncompressed_image.cc:537` in `UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci`
### Version
```
commit: 64ece913266609789f5dc70fe7de9eb759badd7f
heif-convert libheif version: 1.17.5
--------------------... | heap-use-after-free/SEGV/heap-buffer-overflow in UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci | https://api.github.com/repos/strukturag/libheif/issues/1044/comments | 1 | 2023-11-22T11:55:49Z | 2023-12-07T20:31:37Z | https://github.com/strukturag/libheif/issues/1044 | 2,006,182,548 | 1,044 |
CVE-2023-49465 | 2023-12-07T20:15:38.370 | Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function at motion.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/435"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B160149E-E072-4FC7-8E38-E3C469C78472",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/435 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | ### Description
heap-buffer-overflow `libde265/libde265/motion.cc:1860` in `derive_spatial_luma_vector_prediction(base_context*, de265_image*, slice_segment_header const*, int, int, int, int, int, int, int, int, int, int, unsigned char*, MotionVector*)`
### Version
```
dec265 v1.0.14
-----------------
usa... | heap-buffer-overflow `libde265/libde265/motion.cc:1860` in `derive_spatial_luma_vector_prediction` | https://api.github.com/repos/strukturag/libde265/issues/435/comments | 3 | 2023-11-23T02:44:12Z | 2023-12-20T10:49:09Z | https://github.com/strukturag/libde265/issues/435 | 2,007,396,948 | 435 |
CVE-2023-49467 | 2023-12-07T20:15:38.427 | Libde265 v1.0.14 was discovered to contain a heap-buffer-overflow vulnerability in the derive_combined_bipredictive_merging_candidates function at motion.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/434"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B160149E-E072-4FC7-8E38-E3C469C78472",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/434 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | ### Description
heap-buffer-overflow `eva/put/libde265/libde265/motion.cc:1443` in `derive_combined_bipredictive_merging_candidates(base_context const*, slice_segment_header const*, PBMotion*, int*, int)`
### Version
```
dec265 v1.0.14
-----------------
usage: dec265 [options] videofile.bin
The video fil... | heap-buffer-overflow `libde265/libde265/motion.cc:1443` in `derive_combined_bipredictive_merging_candidates` | https://api.github.com/repos/strukturag/libde265/issues/434/comments | 3 | 2023-11-23T02:39:56Z | 2023-12-20T10:47:44Z | https://github.com/strukturag/libde265/issues/434 | 2,007,393,613 | 434 |
CVE-2023-49468 | 2023-12-07T20:15:38.477 | Libde265 v1.0.14 was discovered to contain a global buffer overflow vulnerability in the read_coding_unit function at slice.cc. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/strukturag/libde265/issues/432"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libde265:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B160149E-E072-4FC7-8E38-E3C469C78472",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | https://github.com/strukturag/libde265/issues/432 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"strukturag",
"libde265"
] | ### Description
global-buffer-overflow `libde265/libde265/slice.cc:4493` in `read_coding_unit(thread_context*, int, int, int, int)`
### Version
```
dec265 v1.0.14
-----------------
usage: dec265 [options] videofile.bin
The video file must be a raw bitstream, or a stream with NAL units (option -n).
opt... | global-buffer-overflow in read_coding_unit | https://api.github.com/repos/strukturag/libde265/issues/432/comments | 8 | 2023-11-22T10:12:42Z | 2023-12-20T19:14:23Z | https://github.com/strukturag/libde265/issues/432 | 2,005,999,851 | 432 |
CVE-2023-6507 | 2023-12-08T19:15:08.440 | An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases.
When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling... | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"inte... | [
{
"source": "cna@python.org",
"tags": null,
"url": "https://github.com/python/cpython/commit/10e9bb13b8dcaa414645b9bd10718d8f7179e82b"
},
{
"source": "cna@python.org",
"tags": null,
"url": "https://github.com/python/cpython/commit/85bbfa8a4bbdbb61a3a84fbd7cb29a4096ab8a06"
},
{
"s... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:python:3.12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5C76EDC2-43FF-448B-B65C-20AC83D680FE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/python/cpython/issues/112334 | [
"Issue Tracking",
"Patch"
] | github.com | [
"python",
"cpython"
] | # Bug report
### Bug description:
Apologies if this is a duplicate. I couldn’t find a similar report, though.
# The issue and how to reproduce
We’re seeing a performance regression since 124af17b6e. The best way to reproduce it is to spawn lots of processes from a `ThreadPoolExecutor`. For example:
```python
#!/us... | subprocess.Popen: Performance regression on Linux since 124af17b6e [CVE-2023-6507] | https://api.github.com/repos/python/cpython/issues/112334/comments | 3 | 2023-11-23T10:53:20Z | 2023-12-08T21:00:58Z | https://github.com/python/cpython/issues/112334 | 2,007,974,265 | 112,334 |
CVE-2023-47465 | 2023-12-09T06:15:45.530 | An issue in GPAC v.2.2.1 and before allows a local attacker to cause a denial of service (DoS) via the ctts_box_read function of file src/isomedia/box_code_base.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/gpac/gpac/issues/2652"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "047BC15F-5E51-48D9-B751-9DC9311FEBCF",
"versionEndExcluding": null,
"versionEndIncluding": "2.2.1",
"versionStartExcluding": n... | https://github.com/gpac/gpac/issues/2652 | [
"Issue Tracking",
"Patch"
] | github.com | [
"gpac",
"gpac"
] | [Y] I looked for a similar issue and couldn't find any.
[Y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
[Y] I give enough information for contributors to reproduce my issue
Description
There is a integer overflow issue in isomedia/box_code_base.c:... | Integer overflow issue in isomedia/box_code_base.c:413 | https://api.github.com/repos/gpac/gpac/issues/2652/comments | 1 | 2023-10-19T09:06:47Z | 2023-12-08T06:37:55Z | https://github.com/gpac/gpac/issues/2652 | 1,951,673,630 | 2,652 |
CVE-2023-46932 | 2023-12-09T07:15:07.663 | Heap Buffer Overflow vulnerability in GPAC version 2.3-DEV-rev617-g671976fcc-master, allows attackers to execute arbitrary code and cause a denial of service (DoS) via str2ulong class in src/media_tools/avilib.c in gpac/MP4Box. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/gpac/gpac/issues/2669"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev617-g671976fcc-master:*:*:*:*:*:*:*",
"matchCriteriaId": "F540C691-D615-4A9B-8DD6-69B8488E3BA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2669 | [
"Exploit"
] | github.com | [
"gpac",
"gpac"
] | # heap-buffer-overflow in str2ulong src/media_tools/avilib.c:137:16 in gpac/MP4Box
### Description
Heap-buffer-overflow in MP4Box.
#0 0x7ffff694c441 in str2ulong /afltest/gpac2/src/media_tools/avilib.c:137:16
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev617-g671976fcc-master
(c) 2000-2023 Teleco... | heap-buffer-overflow in str2ulong src/media_tools/avilib.c:137:16 in gpac/MP4Box | https://api.github.com/repos/gpac/gpac/issues/2669/comments | 0 | 2023-10-26T18:25:32Z | 2023-12-04T10:07:48Z | https://github.com/gpac/gpac/issues/2669 | 1,964,116,818 | 2,669 |
CVE-2023-49488 | 2023-12-11T21:15:07.283 | A cross-site scripting (XSS) vulnerability in Openfiler ESA v2.99.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the nic parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openfiler:openfiler:2.99.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9E197DA0-C790-44F4-B91D-1BCB91BE47F1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/Hebing123/cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | https://[ip]:446/admin/system.html?nic=eth0%3CScRiPt%20%3Ealert(document.cookie)%3C/ScRiPt%3E&step=addvlan

| Openfiler ESA 2.99.1 Reflective XSS Vulnerability | https://api.github.com/repos/Hebing123/cve/issues/1/comments | 1 | 2023-11-23T03:00:09Z | 2024-01-11T03:30:06Z | https://github.com/Hebing123/cve/issues/1 | 2,007,406,882 | 1 |
CVE-2023-49494 | 2023-12-11T21:15:07.397 | DedeCMS v5.7.111 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the component select_media_post_wangEditor.php. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://dedecms.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Hebing123/cve/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dedecms:dedecms:5.7.111:*:*:*:*:*:*:*",
"matchCriteriaId": "377F392A-A04B-4E7A-BBE8-F77CE65BDFCF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/Hebing123/cve/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Hebing123",
"cve"
] | **Description**
DedeCMS-V5.7.111 has Reflective XSS vulnerability in filename parameter of select_media_post_wangEditor.php
**Proof of Concept**
http://192.168.160.132:1434/uploads/include/dialog/select_media_post_wangEditor.php?filename=1%3Cinput%20onfocus=eval(atob(this.id))%20id=YWxlcnQoZG9jdW1lbnQuY29va2llKT... | DedeCMS-V5.7.111 Reflective XSS vulnerability in select_media_post_wangEditor.php | https://api.github.com/repos/Hebing123/cve/issues/3/comments | 1 | 2023-11-23T10:22:21Z | 2024-05-04T11:28:44Z | https://github.com/Hebing123/cve/issues/3 | 2,007,897,963 | 3 |
CVE-2023-49990 | 2023-12-12T14:15:07.553 | Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the function SetUpPhonemeTable at synthdata.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/espeak-ng/espeak-ng/issues/1824"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*",
"matchCriteriaId": "B073B0F6-3979-4E7D-BF6F-29C9EB1F3480",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/espeak-ng/espeak-ng/issues/1824 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"espeak-ng",
"espeak-ng"
] | **System info**
Ubuntu x86_64, clang 12.0
version: espeak-ng(1.52-dev)
**Command line**
./espeak-ng -f poc -w /dev/null
**Poc**
poc:[poc](https://github.com/SEU-SSL/Poc/blob/main/espeak-ng/id_000064%2Csig_11%2Csrc_008778%2Cop_havoc%2Crep_2)
**AddressSanitizer output**
==4070074==ERROR: AddressSanitizer: g... | global-buffer-overflow exists in the function SetUpPhonemeTable in synthdata.c | https://api.github.com/repos/espeak-ng/espeak-ng/issues/1824/comments | 1 | 2023-11-13T03:26:19Z | 2023-12-17T12:53:26Z | https://github.com/espeak-ng/espeak-ng/issues/1824 | 1,989,818,650 | 1,824 |
CVE-2023-49991 | 2023-12-12T14:15:07.600 | Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow via the function CountVowelPosition at synthdata.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/espeak-ng/espeak-ng/issues/1825"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*",
"matchCriteriaId": "B073B0F6-3979-4E7D-BF6F-29C9EB1F3480",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/espeak-ng/espeak-ng/issues/1825 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"espeak-ng",
"espeak-ng"
] | **System info**
Ubuntu x86_64, clang 12.0
version: espeak-ng(1.52-dev)
**Command line**
./espeak-ng -f poc -w /dev/null
**Poc**
poc:[poc](https://github.com/SEU-SSL/Poc/blob/main/espeak-ng/id_000092%2Csig_11%2Csrc_009714%2Cop_havoc%2Crep_2)
**AddressSanitizer output**
==4070186==ERROR: AddressSanitizer: s... | stack-buffer-underflow exists in the function CountVowelPosition in synthdata.c | https://api.github.com/repos/espeak-ng/espeak-ng/issues/1825/comments | 1 | 2023-11-13T03:33:30Z | 2023-12-17T12:53:16Z | https://github.com/espeak-ng/espeak-ng/issues/1825 | 1,989,824,628 | 1,825 |
CVE-2023-49992 | 2023-12-12T14:15:07.653 | Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow via the function RemoveEnding at dictionary.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/espeak-ng/espeak-ng/issues/1827"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*",
"matchCriteriaId": "B073B0F6-3979-4E7D-BF6F-29C9EB1F3480",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/espeak-ng/espeak-ng/issues/1827 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"espeak-ng",
"espeak-ng"
] | **System info**
Ubuntu x86_64, clang 12.0
version: espeak-ng(1.52-dev)
**Command line**
./espeak-ng -f poc -w /dev/null
**Poc**
poc:[poc](https://github.com/SEU-SSL/Poc/blob/main/espeak-ng/id_000209%2Csig_07%2Csrc_000384%2Cop_havoc%2Crep_32)
**AddressSanitizer output**
==4070654==ERROR: AddressSanitizer: ... | stack-buffer-overflow exists in the function RemoveEnding in dictionary.c | https://api.github.com/repos/espeak-ng/espeak-ng/issues/1827/comments | 1 | 2023-11-13T03:37:25Z | 2023-12-17T12:53:03Z | https://github.com/espeak-ng/espeak-ng/issues/1827 | 1,989,827,779 | 1,827 |
CVE-2023-49993 | 2023-12-12T14:15:07.700 | Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow via the function ReadClause at readclause.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrit... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/espeak-ng/espeak-ng/issues/1826"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*",
"matchCriteriaId": "B073B0F6-3979-4E7D-BF6F-29C9EB1F3480",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/espeak-ng/espeak-ng/issues/1826 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"espeak-ng",
"espeak-ng"
] | **System info**
Ubuntu x86_64, clang 12.0
version: espeak-ng(1.52-dev)
**Command line**
./espeak-ng -f poc -w /dev/null
**Poc**
poc:[poc](https://github.com/SEU-SSL/Poc/blob/main/espeak-ng/id_000205%2Csig_11%2Csrc_013749%2Cop_havoc%2Crep_4)
**AddressSanitizer output**
==4070638==ERROR: AddressSanitizer: g... | global-buffer-overflow exists in the function ReadClause in readclause.c | https://api.github.com/repos/espeak-ng/espeak-ng/issues/1826/comments | 1 | 2023-11-13T03:35:17Z | 2023-12-17T12:53:10Z | https://github.com/espeak-ng/espeak-ng/issues/1826 | 1,989,826,100 | 1,826 |
CVE-2023-49994 | 2023-12-12T14:15:07.750 | Espeak-ng 1.52-dev was discovered to contain a Floating Point Exception via the function PeaksToHarmspect at wavegen.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/espeak-ng/espeak-ng/issues/1823"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:espeak-ng:espeak-ng:1.52:dev:*:*:*:*:*:*",
"matchCriteriaId": "B073B0F6-3979-4E7D-BF6F-29C9EB1F3480",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | https://github.com/espeak-ng/espeak-ng/issues/1823 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"espeak-ng",
"espeak-ng"
] | **System info**
Ubuntu x86_64, clang 12.0
version: espeak-ng(1.52-dev)
**Command line**
./espeak-ng -f poc -w /dev/null
**Poc**
poc:[poc](https://github.com/SEU-SSL/Poc/blob/main/espeak-ng/id_000000%2Csig_08%2Csrc_003156%2B002428%2Cop_splice%2Crep_32)
**AddressSanitizer output**
==4069818==ERROR: AddressS... | Floating Point Exception exists in the function PeaksToHarmspect in wavegen.c | https://api.github.com/repos/espeak-ng/espeak-ng/issues/1823/comments | 1 | 2023-11-13T03:23:53Z | 2023-12-17T12:29:31Z | https://github.com/espeak-ng/espeak-ng/issues/1823 | 1,989,816,339 | 1,823 |
CVE-2023-6772 | 2023-12-13T19:15:08.513 | A vulnerability, which was classified as critical, was found in OTCMS 7.01. Affected is an unknown function of the file /admin/ind_backstage.php. The manipulation of the argument sqlContent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "MULTIPLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PAR... | [
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Num-Nine/CVE/issues/8"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:otcms:otcms:7.01:*:*:*:*:*:*:*",
"matchCriteriaId": "18E47DA7-DFAF-4D23-A3F5-3C1631975FA1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding":... | https://github.com/Num-Nine/CVE/issues/8 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Num-Nine",
"CVE"
] | 1.Official website:http://otcms.com/
2.Hole location: /admin/ind_backstage.php
3.Log in to the background and send the packet as follows
POST /admin/sysCheckFile_deal.php?mudi=sql HTTP/1.1
Host: otcms.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0... | sql injection exists in otcmsV7.01 | https://api.github.com/repos/QianGeG/CVE/issues/8/comments | 0 | 2023-12-11T09:51:15Z | 2023-12-11T09:51:15Z | https://github.com/QianGeG/CVE/issues/8 | 2,035,266,663 | 8 |
CVE-2023-50566 | 2023-12-14T15:15:10.460 | A stored cross-site scripting (XSS) vulnerability in EyouCMS-V1.6.5-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Registration Number parameter. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integ... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weng-xianhu/eyoucms/issues/56"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyoucms:eyoucms:1.6.5-utf8-sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "920C4179-21B4-4BEC-AC3C-8C7530C41B13",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | https://github.com/weng-xianhu/eyoucms/issues/56 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weng-xianhu",
"eyoucms"
] | Version : V1.6.5

Vulnerability point 1:
"基本信息"->"备案号"&“公安备案号”->"代码模式",HTML code can be edited directly:

![ima... | EyouCMS-V1.6.5-UTF8-SP1 has a stored XSS vulnerability | https://api.github.com/repos/weng-xianhu/eyoucms/issues/56/comments | 1 | 2023-12-08T08:39:23Z | 2024-03-22T06:31:10Z | https://github.com/weng-xianhu/eyoucms/issues/56 | 2,032,215,326 | 56 |
CVE-2023-50979 | 2023-12-18T04:15:50.970 | Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"int... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://github.com/weidai11/cryptopp/issues/1247"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3A7AA7-A0EF-4363-A9D8-D1D31498B936",
"versionEndExcluding": null,
"versionEndIncluding": "8.9.0",
"versionStartE... | https://github.com/weidai11/cryptopp/issues/1247 | [
"Exploit"
] | github.com | [
"weidai11",
"cryptopp"
] | ### Crypto++ Issue Report
I've verified that the Crypto++ is vulnerable to the [Marvin Attack](https://people.redhat.com/~hkario/marvin/)—a timing variant of the well-known Bleichenbacher attack.
I've executed the test on ArchLinux, using crypto++ 8.9.0 from the Arch repository.
The reproducer is available in th... | Crypto++ vulnerable to the Marvin Attack | https://api.github.com/repos/weidai11/cryptopp/issues/1247/comments | 1 | 2023-11-12T12:57:41Z | 2024-01-29T00:45:42Z | https://github.com/weidai11/cryptopp/issues/1247 | 1,989,391,420 | 1,247 |
CVE-2023-50980 | 2023-12-18T04:15:51.067 | gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weidai11/cryptopp/issues/1248"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3A7AA7-A0EF-4363-A9D8-D1D31498B936",
"versionEndExcluding": null,
"versionEndIncluding": "8.9.0",
"versionStartE... | https://github.com/weidai11/cryptopp/issues/1248 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weidai11",
"cryptopp"
] | Hi, recently I found a security issue in the `Crypto++` library that would cause a segmentation fault when parsing DER public key files of the `F(2^m)` class curves, an attacker could potentially craft a malformed DER public key file, and any user or server attempting to read this public key file in processes such as `... | EC2N::DecodePoint can crash if exponents are not in descending order | https://api.github.com/repos/weidai11/cryptopp/issues/1248/comments | 2 | 2023-11-20T06:28:23Z | 2023-11-22T02:37:26Z | https://github.com/weidai11/cryptopp/issues/1248 | 2,001,460,069 | 1,248 |
CVE-2023-50981 | 2023-12-18T04:15:51.147 | ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/weidai11/cryptopp/issues/1249"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3A7AA7-A0EF-4363-A9D8-D1D31498B936",
"versionEndExcluding": null,
"versionEndIncluding": "8.9.0",
"versionStartE... | https://github.com/weidai11/cryptopp/issues/1249 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"weidai11",
"cryptopp"
] | Hi, recently I found a security issue in the [ModularSquareRoot](https://github.com/weidai11/cryptopp/blob/3e3b8af96d4d957b77588be91df7715efbe2ed69/nbtheory.cpp#L544) function of `Crypto++` library that would cause an infinite loop, since this function is being used in [ECP::DecodePoint](https://github.com/weidai11/cry... | A security issue in the `ModularSquareRoot` function leads to a DOS attack | https://api.github.com/repos/weidai11/cryptopp/issues/1249/comments | 8 | 2023-11-20T11:59:01Z | 2024-08-08T04:17:46Z | https://github.com/weidai11/cryptopp/issues/1249 | 2,002,042,178 | 1,249 |
CVE-2023-49006 | 2023-12-19T10:15:07.883 | Cross Site Request Forgery (CSRF) vulnerability in Phpsysinfo version 3.4.3 allows a remote attacker to obtain sensitive information via a crafted page in the XML.php file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"inte... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/Hebing123/cve/issues/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/phpsysinfo/phpsysinfo/commit/4f2cee505e4f2e9b369a321063ff2c5e... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpsysinfo:phpsysinfo:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E23F0F66-F333-46A3-97D0-044CB005C884",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | https://github.com/Hebing123/cve/issues/5 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"Hebing123",
"cve"
] | ### **Description**
phpsysinfo v3.4.3 has JSONP vulnerability.The XML.php file has a JSONP hijacking vulnerability. When a user visits a page carefully crafted by the attacker, the JSON data is obtained and sent to the attacker.
### **Proof of Concept**
We created an HTML file as a proof of concept to showcase the... | XML.php JSONP hijacking in phpsysinfo v3.4.3 | https://api.github.com/repos/Hebing123/cve/issues/5/comments | 1 | 2023-12-15T07:09:51Z | 2024-03-11T06:23:33Z | https://github.com/Hebing123/cve/issues/5 | 2,043,028,601 | 5 |
CVE-2023-50044 | 2023-12-20T09:15:07.297 | Cesanta MJS 2.20.0 has a getprop_builtin_foreign out-of-bounds read if a Built-in API name occurs in a substring of an input string. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/cesanta/mjs/issues/254"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/cesanta/mjs/pull/255"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.22.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56AA92AF-E8DC-45C1-9BD0-9511720BD225",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/254 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"cesanta",
"mjs"
] | ## Environment
Ubuntu 22.04.3 LTS
## Compiler
clang version 11.0.0
Target: x86_64-unknown-linux-gnu
Thread model: posix
## Affected Version
mjs 2.20.0
## Step to reproduce
```git clone https://github.com/cesanta/mjs.git
cd mjs
git checkout b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551
export LDFLAGS="-... | Segmentation Fault in getprop_builtin_foreign | https://api.github.com/repos/cesanta/mjs/issues/254/comments | 1 | 2023-11-23T03:20:25Z | 2023-12-27T18:24:10Z | https://github.com/cesanta/mjs/issues/254 | 2,007,422,344 | 254 |
CVE-2023-50628 | 2023-12-20T09:15:07.350 | Buffer Overflow vulnerability in libming version 0.4.8, allows attackers to execute arbitrary code and obtain sensitive information via parser.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"in... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/libming/libming/issues/289"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/libming/libming/pull/290"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/libming/libming/issues/289 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"libming",
"libming"
] | ## Environment
Ubuntu 22.04.3 LTS
## Compiler
clang version 11.0.0
Target: x86_64-unknown-linux-gnu
Thread model: posix
## Affected Version
libming 0.4.8
## Step to reproduce
```cd libming
./autogen.sh
./configure --disable-shared --disable-freetype
cd util
./swftophp <PoC file>
```
## Contents of PoC f... | Memory leaks at parser.c:2353:51 | https://api.github.com/repos/libming/libming/issues/289/comments | 1 | 2023-12-07T19:49:34Z | 2023-12-20T01:44:57Z | https://github.com/libming/libming/issues/289 | 2,031,418,685 | 289 |
CVE-2023-49391 | 2023-12-22T11:15:07.517 | An issue was discovered in free5GC version 3.3.0, allows remote attackers to execute arbitrary code and cause a denial of service (DoS) on AMF component via crafted NGAP message. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/free5gc/free5gc/issues/497"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:free5gc:free5gc:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89BA8BA8-E366-48F9-930A-91ED1442AAFE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | https://github.com/free5gc/free5gc/issues/497 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"free5gc",
"free5gc"
] | ## Describe the bug
When testing the free5gc AMF, it always crashes when receiving invalid NGAP messages.
## To Reproduce
Steps to reproduce the behavior:
1. Use https://github.com/free5gc/free5gc-compose as the test target
2. Start it with command `docker compose up`
3. Find the amf address with command `docke... | [Bugs] AMF crashed when receving invalid NGAP messages | https://api.github.com/repos/free5gc/free5gc/issues/497/comments | 1 | 2023-10-25T08:11:58Z | 2023-12-04T09:48:25Z | https://github.com/free5gc/free5gc/issues/497 | 1,960,809,373 | 497 |
CVE-2023-37185 | 2023-12-25T07:15:08.793 | C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the function zfp_prec_decompress at zfp/blosc2-zfp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/Blosc/c-blosc2/commit/425e8a9a59d49378d57e2116b6c9b0190a5986f5"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Blosc/c-blosc2/compare/v2.9.2...v2.9.3"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:c-blosc2_project:c-blosc2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "075116F3-2BB5-414B-82A9-D132E60D4769",
"versionEndExcluding": "2.9.3",
"versionEndIncluding": null,
"versionSt... | https://github.com/Blosc/c-blosc2/issues/519 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Blosc",
"c-blosc2"
] | **Describe the bug**
Null Pointer Dereferencing at line **391** in [plugins/codecs/zfp/blosc2-zfp.c](https://github.com/Blosc/c-blosc2/blob/86fc0f66aa6dd079dbf79d775dc9dc1462830ffd/plugins/codecs/zfp/blosc2-zfp.c#LL391C29-L391C29). This is caused due to using a pointer to a chunk which does not exist. This bug is in t... | Null Pointer Dereferencing bug in plugins/codecs/zfp/blosc2-zfp.c | https://api.github.com/repos/Blosc/c-blosc2/issues/519/comments | 0 | 2023-06-20T21:10:32Z | 2023-06-21T09:17:02Z | https://github.com/Blosc/c-blosc2/issues/519 | 1,766,176,337 | 519 |
CVE-2023-37186 | 2023-12-25T07:15:08.980 | C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference in ndlz/ndlz8x8.c via a NULL pointer to memset. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/Blosc/c-blosc2/commit/d55bfcd6804699e1435dc3e233fd76c8a5d3f9e3"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Blosc/c-blosc2/compare/v2.9.2...v2.9.3"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:c-blosc2_project:c-blosc2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "075116F3-2BB5-414B-82A9-D132E60D4769",
"versionEndExcluding": "2.9.3",
"versionEndIncluding": null,
"versionSt... | https://github.com/Blosc/c-blosc2/issues/522 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Blosc",
"c-blosc2"
] | **Describe the bug**
Null Pointer Dereferencing at line 465 in [plugins/codecs/ndlz/ndlz8x8.c](https://github.com/Blosc/c-blosc2/blob/86fc0f66aa6dd079dbf79d775dc9dc1462830ffd/plugins/codecs/ndlz/ndlz8x8.c#LL465C5-L465C5). This is caused due to passing a null ptr to `memset`.
**To Reproduce**
Run the fuzzing harnes... | Null Pointer Dereferencing bug in plugins/codecs/ndlz/ndlz8x8.c | https://api.github.com/repos/Blosc/c-blosc2/issues/522/comments | 0 | 2023-06-20T21:22:07Z | 2023-06-21T09:17:58Z | https://github.com/Blosc/c-blosc2/issues/522 | 1,766,209,904 | 522 |
CVE-2023-37187 | 2023-12-25T07:15:09.183 | C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the zfp/blosc2-zfp.c zfp_acc_decompress. function. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/Blosc/c-blosc2/commit/425e8a9a59d49378d57e2116b6c9b0190a5986f5"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Blosc/c-blosc2/compare/v2.9.2...v2.9.3"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:c-blosc2_project:c-blosc2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "075116F3-2BB5-414B-82A9-D132E60D4769",
"versionEndExcluding": "2.9.3",
"versionEndIncluding": null,
"versionSt... | https://github.com/Blosc/c-blosc2/issues/520 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"Blosc",
"c-blosc2"
] | **Describe the bug**
Null Pointer Dereferencing at line **152** in [plugins/codecs/zfp/blosc2-zfp.c](https://github.com/Blosc/c-blosc2/blob/86fc0f66aa6dd079dbf79d775dc9dc1462830ffd/plugins/codecs/zfp/blosc2-zfp.c#LL152C19-L152C19). This is caused due to using a pointer to a chunk which does not exist. This bug is in f... | Null Pointer Dereferencing bug in plugins/codecs/zfp/blosc2-zfp.c | https://api.github.com/repos/Blosc/c-blosc2/issues/520/comments | 0 | 2023-06-20T21:11:25Z | 2023-06-21T09:17:12Z | https://github.com/Blosc/c-blosc2/issues/520 | 1,766,179,764 | 520 |
CVE-2023-37188 | 2023-12-25T07:15:09.347 | C-blosc2 before 2.9.3 was discovered to contain a NULL pointer dereference via the function zfp_rate_decompress at zfp/blosc2-zfp.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/Blosc/c-blosc2/commit/425e8a9a59d49378d57e2116b6c9b0190a5986f5"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Blosc/c-blosc2/compare/v2.9.2...v2.9.3"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:c-blosc2_project:c-blosc2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "075116F3-2BB5-414B-82A9-D132E60D4769",
"versionEndExcluding": "2.9.3",
"versionEndIncluding": null,
"versionSt... | https://github.com/Blosc/c-blosc2/issues/521 | [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
] | github.com | [
"Blosc",
"c-blosc2"
] | **Describe the bug**
Null Pointer Dereferencing at line **641** in [plugins/codecs/zfp/blosc2-zfp.c](https://github.com/Blosc/c-blosc2/blob/86fc0f66aa6dd079dbf79d775dc9dc1462830ffd/plugins/codecs/zfp/blosc2-zfp.c#L641). This is caused due to using a pointer to a chunk which does not exist. This bug is in function `zfp... | Null Pointer Dereferencing bug in plugins/codecs/zfp/blosc2-zfp.c | https://api.github.com/repos/Blosc/c-blosc2/issues/521/comments | 0 | 2023-06-20T21:13:30Z | 2023-06-21T09:17:20Z | https://github.com/Blosc/c-blosc2/issues/521 | 1,766,187,839 | 521 |
CVE-2023-51075 | 2023-12-27T21:15:08.300 | hutool-core v5.8.23 was discovered to contain an infinite loop in the StrSplitter.splitByRegex function. This vulnerability allows attackers to cause a Denial of Service (DoS) via manipulation of the first two parameters. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dromara/hutool/issues/3421"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E06EB61A-4250-4F44-9743-3108FF70C157",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/dromara/hutool/issues/3421 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: openjdk_8_201
hutool-core版本: 5.8.23
### 问题描述(包括截图)
在使用StrSplitter.splitByRegex函数时,如果前两个参数为“”,无论后两个参数如何设置,执行程序会进入死循环,最终都会导致程序崩溃(OOM or StackOverFlow)。
1. 复现代码
```java
import org.junit.Test;
import cn.hutool.core.text.*;
import java.util.List;
public class StrSplitterFuzzerSplitByReg... | StrSplitter.splitByRegex函数使用过程中出现OOM or StackOverFlow | https://api.github.com/repos/dromara/hutool/issues/3421/comments | 1 | 2023-12-11T12:24:53Z | 2023-12-11T20:29:51Z | https://github.com/dromara/hutool/issues/3421 | 2,035,564,943 | 3,421 |
CVE-2023-51080 | 2023-12-27T21:15:08.397 | The NumberUtil.toBigDecimal method in hutool-core v5.8.23 was discovered to contain a stack overflow. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/dromara/hutool/issues/3423"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hutool:hutool:5.8.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E06EB61A-4250-4F44-9743-3108FF70C157",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/dromara/hutool/issues/3423 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"dromara",
"hutool"
] | ### 版本情况
JDK版本: openjdk_8_201
hutool-core: 5.8.23(请确保最新尝试是否还有问题)
### 问题描述(包括截图)
在hutool-core的5.8.23版本中,调用NumberUtil.toBigDecimal方法时,如果入参为“NaN”,程序会崩溃,报StackOverflowError
1. 复现代码
```java
import org.junit.Test;
import cn.hutool.core.util.*;
import java.math.BigDecimal;
public class NumberUtilFuzzerToB... | NumberUtil.toBigDecimal方法报StackOverflowError | https://api.github.com/repos/dromara/hutool/issues/3423/comments | 2 | 2023-12-13T06:23:42Z | 2024-01-11T02:39:14Z | https://github.com/dromara/hutool/issues/3423 | 2,039,038,848 | 3,423 |
CVE-2023-26157 | 2024-01-02T05:15:08.160 | Versions of the package libredwg before 0.12.5.6384 are vulnerable to Denial of Service (DoS) due to an out-of-bounds read involving section->num_pages in decode_r2007.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "report@snyk.io",
"tags": [
"Patch"
],
"url": "https://github.com/LibreDWG/libredwg/commit/c8cf03ce4c2315b146caf582ea061c0460193bcc"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
],
"url": "https://github.com/L... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D7618D-9F7C-4654-822E-48A907537B85",
"versionEndExcluding": "0.12.5.6384",
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/LibreDWG/libredwg/issues/850 | [
"Exploit",
"Issue Tracking",
"Patch"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi rurban,
Making a quick report on an out-of-bounds read fuzzing crash. I confirmed this with a build using the `--enable-release` flag as well.
Release build error:
```
./programs/dwgread crash.dwg
ERROR: Invalid num_pages 7274598, skip
ERROR: Invalid section->pages[0] size
Warning: Failed to find secti... | Out-of-Bound Read in read_data_section in 0.12.5 | https://api.github.com/repos/LibreDWG/libredwg/issues/850/comments | 1 | 2023-09-26T13:28:46Z | 2023-10-30T17:06:23Z | https://github.com/LibreDWG/libredwg/issues/850 | 1,913,517,983 | 850 |
CVE-2023-49549 | 2024-01-02T23:15:12.107 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_getretvalpos function in the msj.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/251"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/251 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | SEGV in mjs_getretvalpos | https://api.github.com/repos/cesanta/mjs/issues/251/comments | 0 | 2023-11-18T12:23:24Z | 2023-12-22T02:11:49Z | https://github.com/cesanta/mjs/issues/251 | 2,000,398,994 | 251 |
CVE-2023-49550 | 2024-01-02T23:15:12.167 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs+0x4ec508 component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/252"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/252 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in Cesanta mjs 2.20.0... | SEGV (/mjs/mjs+0x4ec508) | https://api.github.com/repos/cesanta/mjs/issues/252/comments | 0 | 2023-11-18T14:18:44Z | 2023-12-22T02:14:36Z | https://github.com/cesanta/mjs/issues/252 | 2,000,440,009 | 252 |
CVE-2023-49551 | 2024-01-02T23:15:12.233 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/257"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/257 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | SEGV in mjs_op_json_parse() at mjs.c:11364 | https://api.github.com/repos/cesanta/mjs/issues/257/comments | 0 | 2023-11-26T09:51:38Z | 2023-12-22T02:39:20Z | https://github.com/cesanta/mjs/issues/257 | 2,010,974,674 | 257 |
CVE-2023-49552 | 2024-01-02T23:15:12.290 | An Out of Bounds Write in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_stringify function in the msj.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/256"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/256 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | stack-overflow in mjs_op_json_stringify() at mjs.c:11362 | https://api.github.com/repos/cesanta/mjs/issues/256/comments | 0 | 2023-11-26T08:00:13Z | 2023-12-22T02:21:04Z | https://github.com/cesanta/mjs/issues/256 | 2,010,943,506 | 256 |
CVE-2023-49553 | 2024-01-02T23:15:12.333 | An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_destroy function in the msj.c file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/253"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/253 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"cesanta",
"mjs"
] | **The name of an affected Product**
[mjs](https://github.com/cesanta/mjs)
**The affected version**
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) (Tag: [2.20.0](https://github.com/cesanta/mjs/releases/tag/2.20.0))
**Description**
An issue in cesanta mjs 2.20.0... | SegFaultOnPc in mjs_destroy() at mjs.c:7563 | https://api.github.com/repos/cesanta/mjs/issues/253/comments | 0 | 2023-11-19T09:05:58Z | 2023-12-22T02:22:19Z | https://github.com/cesanta/mjs/issues/253 | 2,000,763,687 | 253 |
CVE-2023-49554 | 2024-01-03T00:15:08.987 | Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/249"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/yasm/yasm/issues/249 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"yasm",
"yasm"
] | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | heap-use-after-free in the function do_directive() at modules/preprocs/nasm/nasm-pp.c:2389 | https://api.github.com/repos/yasm/yasm/issues/249/comments | 0 | 2023-11-20T14:16:57Z | 2024-01-03T11:22:46Z | https://github.com/yasm/yasm/issues/249 | 2,002,305,193 | 249 |
CVE-2023-49555 | 2024-01-03T00:15:09.047 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/248"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/yasm/yasm/issues/248 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"yasm",
"yasm"
] | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | SEGV in the function expand_smacro() at modules/preprocs/nasm/nasm-pp.c:4357 | https://api.github.com/repos/yasm/yasm/issues/248/comments | 2 | 2023-11-20T14:03:30Z | 2024-01-04T10:06:59Z | https://github.com/yasm/yasm/issues/248 | 2,002,278,782 | 248 |
CVE-2023-49556 | 2024-01-03T00:15:09.090 | Buffer Overflow vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/250"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/yasm/yasm/issues/250 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"yasm",
"yasm"
] | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | heap-buffer-overflow in the function expr_delete_term() at libyasm/expr.c:1019 | https://api.github.com/repos/yasm/yasm/issues/250/comments | 1 | 2023-11-20T14:26:40Z | 2024-02-12T16:51:53Z | https://github.com/yasm/yasm/issues/250 | 2,002,324,400 | 250 |
CVE-2023-49557 | 2024-01-03T00:15:09.147 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/253"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/yasm/yasm/issues/253 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"yasm",
"yasm"
] | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | SEGV in yasm_section_bcs_first() at libyasm/section.c:619 | https://api.github.com/repos/yasm/yasm/issues/253/comments | 1 | 2023-11-26T08:48:59Z | 2024-01-03T11:22:18Z | https://github.com/yasm/yasm/issues/253 | 2,010,956,429 | 253 |
CVE-2023-49558 | 2024-01-03T00:15:09.203 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_mmac_params function in the modules/preprocs/nasm/nasm-pp.c component. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/yasm/yasm/issues/252"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yasm_project:yasm:1.3.0.86.g9def:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D63BD2-36F6-440B-AC78-6F48EDDC12CD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"version... | https://github.com/yasm/yasm/issues/252 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"yasm",
"yasm"
] | **The name of an affected Product**
[yasm](https://github.com/yasm/yasm)
**The affected version**
Commit: [9defefa](https://github.com/yasm/yasm/commit/9defefae9fbcb6958cddbfa778c1ea8605da8b8b)
yasm 1.3.0.86.g9def
**Description**
An issue in yasm 1.3.0.86.g9def allows a attacker to cause a denial of service v... | SEGV in the function expand_mmac_params() at modules/preprocs/nasm/nasm-pp.c:4013 | https://api.github.com/repos/yasm/yasm/issues/252/comments | 3 | 2023-11-26T04:38:16Z | 2024-03-23T09:32:24Z | https://github.com/yasm/yasm/issues/252 | 2,010,889,074 | 252 |
CVE-2023-46929 | 2024-01-03T19:15:08.390 | An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2662"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3-dev-rev605-gfc9e29089-master:*:*:*:*:*:*:*",
"matchCriteriaId": "276701A5-2ABB-4EDB-9E2A-96A6A9EA62D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | https://github.com/gpac/gpac/issues/2662 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"gpac",
"gpac"
] | # SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55
### Version
```shell
MP4Box - GPAC version 2.3-DEV-rev605-gfc9e29089-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io
Please... | SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 | https://api.github.com/repos/gpac/gpac/issues/2662/comments | 0 | 2023-10-24T08:09:10Z | 2023-10-26T10:37:04Z | https://github.com/gpac/gpac/issues/2662 | 1,958,731,817 | 2,662 |
CVE-2023-50120 | 2024-01-10T09:15:44.290 | MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered to contain an infinite loop in the function av1_uvlc at media_tools/av_parsers.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MP4 file. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
],
"url": "https://github.com/gpac/gpac/issues/2698"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:2.3:dev:*:*:*:*:*:*",
"matchCriteriaId": "0099B624-674B-4F45-9270-DD638617A1D1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/2698 | [
"Exploit",
"Issue Tracking"
] | github.com | [
"gpac",
"gpac"
] | 1.Version
MP4Box - GPAC version 2.3-DEV-rev636-gfbd7e13aa-master
(c) 2000-2023 Telecom Paris distributed under LGPL v2.1+ - https://gpac.io
Please cite our work in your research:
GPAC Filters: https://doi.org/10.1145/3339825.3394929
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --static-... | Infinite loop in av1_uvlc media_tools/av_parsers.c:1664 | https://api.github.com/repos/gpac/gpac/issues/2698/comments | 1 | 2023-12-01T04:51:55Z | 2023-12-01T10:00:42Z | https://github.com/gpac/gpac/issues/2698 | 2,020,058,777 | 2,698 |
CVE-2023-37644 | 2024-01-11T08:15:35.737 | SWFTools 0.9.2 772e55a allows attackers to trigger a large memory-allocation attempt via a crafted document, as demonstrated by pdf2swf. This occurs in png_read_chunk in lib/png.c. | {
"cvssMetricV2": null,
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integr... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://github.com/matthiaskramm/swftools/issues/202"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | https://github.com/matthiaskramm/swftools/issues/202 | [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
] | github.com | [
"matthiaskramm",
"swftools"
] | Hi there
We would like to share that the latest version of pdf2swf causes heap-buffer-overflow when executed with a crafted png input.
We assume that the invalid memory access happens due to the improper processing malformed input in png_read_chunk() in spite of the error handling.
Here is the output of progra... | Heap-buffer-overflow when processing an png file in png_read_chunk() | https://api.github.com/repos/swftools/swftools/issues/202/comments | 1 | 2023-07-01T08:50:15Z | 2023-09-06T08:36:00Z | https://github.com/swftools/swftools/issues/202 | 1,783,702,020 | 202 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.