cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-11104
2020-03-30T22:15:15.117
An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if the archive is dist...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/USCiLab/cereal/issues/625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:usc:cereal:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F4B1C0-4CBE-45BE-A5F5-F8E8F6DCF076", "versionEndExcluding": null, "versionEndIncluding": "1.3.0", "versionStartExcluding": ...
[ "908" ]
908
https://github.com/USCiLab/cereal/issues/625
[ "Exploit", "Third Party Advisory" ]
github.com
[ "USCiLab", "cereal" ]
Serializing the C/C++ native type ```long double``` stores uninitialized data into the serialized form. Compile and run the following program with valgrind to observe this. ```cpp #include <cereal/archives/binary.hpp> #include <stdio.h> #include <sstream> #include <string> int main(void) { std::strin...
Serializing long double variables leaks uninitialized memory
https://api.github.com/repos/USCiLab/cereal/issues/625/comments
4
2020-03-03T02:10:37Z
2020-04-03T10:05:01Z
https://github.com/USCiLab/cereal/issues/625
574,368,150
625
1,146
CVE-2020-11105
2020-03-30T22:15:15.180
An issue was discovered in USC iLab cereal through 1.3.0. It employs caching of std::shared_ptr values, using the raw pointer address as a unique identifier. This becomes problematic if an std::shared_ptr variable goes out of scope and is freed, and a new std::shared_ptr is allocated at the same address. Serialization ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/USCiLab/cereal/issues/636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:usc:cereal:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6F4B1C0-4CBE-45BE-A5F5-F8E8F6DCF076", "versionEndExcluding": null, "versionEndIncluding": "1.3.0", "versionStartExcluding": ...
[ "763" ]
763
https://github.com/USCiLab/cereal/issues/636
[ "Exploit", "Third Party Advisory" ]
github.com
[ "USCiLab", "cereal" ]
Cereal employs caching of ```std::shared_ptr``` values, using the raw pointer as a unique identifier. This becomes problematic if an ```std::shared_ptr``` variable goes out of scope and is freed, and a new ```std::shared_ptr``` is allocated at the same address. Serialization fidelity thereby becomes dependent upon memo...
std::shared_ptr serialization asymmetry (depends on memory layout)
https://api.github.com/repos/USCiLab/cereal/issues/636/comments
4
2020-03-27T23:28:34Z
2021-02-01T23:50:29Z
https://github.com/USCiLab/cereal/issues/636
589,460,463
636
1,147
CVE-2020-11106
2020-03-30T22:15:15.243
An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $_SESSION['RF']["view_type"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajax_calls.php and uses the "view" action and places a payload in the type parameter, and then re...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/trippo/ResponsiveFilemanager/issues/603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "ht...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "54CD0F21-D4B5-4F0A-87ED-FA0D20A9D73C", "versionEndExcluding": null, "versionEndIncluding": "9.14.0", "ver...
[ "79" ]
79
https://github.com/trippo/ResponsiveFilemanager/issues/603
[ "Exploit", "Third Party Advisory" ]
github.com
[ "trippo", "ResponsiveFilemanager" ]
After taking another look at the ResponsiveFilemanager 9.14.0 i noticed that in the dialog.php file on line 197 that if the $_SESSION['RF']["view_type"] is already set that there would not be done any validation or would it take the data from the config. https://github.com/trippo/ResponsiveFilemanager/blob/master/file...
Stored xss in v9.14.0 in dialog.php in $_SESSION['RF']["view_type"] because of no validation if ajax_calls.php setted this session.
https://api.github.com/repos/trippo/ResponsiveFilemanager/issues/603/comments
1
2020-03-28T11:53:58Z
2020-03-31T00:13:52Z
https://github.com/trippo/ResponsiveFilemanager/issues/603
589,562,673
603
1,148
CVE-2020-11111
2020-03-31T05:15:13.007
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2664" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2664
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding classes of `org.apache.activemq:activemq-pool`, `org.apache.activemq:activemq-pool-jms` libraries. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11111 Re...
Block one more gadget type (activemq-pool[-jms], CVE-2020-11111)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2664/comments
2
2020-03-24T17:04:06Z
2020-12-02T03:59:26Z
https://github.com/FasterXML/jackson-databind/issues/2664
587,124,374
2,664
1,149
CVE-2020-11112
2020-03-31T05:15:13.070
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2666" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2666
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding a class of `org.apache.commons:commons-proxy` library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11112 Reporter: Yiting Fan Fix will be included i...
Block one more gadget type (apache/commons-proxy, CVE-2020-11112)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2666/comments
0
2020-03-25T17:06:51Z
2020-12-02T03:59:15Z
https://github.com/FasterXML/jackson-databind/issues/2666
587,851,588
2,666
1,150
CVE-2020-11113
2020-03-31T05:15:13.117
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2670" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2670
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.openjpa:openjpa`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11113 Reporter: XuYuanzhen (of Alibaba Cloud Security T...
Block one more gadget type (openjpa, CVE-2020-11113)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2670/comments
0
2020-03-28T18:08:54Z
2020-04-07T01:41:29Z
https://github.com/FasterXML/jackson-databind/issues/2670
589,629,001
2,670
1,151
CVE-2020-11441
2020-03-31T17:15:26.497
phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpmyadmin/phpmyadmin/issues/16056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "310D977D-2D64-4817-B054-2AC6CE7C6237", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "74" ]
74
https://github.com/phpmyadmin/phpmyadmin/issues/16056
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phpmyadmin", "phpmyadmin" ]
### Describe the bug The login form does not properly escape CRLF sequences, this can lead to HTML entity injection at the very least, or reflected XSS at the very worst. ### To Reproduce Steps to reproduce the behavior: 1. Go to 'index.php' 2. Insert into the login fields, username, password, and the hidden...
CRLF/HTML entity injection with most recent version of PHPMyAdmin
https://api.github.com/repos/phpmyadmin/phpmyadmin/issues/16056/comments
19
2020-03-30T01:21:02Z
2022-07-16T00:27:33Z
https://github.com/phpmyadmin/phpmyadmin/issues/16056
589,932,745
16,056
1,152
CVE-2020-5290
2020-04-01T20:15:15.223
In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. An attacker team could potentially steal flags by, for example, exploiting a stored XSS payload in a CTF challenge so that victim teams who solve the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/redpwn/rctf/issues/147" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ctfd:rctf:*:*:*:*:*:*:*:*", "matchCriteriaId": "92D682E4-811E-49EF-A74D-F434C9831458", "versionEndExcluding": "2.3", "versionEndIncluding": null, "versionStartExcluding": nul...
[ "384" ]
384
https://github.com/redpwn/rctf/issues/147
[ "Exploit", "Third Party Advisory" ]
github.com
[ "redpwn", "rctf" ]
### Description There is a session fixation vulnerability in rCTF exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. #### Vulnerable code ```js document.title = 'Verify' + config.ctfTitle const prefix = '#token=' if (document.location.hash.startsWith(prefix...
Session fixation vulnerability in /verify
https://api.github.com/repos/redpwn/rctf/issues/147/comments
0
2020-03-29T07:04:38Z
2020-04-01T23:21:44Z
https://github.com/redpwn/rctf/issues/147
589,734,776
147
1,153
CVE-2019-11254
2020-04-01T21:15:13.397
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/89535" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/d/msg/kubernetes-announce/AL...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "87849953-B423-4E3B-A977-A62A88B40037", "versionEndExcluding": "1.15.10", "versionEndIncluding": null, "versionStar...
[ "1050" ]
1050
https://github.com/kubernetes/kubernetes/issues/89535
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVE-2019-11254 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML payloads to cause kube-apiserver to consume excessive CPU cycles while parsing YAML. The issue was discovered via the fuzz test kubernetes/kubernetes#83750. **Affected components:** Kuber...
CVE-2019-11254: kube-apiserver Denial of Service vulnerability from malicious YAML payloads
https://api.github.com/repos/kubernetes/kubernetes/issues/89535/comments
2
2020-03-26T18:55:26Z
2022-08-23T02:18:32Z
https://github.com/kubernetes/kubernetes/issues/89535
588,652,998
89,535
1,154
CVE-2020-11499
2020-04-02T23:15:13.097
Firmware Analysis and Comparison Tool (FACT) 3 has Stored XSS when updating analysis details via a localhost web request, as demonstrated by mishandling of the tags and version fields in helperFunctions/mongo_task_conversion.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/fkie-cad/FACT_core/issues/375" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/f...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:firmware_analysis_and_comparison_tool_project:firmware_analysis_and_comparison_tool:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5F400E47-9DF3-4974-A0BA-1BEF7B90106C", "versionEndExcluding": null, ...
[ "79" ]
79
https://github.com/fkie-cad/FACT_core/issues/375
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "fkie-cad", "FACT_core" ]
The application does not sanitize the user input when updating the details of a firmware. When updating the firmware details, the applications posts the data to the "upload-analysis/[uid]" page. That page then runs the function "_get_meta_from_request()" within the /src/helperFunctions/mongo_task_conversion.py script. ...
Stored XSS when updating analysis details
https://api.github.com/repos/fkie-cad/FACT_core/issues/375/comments
3
2020-03-29T18:07:13Z
2020-03-31T11:56:40Z
https://github.com/fkie-cad/FACT_core/issues/375
589,848,961
375
1,155
CVE-2020-5283
2020-04-03T00:15:11.943
ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enab...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/viewvc/viewvc/commit/ad0f966e9a997b17d853a6972ea283d4dcd70fa8" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracki...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:viewvc:viewvc:*:*:*:*:*:*:*:*", "matchCriteriaId": "317FCBFB-4761-4735-8367-4AE5D03AB998", "versionEndExcluding": "1.1.28", "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/viewvc/viewvc/issues/211
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "viewvc", "viewvc" ]
**Describe the bug** When the `show_subdir_lastmod` option is enabled, ViewVC shows for directories in the directory view the log message of the most recently modified child thereof, along with the child file's name and revision number. Unfortunately, the child file's name is not properly HTML-escaped. **Steps t...
XSS vulnerability: CVS lastlog filename not escaped
https://api.github.com/repos/viewvc/viewvc/issues/211/comments
2
2020-03-26T18:08:02Z
2020-03-31T09:35:52Z
https://github.com/viewvc/viewvc/issues/211
588,621,766
211
1,156
CVE-2020-10689
2020-04-03T15:15:14.420
A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name and namespace of the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImp...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10689" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:che:*:*:*:*:*:*:*:*", "matchCriteriaId": "20B587B9-3F69-42CA-810C-CAFAB7CE29E3", "versionEndExcluding": "7.9.0", "versionEndIncluding": null, "versionStartExcluding":...
[ "862" ]
862
https://github.com/eclipse/che/issues/15651
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse", "che" ]
### Is your task related to a problem? Please describe. Under some conditions, there is a possibility to reach the port of one workspace from another workspace. To improve the isolation of the major Eclipse Che components we would like to. ### Describe the solution you'd like 1. Use single pod for jwt proxy ...
Improve isolation of Che theia and che-machine-exec components
https://api.github.com/repos/eclipse-che/che/issues/15651/comments
13
2020-01-10T11:56:26Z
2020-03-06T16:05:15Z
https://github.com/eclipse-che/che/issues/15651
548,039,947
15,651
1,157
CVE-2020-11529
2020-04-04T19:15:11.537
Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://getgrav.org/#changelog" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/getgrav/grav/commit/2eae104c7a4bf32...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*", "matchCriteriaId": "A790171B-E361-45F8-AEC4-A4BDA5F5BD85", "versionEndExcluding": null, "versionEndIncluding": "1.6.31", "versionStartExcluding...
[ "601" ]
601
https://github.com/getgrav/grav/issues/3134
[ "Third Party Advisory" ]
github.com
[ "getgrav", "grav" ]
## Environment grav version: v1.6.31 - Admin v1.9.19 php: 7.4 and 7.2 tested ## Problem If grav is on root folder on a domain it seems there is a open redirect. ## Fist analysis Origin of the problem seems to be the redirect by setting `Redirect trailing slash` on. ## Examples Open redirect if on roo...
[Security] Open redirect with trailing slash redirect
https://api.github.com/repos/getgrav/grav/issues/3134/comments
6
2021-01-06T15:12:06Z
2021-03-31T17:49:45Z
https://github.com/getgrav/grav/issues/3134
780,624,397
3,134
1,158
CVE-2020-11558
2020-04-05T20:15:12.650
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": ...
[ "416" ]
416
https://github.com/gpac/gpac/issues/1440
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough info...
3 UAF bugs in box_funcs.c
https://api.github.com/repos/gpac/gpac/issues/1440/comments
4
2020-03-24T17:16:05Z
2020-03-26T19:28:46Z
https://github.com/gpac/gpac/issues/1440
587,134,103
1,440
1,159
CVE-2020-10266
2020-04-06T12:15:12.957
UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these components in the robots (e.g. in the UR10), no integrity checks are performed. Moreover, the SDK for making such components can be easily obtained from Universal Robots. An attack...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:universal-robots:ur\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "91FE81D2-B3F6-4323-A765-CE44D324DBD9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExc...
[ "345" ]
345
https://github.com/aliasrobotics/RVD/issues/1487
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml { "id": 1487, "title": "RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot", "type": "vulnerability", "description": "UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these ...
RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot
https://api.github.com/repos/aliasrobotics/RVD/issues/1487/comments
1
2020-04-03T14:22:23Z
2020-09-30T11:00:13Z
https://github.com/aliasrobotics/RVD/issues/1487
593,418,549
1,487
1,160
CVE-2020-10267
2020-04-06T12:15:13.033
Universal Robots control box CB 3.1 across firmware versions (tested on 1.12.1, 1.12, 1.11 and 1.10) does not encrypt or protect in any way the intellectual property artifacts installed from the UR+ platform of hardware and software components (URCaps). These files (*.urcaps) are stored under '/root/.urcaps' as plain z...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/1489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:universal-robots:ur_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "914DFBBC-7743-4B1B-9875-8D6B6F907B99", "versionEndExcluding": null, "versionEndIncluding": "3.1.18213", "ve...
[ "312" ]
312
https://github.com/aliasrobotics/RVD/issues/1489
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml { "id": 1489, "title": "RVD#1489: Unprotected intelectual property in Universal Robots controller CB 3.1 across firmware versions", "type": "vulnerability", "description": "Universal Robots control box CB 3.1 across firmware versions (tested on 3.13.0, 3.12.1, 3.12, 3.11 and 3.10.0) does no...
RVD#1489: Unprotected intelectual property in Universal Robots controller CB 3.1 across firmware versions
https://api.github.com/repos/aliasrobotics/RVD/issues/1489/comments
2
2020-04-03T14:28:43Z
2020-04-29T17:37:33Z
https://github.com/aliasrobotics/RVD/issues/1489
593,422,790
1,489
1,161
CVE-2013-7488
2020-04-07T18:15:13.117
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gbarr/perl-Convert-ASN1/issues/14" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:convert\\:\\:asn1_project:convert\\:\\:asn1:*:*:*:*:*:perl:*:*", "matchCriteriaId": "AC1E9726-31EE-417B-A4EE-375DEE099B59", "versionEndExcluding": null, "versionEndIncluding": "0.27", ...
[ "835" ]
835
https://github.com/gbarr/perl-Convert-ASN1/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gbarr", "perl-Convert-ASN1" ]
The following test of decoding unsafe input will make an infinite loop spewing warnings in 0.26: ``` perl use Convert::ASN1; my $asn = Convert::ASN1->new; $asn->prepare(q< [APPLICATION 7] SEQUENCE { int INTEGER } >); my $out; $out = $asn->decode( pack("H*", "dfccd3fde3") ); $out = $asn->decode( pack("H*", "b08...
Unsafe decoding creates infinite loop
https://api.github.com/repos/gbarr/perl-Convert-ASN1/issues/14/comments
5
2013-10-08T23:35:28Z
2021-05-23T20:08:56Z
https://github.com/gbarr/perl-Convert-ASN1/issues/14
20,714,227
14
1,162
CVE-2015-9544
2020-04-07T18:15:13.180
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/ofirdagan/cross-domain-local-storage" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ofirdagan/c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cross_domain_local_storage_project:cross_domain_local_storage:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1428644-A24A-485D-A274-640F02C82E25", "versionEndExcluding": null, "versionEndIncludi...
[ "20" ]
20
https://github.com/ofirdagan/cross-domain-local-storage/issues/17
[ "Patch", "Third Party Advisory" ]
github.com
[ "ofirdagan", "cross-domain-local-storage" ]
There doesn't appear to be a programmatic way to define a whitelist of origins that the iframe will accept requests from. This is something that's recommended by the `postMessage` (API documentation)[https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage]. It suggests that the receiver of function should "...
Restricting domain by origins
https://api.github.com/repos/ofirdagan/cross-domain-local-storage/issues/17/comments
0
2015-08-13T00:40:18Z
2015-08-13T02:05:17Z
https://github.com/ofirdagan/cross-domain-local-storage/issues/17
100,665,577
17
1,163
CVE-2020-11612
2020-04-07T18:15:13.697
The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/netty...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D244264-A923-47AA-AAED-35C184E7E984", "versionEndExcluding": "4.1.46", "versionEndIncluding": null, "versionStartExcluding"...
[ "770" ]
770
https://github.com/netty/netty/issues/6168
[ "Third Party Advisory" ]
github.com
[ "netty", "netty" ]
### Expected behavior To protect against OOME the compression and decompression codecs should explicitly limit the amount of data they compress and decompress. We may be vulnerable to OOME from large or malicious input. ### Actual behavior In light of https://github.com/netty/netty/pull/5997 most of the compressio...
Compression/Decompression Codecs should enforce memory allocation size limits
https://api.github.com/repos/netty/netty/issues/6168/comments
2
2016-12-30T18:14:58Z
2020-01-31T14:05:04Z
https://github.com/netty/netty/issues/6168
198,178,345
6,168
1,164
CVE-2020-11619
2020-04-07T23:15:12.077
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2680" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2680
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.springframework:spring-aop`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Type: SSRF Mitre id: CVE-2020-11619 Reporter: Bui Duong from Viettel...
Block one more gadget type (SSRF, spring-jpa, CVE-2020-11619)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2680/comments
0
2020-04-07T01:41:49Z
2020-12-02T03:59:03Z
https://github.com/FasterXML/jackson-databind/issues/2680
595,531,291
2,680
1,165
CVE-2020-11620
2020-04-07T23:15:12.140
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2682" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96", "versionEndExcluding": "2.9.10.4", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2682
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `commons-jelly:commons-jelly`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-11620 Reporter(s): * r00t4dm from A-TEAM of Legend...
Block one more gadget type (commons-jelly, CVE-2020-11620)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2682/comments
0
2020-04-07T15:54:48Z
2020-04-11T19:23:25Z
https://github.com/FasterXML/jackson-databind/issues/2682
595,974,605
2,682
1,166
CVE-2018-21034
2020-04-09T17:15:12.703
In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to retrieve secrets and other manifests which were stored within git.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/argoproj/argo-cd/blob/a1afe44066fcd0a0ab90a02a23177164bbad42cf/util/diff/diff.go#L399" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5129B5E3-ABD7-4E99-BCF1-6EA5290F7108", "versionEndExcluding": null, "versionEndIncluding": "1.4.2", "versionStartExclud...
[ "200" ]
200
https://github.com/argoproj/argo-cd/issues/470
[ "Third Party Advisory" ]
github.com
[ "argoproj", "argo-cd" ]
We currently treat secrets the same as any other k8s object, displaying the YAML/JSON contents in the UI. But secret values need to be redacted or a separate RBAC rule to view them.
K8s secrets need to be redacted in API server
https://api.github.com/repos/argoproj/argo-cd/issues/470/comments
0
2018-07-26T23:15:26Z
2018-09-07T20:51:32Z
https://github.com/argoproj/argo-cd/issues/470
345,036,909
470
1,167
CVE-2020-11709
2020-04-12T14:15:10.750
cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yh...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpp-httplib_project:cpp-httplib:*:*:*:*:*:*:*:*", "matchCriteriaId": "20734923-D6DF-460F-B2BE-20879008EABB", "versionEndExcluding": null, "versionEndIncluding": "0.5.8", "ver...
[ "74" ]
74
https://github.com/yhirose/cpp-httplib/issues/425
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yhirose", "cpp-httplib" ]
ref: https://owasp.org/www-community/attacks/HTTP_Response_Splitting ### Analysis ```cpp // L2766 inline void Response::set_header(const char *key, const char *val) { headers.emplace(key, val); } inline void Response::set_header(const char *key, const std::string &val) { headers.emplace(key, val); } i...
set_redirect & set_header are susceptible to http response splitting attack
https://api.github.com/repos/yhirose/cpp-httplib/issues/425/comments
4
2020-04-11T03:38:58Z
2020-04-14T12:30:06Z
https://github.com/yhirose/cpp-httplib/issues/425
598,181,627
425
1,168
CVE-2020-11721
2020-04-12T19:15:10.367
load_png in loader.c in libsixel.a in libsixel 1.8.6 has an uninitialized pointer leading to an invalid call to free, which can cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "824" ]
824
https://github.com/saitoha/libsixel/issues/134
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
`load_png` has a pointer `rows`, which should be set to NULL, otherwise `cleanup` code would use(calling `free`) it. binary: img2sixel file: loader.c function: load_png poc: [poc.zip](https://github.com/saitoha/libsixel/files/4464131/poc.zip) result: ``` #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/...
Invalid free wild pointer lead to DOS in load_png in loader.c
https://api.github.com/repos/saitoha/libsixel/issues/134/comments
12
2020-04-11T06:09:36Z
2021-06-10T06:23:25Z
https://github.com/saitoha/libsixel/issues/134
598,200,091
134
1,169
CVE-2020-11005
2020-04-14T23:15:12.090
The WindowsHello open source library (NuGet HaemmerElectronics.SeppPenner.WindowsHello), before version 1.0.4, has a vulnerability where encrypted data could potentially be decrypted without needing authentication. If the library is used to encrypt text and write the output to a txt file, another executable could be ab...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/SeppPenner/WindowsHello/issues/3" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:windowshello_project:windowshello:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E53E9C-C0EB-4730-A9AC-0837B12339DC", "versionEndExcluding": "1.0.4", "versionEndIncluding": null, "v...
[ "327" ]
327
https://github.com/SeppPenner/WindowsHello/issues/3
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "SeppPenner", "WindowsHello" ]
If I use this library to encrypt text and write the output to a txt file, could another executable be able to decrypt the text using the static method `NCryptDecrypt` from this same library, without the need to use Windows Hello Authentication? Maybe for somebody the answer to this question is clear from the code, but...
[Question] Security of the Encrypted data
https://api.github.com/repos/SeppPenner/WindowsHello/issues/3/comments
25
2019-08-22T02:16:23Z
2023-04-07T14:00:08Z
https://github.com/SeppPenner/WindowsHello/issues/3
483,733,192
3
1,170
CVE-2020-10699
2020-04-15T14:15:19.873
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE",...
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10699" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:targetcli-fb_project:targetcli-fb:2.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "8E46FFC1-C330-4010-9473-827CE2AEC843", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "732" ]
732
https://github.com/open-iscsi/targetcli-fb/issues/162
[ "Third Party Advisory" ]
github.com
[ "open-iscsi", "targetcli-fb" ]
The systemd socket unit fails to specify any `SocketMode` so the socket is world writable (0666) - as such any user can connect to it and send commands to targetclid without authentication. This is a likely a security vulnerability. https://github.com/open-iscsi/targetcli-fb/blob/23877ab4afbf0c2fe4092936261d92d7b7fbff1...
/var/run/targetclid.sock is world writable
https://api.github.com/repos/open-iscsi/targetcli-fb/issues/162/comments
13
2020-03-23T05:08:02Z
2020-04-01T14:58:51Z
https://github.com/open-iscsi/targetcli-fb/issues/162
585,933,826
162
1,171
CVE-2020-11872
2020-04-17T05:15:13.113
The Cloud Functions subsystem in OpenTrace 1.0 might allow fabrication attacks by making billions of TempID requests before an AES-256-GCM key rotation occurs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/opentrace-community/opentrace-cloud-functions/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Ad...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluetrace:opentrace:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BDD68E-1331-4BDE-B7F8-6AA97AA9CB6F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "327" ]
327
https://github.com/opentrace-community/opentrace-cloud-functions/issues/7
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "opentrace-community", "opentrace-cloud-functions" ]
The current implementation does not follow NIST Special Publication 800-38D, in particular Section 8.2 IV Constructions and 8.3 Constraints on the Number of Invocations regarding the secret key. To mitigate 8.2: IVs can be converted to deterministic construction per 8.2.1. To mitigate 8.3: Temporary IDs should use ...
Incorrect IV Initialisation for AES-256-GCM and Constraints on the Number of Invocations
https://api.github.com/repos/opentrace-community/opentrace-cloud-functions/issues/7/comments
7
2020-04-13T09:37:43Z
2020-05-04T11:55:03Z
https://github.com/opentrace-community/opentrace-cloud-functions/issues/7
598,786,965
7
1,172
CVE-2020-11887
2020-04-17T21:15:13.273
svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/domenic/svg2png/issues/117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:svg2png_project:svg2png:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "09BB1AEE-7811-4B83-835C-4434D82E072E", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "79" ]
79
https://github.com/domenic/svg2png/issues/117
[ "Exploit", "Third Party Advisory" ]
github.com
[ "domenic", "svg2png" ]
this package uses phantomjs to render a xml snippet to image,thus the xml can be any html ,script. As the render process runs at backend,so there are ssrf and server side xss risks.
SSRF and Server Side XSS
https://api.github.com/repos/domenic/svg2png/issues/117/comments
4
2020-04-17T02:35:29Z
2025-06-01T04:02:34Z
https://github.com/domenic/svg2png/issues/117
601,659,481
117
1,173
CVE-2020-11894
2020-04-19T19:15:12.477
Ming (aka libming) 0.4.8 has a heap-based buffer over-read (8 bytes) in the function decompileIF() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/libming/libming/issues/196
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
./swftocxx $poc [segmentaion_fault_decompile_569-out_of_bound-idx:0x1199-0xb.zip](https://github.com/libming/libming/files/4490660/segmentaion_fault_decompile_569-out_of_bound-idx.0x1199-0xb.zip) ``` root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56...
heap overflow in decompileIF decompile.c:2473
https://api.github.com/repos/libming/libming/issues/196/comments
0
2020-04-17T02:47:07Z
2020-04-17T02:47:07Z
https://github.com/libming/libming/issues/196
601,663,070
196
1,174
CVE-2020-11895
2020-04-19T19:15:12.977
Ming (aka libming) 0.4.8 has a heap-based buffer over-read (2 bytes) in the function decompileIF() in decompile.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "125" ]
125
https://github.com/libming/libming/issues/197
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
./swftocxx $poc [segmentaion_fault_decompile_569-out_of_bound-idx:0x1186-0x10.zip](https://github.com/libming/libming/files/4490668/segmentaion_fault_decompile_569-out_of_bound-idx.0x1186-0x10.zip) ``` root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56...
heap overflow in decompileIF decompile.c:2436
https://api.github.com/repos/libming/libming/issues/197/comments
0
2020-04-17T02:50:13Z
2020-04-17T02:50:13Z
https://github.com/libming/libming/issues/197
601,663,990
197
1,175
CVE-2020-11888
2020-04-20T16:15:14.430
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00031.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00035.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python-markdown2_project:python-markdown2:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0A5CE53-40D5-44F4-BC05-58C38233D0A7", "versionEndExcluding": null, "versionEndIncluding": "2.3.8", ...
[ "79" ]
79
https://github.com/trentm/python-markdown2/issues/348
[ "Exploit", "Third Party Advisory" ]
github.com
[ "trentm", "python-markdown2" ]
On the latest release (2.3.8) a payload like this one can lead to xss and bypass safe_mode when set to true. `<lol@/ //id="pwn"//onclick="alert(1)"//**abc**` The Problem: I think its due to just bad regex's not detecting non alphanumeric tags. ![poc](https://i.imgur.com/AxUNPC9.png)
Another Filter bypass leading to XSS
https://api.github.com/repos/trentm/python-markdown2/issues/348/comments
12
2020-04-13T00:38:25Z
2020-05-12T00:09:25Z
https://github.com/trentm/python-markdown2/issues/348
598,605,834
348
1,176
CVE-2020-11944
2020-04-20T22:15:13.650
Abe (aka bitcoin-abe) through 0.7.2, and 0.8pre, allows XSS in __call__ in abe.py because the PATH_INFO environment variable is mishandled during a PageNotFound exception.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://geeknik-labs.com" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/bitcoin-abe/bitcoin-abe/blob/d33f6e85de74e708e11cabe4ed0246...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bitcoin-abe_project:bitcoin-abe:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3795E81-B15D-454D-B76A-D58443FDC6E4", "versionEndExcluding": null, "versionEndIncluding": "0.7.2", "ver...
[ "79" ]
79
https://github.com/bitcoin-abe/bitcoin-abe/issues/292
[ "Broken Link" ]
github.com
[ "bitcoin-abe", "bitcoin-abe" ]
A lack of filtering around line 253 of abe.py ``` except PageNotFound: page['status'] = '404 Not Found' page['body'] = ['<p class="error">Sorry, ', env['SCRIPT_NAME'], env['PATH_INFO'], ' does not exist on this server.</p>'] ...
Page Not Found Handler Cross-site Scripting -- CVE-2020-11944
https://api.github.com/repos/bitcoin-abe/bitcoin-abe/issues/292/comments
6
2020-04-20T21:24:43Z
2021-02-13T02:44:03Z
https://github.com/bitcoin-abe/bitcoin-abe/issues/292
603,545,408
292
1,177
CVE-2020-5268
2020-04-21T17:15:13.053
In Saml2 Authentication Services for ASP.NET versions before 1.0.2, and between 2.0.0 and 2.6.0, there is a vulnerability in how tokens are validated in some cases. Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Sam...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTI...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sustainsys:saml2:*:*:*:*:*:*:*:*", "matchCriteriaId": "E920AE48-2FCB-479F-AA28-CD7AA3B548AD", "versionEndExcluding": "1.0.2", "versionEndIncluding": null, "versionStartExclud...
[ "287" ]
287
https://github.com/Sustainsys/Saml2/issues/712
[ "Third Party Advisory" ]
github.com
[ "Sustainsys", "Saml2" ]
The issuer in the saml response is used to retreive signin keys and it is thus properly validated that the issuer of the response has access to the signing keys. The issuer in the assertion should also be validated, otherwise a malicious idp could craft a response where the assertion issuer identifies another Idp. It i...
Issuer Validation
https://api.github.com/repos/Sustainsys/Saml2/issues/712/comments
0
2017-05-09T17:08:02Z
2023-09-19T10:34:33Z
https://github.com/Sustainsys/Saml2/issues/712
227,434,908
712
1,178
CVE-2020-7350
2020-04-22T22:15:12.450
Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@rapid7.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rapid7/metasploit-framework/issues/13026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE42CAE4-4C47-40EC-AC83-D6EE17824B2B", "versionEndExcluding": "5.0.85", "versionEndIncluding": null, "versionStartExcl...
[ "78" ]
78
https://github.com/rapid7/metasploit-framework/issues/13026
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rapid7", "metasploit-framework" ]
the plugin libnotify has a command injection vulnerability which could be triggered when the client imports info as hostnames or services specially crafted from another tool The impact is low because is not possible to tamper the hostname when the client runs a scan with nmap for example in the libnotify's callba...
possible vulnerability in libnotify
https://api.github.com/repos/rapid7/metasploit-framework/issues/13026/comments
4
2020-03-04T17:31:41Z
2020-04-16T21:30:12Z
https://github.com/rapid7/metasploit-framework/issues/13026
575,604,106
13,026
1,179
CVE-2020-12071
2020-04-23T02:15:11.407
Anchor 0.12.7 allows admins to cause XSS via crafted post content.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/anchorcms/anchor-cms/issues/1333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anchorcms:anchor:0.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "B8C7BA55-A980-4713-AC70-5F93DF98D058", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/anchorcms/anchor-cms/issues/1333
[ "Exploit", "Third Party Advisory" ]
github.com
[ "anchorcms", "anchor-cms" ]
### Summary A user is able to inject JavaScript into a post via the post creation feature. ### Expected Behaviour The CMS should HTML encode any inputted data so it is reflected back safely to the user. ### Actual Behaviour The CMS reflects back the post content without HTML encoding, meaning the client ...
Stored Cross Site Scripting vulnerability exists in post content.
https://api.github.com/repos/anchorcms/anchor-cms/issues/1333/comments
4
2020-04-22T19:08:17Z
2020-04-29T23:07:47Z
https://github.com/anchorcms/anchor-cms/issues/1333
604,994,344
1,333
1,180
CVE-2020-12079
2020-04-23T04:15:13.343
Beaker before 0.8.9 allows a sandbox escape, enabling system access and code execution. This occurs because Electron context isolation is not used, and therefore an attacker can conduct a prototype-pollution attack against the Electron internal messaging API.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/beakerbrowser/beaker/issues/1519" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/beakerbrowser/beaker/rel...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beakerbrowser:beaker:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFA02EFF-ABB3-48D6-BA70-6EE025805C22", "versionEndExcluding": "0.8.9", "versionEndIncluding": null, "versionStartEx...
[ "1321" ]
1321
https://github.com/beakerbrowser/beaker/issues/1519
[ "Third Party Advisory" ]
github.com
[ "beakerbrowser", "beaker" ]
hello, I've find a critical vulnerability inside beaker browser, and have sent you details of this vulnerability by sending email to @pfrazee . Please check it and feel free to contact me.
Critical security issue [solved in 0.8.9] [CVE-2020-12079]
https://api.github.com/repos/beakerbrowser/beaker/issues/1519/comments
9
2020-03-10T08:47:37Z
2020-04-28T21:27:31Z
https://github.com/beakerbrowser/beaker/issues/1519
578,422,250
1,519
1,181
CVE-2020-11004
2020-04-24T21:15:13.747
SQL Injection was discovered in Admidio before version 3.3.13. The main cookie parameter is concatenated into a SQL query without any input validation/sanitization, thus an attacker without logging in, can send a GET request with arbitrary SQL queries appended to the cookie parameter and execute SQL queries. The vulner...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Admidio/admidio/commit/ea5d6f114b151ed11ec0ad7cb47bd729e77a874a" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE46F157-622B-4017-8FC7-EB25A24FC4FA", "versionEndExcluding": "3.3.13", "versionEndIncluding": null, "versionStartExclud...
[ "89" ]
89
https://github.com/Admidio/admidio/issues/908
[ "Third Party Advisory" ]
github.com
[ "Admidio", "admidio" ]
Hi, I want to report a critical vulnerability in Admidio management system. Can you please start a security advisory in the security section and add me to it, so we can discuss the vulnerability privately?
Unauthenticated Blind SQL injection
https://api.github.com/repos/Admidio/admidio/issues/908/comments
2
2020-04-06T12:29:36Z
2020-04-12T19:29:26Z
https://github.com/Admidio/admidio/issues/908
595,075,321
908
1,182
CVE-2019-20789
2020-04-26T17:15:11.040
Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/croogo/croogo/compare/3.0.6...3.0.7" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/croogo/croogo/issues/940" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*", "matchCriteriaId": "57EC3AAD-0962-42F7-8565-CFF6F09BEF94", "versionEndExcluding": null, "versionEndIncluding": "3.0.6", "versionStartExcluding...
[ "79" ]
79
https://github.com/croogo/croogo/issues/940
[ "Exploit", "Third Party Advisory" ]
github.com
[ "croogo", "croogo" ]
URL:http://10.211.55.7/croogo-3.0.5/admin/menus/menus Payload:<img src=0 onerror=alert(/XSS/)> parameter:title ![15748644873265](https://user-images.githubusercontent.com/30080697/69732081-f6e82700-1165-11ea-82fb-57771e2c8b2a.jpg) ![15748645130360](https://user-images.githubusercontent.com/30080697/69732131-0831338...
Croogo-3.0.5 Cms Has Multiple Stored XSS Vulnerabilities
https://api.github.com/repos/croogo/croogo/issues/940/comments
1
2019-11-27T14:35:29Z
2019-11-28T00:17:24Z
https://github.com/croogo/croogo/issues/940
529,385,356
940
1,183
CVE-2020-10944
2020-04-28T14:15:14.173
HashiCorp Nomad and Nomad Enterprise up to 0.10.4 contained a cross-site scripting vulnerability such that files from a malicious workload could cause arbitrary JavaScript to execute in the web UI. Fixed in 0.10.5.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/hashicorp/nomad/issues/7468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hashicorp:nomad:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7AA3EDF-3FDB-4C72-9878-ED4B528C0678", "versionEndExcluding": "0.10.5", "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/hashicorp/nomad/issues/7468
[ "Patch", "Third Party Advisory" ]
github.com
[ "hashicorp", "nomad" ]
## Nomad - Stored XSS in Raw File View **Vulnerability ID**: CVE-2020-10944 **Release Date**: March 24th, 2020 **Affected Products/Versions**: Previous versions of Nomad and Nomad Enterprise; fixed in 0.10.5 A vulnerability was identified in Nomad and Nomad Enterprise (“Nomad”) such that files from a malicious ...
Stored XSS in Raw File View
https://api.github.com/repos/hashicorp/nomad/issues/7468/comments
1
2020-03-24T15:29:53Z
2022-11-11T02:33:27Z
https://github.com/hashicorp/nomad/issues/7468
587,046,912
7,468
1,185
CVE-2020-12102
2020-04-28T21:15:11.773
In Tiny File Manager 2.4.1, there is a Path Traversal vulnerability in the ajax recursive directory listing functionality. This allows authenticated users to enumerate directories and files on the filesystem (outside of the application scope).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE...
[ { "source": "cve@mitre.org", "tags": null, "url": "https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/prasathmani/tinyfilemanager/commit/a0c595a8e11e55a43eeaa68e1a3ce76365f29d06" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tiny_file_manager_project:tiny_file_manager:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9D862BC9-ED4E-4324-9D7A-85722134DBF3", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "22" ]
22
https://github.com/prasathmani/tinyfilemanager/issues/357
null
github.com
[ "prasathmani", "tinyfilemanager" ]
hi, are you aware of this? https://www.quantumleap.it/tiny-file-manager-path-traversal-recursive-directory-listing-and-absolute-path-file-backup-copy/ see also other mentions: https://www.google.com/search?newwindow=1&sxsrf=ALeKk0025t2B-Upsat5D1t8HcK2-iLWyTw%3A1582747077534&ei=xc1WXs2dIMSYkwWvyqGICQ&q=tiny%20...
security breaches in tiny file manager
https://api.github.com/repos/prasathmani/tinyfilemanager/issues/357/comments
3
2020-05-11T04:33:34Z
2020-05-19T19:00:49Z
https://github.com/prasathmani/tinyfilemanager/issues/357
615,579,802
357
1,186
CVE-2018-21232
2020-04-29T14:15:14.417
re2c before 2.0 has uncontrolled recursion that causes stack consumption in find_fixed_tags.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://www.openwall.com/lists/oss-security/2020/05/14/4" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/skvadrik/re2c/issues/219" }, { "sou...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:re2c:re2c:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF95DF80-2205-4CA8-A01F-C05F3626EFBA", "versionEndExcluding": "2.0", "versionEndIncluding": null, "versionStartExcluding": nul...
[ "674" ]
674
https://github.com/skvadrik/re2c/issues/219
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "skvadrik", "re2c" ]
Factoring out the issue of https://github.com/skvadrik/re2c/issues/215#issuecomment-418584435 On small stack systems (`ulimit -s 256`) `overflow-1.re` test fails: ``` $ ./autogen.sh $ ulimit -s 256 $ make $ LANG=C make check VERBOSE=1 ... ./run_tests.sh: line 111: 17604 Segmentation fault (core dumped)...
overflow-1.re test fails on system with small stack
https://api.github.com/repos/skvadrik/re2c/issues/219/comments
5
2018-09-05T07:12:10Z
2022-07-25T07:36:53Z
https://github.com/skvadrik/re2c/issues/219
357,094,228
219
1,187
CVE-2020-12458
2020-04-29T16:15:11.760
An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2020-12458" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*", "matchCriteriaId": "448ED4A6-404E-408B-8EF7-CFA3AB154CB4", "versionEndExcluding": null, "versionEndIncluding": "6.7.3", "versionStartExcludi...
[ "732" ]
732
https://github.com/grafana/grafana/issues/8283
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "grafana", "grafana" ]
It looks like in https://github.com/grafana/grafana/issues/2126 there were plans to lock down the sqlite DB to 0600. While grafana.ini did get locked down, the DB did not. Unless this is no longer believed to be necessary I could try to send a PR. - What Grafana version are you using? 4.2.0 - What datasource are yo...
[Bug] Wrong permissions in grafana package for grafana.db
https://api.github.com/repos/grafana/grafana/issues/8283/comments
8
2017-05-03T16:54:15Z
2020-08-20T12:59:04Z
https://github.com/grafana/grafana/issues/8283
226,050,010
8,283
1,188
CVE-2020-12477
2020-04-29T22:15:12.577
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nilsteampassnet/TeamPass/issues/2761" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*", "matchCriteriaId": "B0281707-7711-476C-86A7-2EFD6C8DD8DB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "863" ]
863
https://github.com/nilsteampassnet/TeamPass/issues/2761
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nilsteampassnet", "TeamPass" ]
Teampass includes a feature to restrict the source IP address users can use to interact with Teampass. The value of the source IP address is [defined](https://github.com/nilsteampassnet/TeamPass/blob/b9cf22a78b6bb63346d7e593bc984d56316ed772/api/functions.php#L33) from the first value in the X-Forwarded-For header in th...
IP whitelist bypass
https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2761/comments
1
2020-04-02T16:10:04Z
2022-10-31T04:40:01Z
https://github.com/nilsteampassnet/TeamPass/issues/2761
592,750,440
2,761
1,189
CVE-2020-12478
2020-04-29T22:15:12.717
TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nilsteampassnet/TeamPass/issues/2764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*", "matchCriteriaId": "B0281707-7711-476C-86A7-2EFD6C8DD8DB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "306" ]
306
https://github.com/nilsteampassnet/TeamPass/issues/2764
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nilsteampassnet", "TeamPass" ]
Many of the files included in Teampass are available without authentication to anyone who can interact with the web server. While this may not be an issue for some of the images or Javascript files, it is an issue for the user-uploaded files that are available without authentication. These include: - upload dir -...
Some Teampass files are available without authentication
https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2764/comments
2
2020-04-02T16:18:48Z
2022-10-31T04:40:03Z
https://github.com/nilsteampassnet/TeamPass/issues/2764
592,756,360
2,764
1,190
CVE-2020-12479
2020-04-29T22:15:12.827
TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nilsteampassnet/TeamPass/issues/2762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*", "matchCriteriaId": "B0281707-7711-476C-86A7-2EFD6C8DD8DB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "22" ]
22
https://github.com/nilsteampassnet/TeamPass/issues/2762
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nilsteampassnet", "TeamPass" ]
Teampass allows users to choose from several different languages. The user changes their language preference by sending a POST request to Teampass (`/teampass/sources/users.queries.php`) that contains the string of the language they choose (“english”, “spanish”, etc). This string provided by the user is not validated o...
PHP arbitrary file include
https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2762/comments
3
2020-04-02T16:12:17Z
2022-10-31T04:40:02Z
https://github.com/nilsteampassnet/TeamPass/issues/2762
592,751,961
2,762
1,191
CVE-2020-10683
2020-05-01T19:15:12.927
dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dom4j_project:dom4j:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D7F74F1-B9EA-4659-9755-B23F7D747685", "versionEndExcluding": "2.0.3", "versionEndIncluding": null, "versionStartExc...
[ "611" ]
611
https://github.com/dom4j/dom4j/issues/87
[ "Third Party Advisory" ]
github.com
[ "dom4j", "dom4j" ]
The constructor `new org.dom4j.io.SAXReader()` calls one of the factory method form Java runtime library – `org.xml.sax.helpers.XMLReaderFactory.createXMLReader()` or `javax.xml.parsers.SAXParserFactory.newInstance().newSAXParser()`. These factory methods do not have safe defaults, such as downloading external entities...
SAXReader uses system XMLReaderFactory.createXMLReader() or SAXParserFactory.newInstance().newSAXParser() which has unsecure defaults
https://api.github.com/repos/dom4j/dom4j/issues/87/comments
4
2020-04-22T11:10:29Z
2020-07-30T14:44:22Z
https://github.com/dom4j/dom4j/issues/87
604,669,593
87
1,192
CVE-2020-11671
2020-05-04T14:15:13.230
Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nilsteampassnet/TeamPass/issues/2765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*", "matchCriteriaId": "819F6BD1-3958-4C85-B0B3-102A359A7634", "versionEndExcluding": null, "versionEndIncluding": "2.1.27.36", "versionStartE...
[ "862" ]
862
https://github.com/nilsteampassnet/TeamPass/issues/2765
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nilsteampassnet", "TeamPass" ]
TeamPass provides several APIs that can be used for programmatic access. None of these API functions perform authorization checks which means that any client with a valid API token is effectively an administrator. Any client with a valid API token can: - Read all passwords stored by Teampass - Create users. This in...
TeamPass API has no authorization checks
https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2765/comments
3
2020-04-02T16:23:40Z
2022-10-31T04:40:03Z
https://github.com/nilsteampassnet/TeamPass/issues/2765
592,759,568
2,765
1,193
CVE-2020-12439
2020-05-05T22:15:12.933
Grin before 3.1.0 allows attackers to adversely affect availability of data on a Mimblewimble blockchain.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mimblewimble/grin-security/blob/master/CVEs/CVE-2020-12439.md" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grin:grin:*:*:*:*:*:*:*:*", "matchCriteriaId": "F860E4C9-2EC4-4788-AD20-DC62ECF332EB", "versionEndExcluding": "3.1.0", "versionEndIncluding": null, "versionStartExcluding": n...
[ "404" ]
404
https://github.com/mimblewimble/grin/issues/3235
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "mimblewimble", "grin" ]
Recent exploration into the implementation of an index of "recently seen" kernels led us down the path of maintaining an "undo" list per block. This way we can robustly handle duplicate kernels, maintaining the pos of the most recent instance of the kernel in the index, while being able to handle rewind scenarios invol...
Rework output_pos index (better txhashset transactional support)
https://api.github.com/repos/mimblewimble/grin/issues/3235/comments
0
2020-02-20T15:50:04Z
2020-02-24T09:48:52Z
https://github.com/mimblewimble/grin/issues/3235
568,395,225
3,235
1,194
CVE-2020-12666
2020-05-05T22:15:13.027
macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/go-macaron/macaron/issues/198" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/go-macaron...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:go-macaron:macaron:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC570984-01B0-467F-BF87-4DD6A7047F30", "versionEndExcluding": "1.3.7", "versionEndIncluding": null, "versionStartExcl...
[ "601" ]
601
https://github.com/go-macaron/macaron/issues/198
[ "Exploit", "Third Party Advisory" ]
github.com
[ "go-macaron", "macaron" ]
看了这个issue,觉得蛮有意思,试了一下发现这个问题在另一种场景里可以发生 https://github.com/go-macaron/macaron/issues/125 需要开启静态文件服务 漏洞代码 ```go package main import "gopkg.in/macaron.v1" func main() { m := macaron.Classic() m.Get("/", func(ctx *macaron.Context) string { return "Hello world!" }) m.Use(macaron.Static("static")) m.Run()...
vulnerability: open redirect in static handler
https://api.github.com/repos/go-macaron/macaron/issues/198/comments
6
2020-04-30T13:58:41Z
2020-05-03T14:03:24Z
https://github.com/go-macaron/macaron/issues/198
610,028,077
198
1,195
CVE-2020-11042
2020-05-07T19:15:11.673
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PA...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F953BF38-4A6C-41EE-B646-37702989F524", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/FreeRDP/FreeRDP/issues/6010
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FreeRDP", "FreeRDP" ]
version ``` https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/window.c#L187 ``` vuln code `update_read_icon_info` first read `iconInfo->cbColorTable`, `iconInfo->cbBitsMask` and `iconInfo->cbBitsColor` from the wStream, ``` static BOOL update_read_icon_info...
memory out of bounds read in update_read_icon_info
https://api.github.com/repos/FreeRDP/FreeRDP/issues/6010/comments
2
2020-03-31T06:54:51Z
2020-05-15T00:17:56Z
https://github.com/FreeRDP/FreeRDP/issues/6010
590,846,045
6,010
1,196
CVE-2020-11045
2020-05-07T19:15:11.783
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PA...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/f8890a645c221823ac133dbf991f8a65ae50d637" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A5B1A9A-B56C-440D-9DD5-F8A6A9A4B7FF", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/FreeRDP/FreeRDP/issues/6005
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FreeRDP", "FreeRDP" ]
vuln code ``` static BOOL update_read_bitmap_data(rdpUpdate* update, wStream* s, BITMAP_DATA* bitmapData) { WINPR_UNUSED(update); if (Stream_GetRemainingLength(s) < 18) return FALSE; Stream_Read_UINT16(s, bitmapData->destLeft); Stream_Read_UINT16(s, bitmapData->destTop); Stream_Read_UINT16(s, bitmap...
memory out of bounds read in update_read_bitmap_data
https://api.github.com/repos/FreeRDP/FreeRDP/issues/6005/comments
4
2020-03-31T01:42:42Z
2020-05-08T06:25:52Z
https://github.com/FreeRDP/FreeRDP/issues/6005
590,719,810
6,005
1,198
CVE-2020-11046
2020-05-07T19:15:11.843
In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE"...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/ed53cd148f43cbab905eaa0f5308c2bf3c48cc37" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB5FC56A-970D-4AE5-A27E-EFD567E17449", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/FreeRDP/FreeRDP/issues/6006
[ "Third Party Advisory" ]
github.com
[ "FreeRDP", "FreeRDP" ]
version ``` https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/update.c#L293 ``` vuln code ``` static void update_read_synchronize(rdpUpdate* update, wStream* s) { WINPR_UNUSED(update); Stream_Seek_UINT16(s); /* pad2Octets (2 bytes) */ ...
stream out of bounds seek in update_read_synchronize could lead out of bounds read later
https://api.github.com/repos/FreeRDP/FreeRDP/issues/6006/comments
1
2020-03-31T02:32:52Z
2020-05-08T06:25:21Z
https://github.com/FreeRDP/FreeRDP/issues/6006
590,739,057
6,006
1,199
CVE-2020-11047
2020-05-07T20:15:12.127
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PA...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/f5e73cc7c9cd973b516a618da877c87b80950b65" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F953BF38-4A6C-41EE-B646-37702989F524", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/FreeRDP/FreeRDP/issues/6009
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FreeRDP", "FreeRDP" ]
version ``` https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/autodetect.c#L459 ``` vuln code autodetect_recv_bandwidth_measure_results read 8 bytes from stream without check stream's length ``` static BOOL autodetect_recv_bandwidth_measure_results(rdpRdp* rd...
memory out of bounds read in autodetect_recv_bandwidth_measure_results
https://api.github.com/repos/FreeRDP/FreeRDP/issues/6009/comments
0
2020-03-31T06:00:40Z
2020-04-06T11:53:33Z
https://github.com/FreeRDP/FreeRDP/issues/6009
590,820,131
6,009
1,200
CVE-2020-11048
2020-05-07T20:15:12.190
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds read. It only allows to abort a session. No data extraction is possible. This has been fixed in 2.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE"...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/9301bfe730c66180263248b74353daa99f5a969b" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "matchCriteriaId": "C492C074-0329-4949-9533-ED0FE1E0B088", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/FreeRDP/FreeRDP/issues/6007
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FreeRDP", "FreeRDP" ]
version ``` https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/rdp.c#L1129 ``` vuln code `rdp_read_share_control_header` could read 2 byte from stream, if `*length == 0x8000` , it could call `rdp_read_flow_control_pdu`. ``` BOOL rdp_read_share_control_header(wStr...
memory out of bounds read in rdp_read_flow_control_pdu
https://api.github.com/repos/FreeRDP/FreeRDP/issues/6007/comments
0
2020-03-31T05:40:01Z
2020-04-06T11:53:32Z
https://github.com/FreeRDP/FreeRDP/issues/6007
590,811,411
6,007
1,201
CVE-2020-11049
2020-05-07T20:15:12.237
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE"...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/c367f65d42e0d2e1ca248998175180aa9c2eacd0" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Part...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "matchCriteriaId": "F953BF38-4A6C-41EE-B646-37702989F524", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcludi...
[ "125" ]
125
https://github.com/FreeRDP/FreeRDP/issues/6008
[ "Exploit", "Third Party Advisory" ]
github.com
[ "FreeRDP", "FreeRDP" ]
version ``` https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/rdp.c#L1129 ``` vuln code if `Stream_GetRemainingLength(s) = 5` and `*length = 5`, it could one byte overflow read in `Stream_Read_UINT16(s, *channel_id);` ``` BOOL rdp_read_share_contro...
memory out of bounds read in rdp_read_share_control_header
https://api.github.com/repos/FreeRDP/FreeRDP/issues/6008/comments
0
2020-03-31T05:49:34Z
2020-04-06T12:17:12Z
https://github.com/FreeRDP/FreeRDP/issues/6008
590,815,387
6,008
1,202
CVE-2020-11052
2020-05-07T21:15:11.483
In Sorcery before 0.15.0, there is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sorcery_project:sorcery:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "07C2C42F-F970-4D1A-95FB-9EE238C0A190", "versionEndExcluding": "0.15.0", "versionEndIncluding": null, "version...
[ "307" ]
307
https://github.com/Sorcery/sorcery/issues/231
[ "Third Party Advisory" ]
github.com
[ "Sorcery", "sorcery" ]
Sorcery 0.14.0 is vulnerable to brute force attacks even if a login_lock_time_period is configured. If an attacker continues their login attempts after the initial login_lock_time_period has passed, Sorcery no longer rejects those login attempts until eventually the attacker has guessed the right password. This i...
brute force vulnerability
https://api.github.com/repos/Sorcery/sorcery/issues/231/comments
4
2020-04-30T15:06:10Z
2020-05-02T22:01:48Z
https://github.com/Sorcery/sorcery/issues/231
610,116,215
231
1,203
CVE-2020-11054
2020-05-07T21:15:11.590
In qutebrowser versions less than 1.11.1, reloading a page with certificate errors shows a green URL. After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg). However, when the affected website was subsequently loaded again, the URL was mistakenly disp...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.kde.org/show_bug.cgi?id=420902" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qutebrowser:qutebrowser:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED914DB-F493-4DC0-96DF-ED7B32A0316E", "versionEndExcluding": "1.11.1", "versionEndIncluding": null, "versionSta...
[ "684" ]
684
https://github.com/qutebrowser/qutebrowser/issues/5403
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "qutebrowser", "qutebrowser" ]
While working on 46b4d26a9ca1aba24a00ccd004606c8e3a6b17d4 I noticed that only the first load of pages with certificate errors gets a correctly colored URL. When loading a page with the default `content.ssl_strict = ask` setting, there's a prompt to confirm the certificate issue: ![image](https://user-images.githu...
Security: Reloading page with certificate errors falsely shows a green URL (CVE-2020-11054)
https://api.github.com/repos/qutebrowser/qutebrowser/issues/5403/comments
9
2020-05-02T14:11:19Z
2020-05-07T15:44:59Z
https://github.com/qutebrowser/qutebrowser/issues/5403
611,198,849
5,403
1,204
CVE-2020-12735
2020-05-08T05:15:11.717
reset.php in DomainMOD 4.13.0 uses insufficient entropy for password reset requests, leading to account takeover.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/domainmod/domainmod/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:domainmod:domainmod:4.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "3FE0220B-A5E7-4C9A-9DBD-31D840F2DDB5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "331" ]
331
https://github.com/domainmod/domainmod/issues/122
[ "Exploit", "Third Party Advisory" ]
github.com
[ "domainmod", "domainmod" ]
**Summary**: reset.php handles “resetting”/changing an existing user’s password. The reset functionality uses PHP’s time() to derive the new password for the user that is attempting to change their password. This method of using time() to create a temporary password is very deterministic and allows an attacker to i...
Authentication Bypass via reset.php
https://api.github.com/repos/domainmod/domainmod/issues/122/comments
1
2020-05-02T05:10:09Z
2020-05-03T05:23:17Z
https://github.com/domainmod/domainmod/issues/122
611,109,561
122
1,205
CVE-2020-12740
2020-05-08T18:15:10.457
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/576" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announc...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB196463-1184-4D1D-936B-8B9105BDDFD7", "versionEndExcluding": null, "versionEndIncluding": "4.3.2", "versionStartExcl...
[ "125" ]
125
https://github.com/appneta/tcpreplay/issues/576
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** A heap-based buffer overflow was discovered in tcprewrite binary, during the get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c. **To Reproduce** Steps to reproduce the behavior: 1. Compile tcpreplay according to the default configuration 2. execute...
Heap overflow in get_ipv6_next()
https://api.github.com/repos/appneta/tcpreplay/issues/576/comments
4
2020-05-08T15:35:39Z
2020-06-02T00:41:03Z
https://github.com/appneta/tcpreplay/issues/576
614,818,164
576
1,206
CVE-2020-12767
2020-05-09T21:15:11.007
exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https:...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexif_project:libexif:0.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "F9CA97AE-0601-4A69-BC8A-AEBAF8CD7EEA", "versionEndExcluding": null, "versionEndIncluding": null, "versionSt...
[ "369" ]
369
https://github.com/libexif/libexif/issues/31
[ "Patch", "Third Party Advisory" ]
github.com
[ "libexif", "libexif" ]
The problem of dividing by zero was found during the OSS Fuzz project test. Project: libexif Fuzzer: libFuzzer_libexif_exif_loader_fuzzer Fuzz target binary: exif_loader_fuzzer Platform Id: linux Type of test:undefined Command: ` python infra/helper.py build_fuzzers --sanitizer undefined libexif ` `pyt...
division by zero in libexif/exif-entry.c
https://api.github.com/repos/libexif/libexif/issues/31/comments
6
2020-02-18T01:59:09Z
2020-06-05T05:47:40Z
https://github.com/libexif/libexif/issues/31
566,598,341
31
1,208
CVE-2020-11058
2020-05-12T21:15:11.383
In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE"...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/3627aaf7d289315b614a584afb388f04abfb5bbf" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D51A2C7-56AC-4CD2-B6AC-560C3B166209", "versionEndExcluding": null, "versionEndIncluding": "2.0.0", "versionStartExcludi...
[ "125" ]
125
https://github.com/FreeRDP/FreeRDP/issues/6011
[ "Third Party Advisory" ]
github.com
[ "FreeRDP", "FreeRDP" ]
version ``` https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/capabilities.c#L1398 ``` vuln code `rdp_read_capability_sets` first read 2 byte to length, then check `Stream_GetRemainingLength(s) + 4 < length` assume `Stream_GetRemainingLength(s)=1` and `length...
stream out of bounds seek in rdp_read_font_capability_set could lead out of bounds read later
https://api.github.com/repos/FreeRDP/FreeRDP/issues/6011/comments
0
2020-03-31T10:46:15Z
2020-04-06T11:53:34Z
https://github.com/FreeRDP/FreeRDP/issues/6011
590,998,060
6,011
1,209
CVE-2020-11073
2020-05-13T19:15:11.863
In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/commit/30c77db7c83eca2bc5f6134fccbdc117b49a6a05" }, { "source": "security-advisories@github.com", "tags": [ "E...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autoswitch_python_virtualenv_project:autoswitch_python_virtualenv:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBFC8718-42EA-4765-B37C-9F5840333015", "versionEndExcluding": "1.16.0", "versionEn...
[ "22" ]
22
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122
[ "Exploit", "Third Party Advisory" ]
github.com
[ "MichaelAquilina", "zsh-autoswitch-virtualenv" ]
```bash git clone https://github.com/saleemrashid/evil-zsh-autoswitch-virtualenv.git cd evil-zsh-autoswitch-virtualenv cat evil.txt ``` The script `evil_virtualenv/bin/activate` will be sourced **without any user interaction**, which will: 1. Erase the "Switching virtualenv" message from the terminal (so the ...
Malicious scripts in untrusted directories are executed
https://api.github.com/repos/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122/comments
8
2020-01-07T11:00:15Z
2020-01-07T21:15:15Z
https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122
546,219,667
122
1,210
CVE-2020-12882
2020-05-15T05:15:13.397
Submitty through 20.04.01 allows XSS via upload of an SVG document, as demonstrated by an attack by a Student against a Teaching Fellow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://packetstormsecurity.com/files/157756/Submitty-20.04.01-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Submitty/Submitty/issues/5266" }, { ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rcos:submitty:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AA5D74C-AE38-41CE-B0C1-EFF897221AF6", "versionEndExcluding": null, "versionEndIncluding": "20.04.01", "versionStartExclud...
[ "79" ]
79
https://github.com/Submitty/Submitty/issues/5266
[ "Third Party Advisory" ]
github.com
[ "Submitty", "Submitty" ]
**Describe the bug** _This vulnerability can potentially enable any student to takeover the account of TA if they open the attachment as the cookie gets exposed._ A student logged in via username/password student:student has the ability to submit submissions for grading. This can be then viewed by TA from their...
[Security bug] Stored XSS Trigger for TA by user account
https://api.github.com/repos/Submitty/Submitty/issues/5266/comments
3
2020-04-19T19:46:42Z
2021-06-23T02:49:36Z
https://github.com/Submitty/Submitty/issues/5266
602,803,937
5,266
1,211
CVE-2020-12872
2020-05-15T19:15:12.087
yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks, if running on an Erlang/OTP virtual machine with a version less than 21.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/erlyaws/yaws/blob/c0fd79f17d52628fcec527da7fa3e788c283c445/src/yaws_config.erl#L2068-L2075" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yaws:yaws:*:*:*:*:*:*:*:*", "matchCriteriaId": "97BA4D60-E43A-4599-9B59-570183B4CC05", "versionEndExcluding": null, "versionEndIncluding": "2.0.6", "versionStartExcluding": n...
[ "326" ]
326
https://github.com/erlyaws/yaws/issues/402
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "erlyaws", "yaws" ]
While going trough some CVE feeds and track the information noticed the [CVE-2020-12872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12872) assignment for yaws, which is from the following [report](https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70) Were you informed about this?
CVE-2020-12872
https://api.github.com/repos/erlyaws/yaws/issues/402/comments
2
2020-05-24T13:03:23Z
2020-09-04T12:42:11Z
https://github.com/erlyaws/yaws/issues/402
623,860,560
402
1,212
CVE-2020-13118
2020-05-16T20:15:11.890
An issue was discovered in Mikrotik-Router-Monitoring-System through 2018-10-22. SQL Injection exists in check_community.php via the parameter community.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/157733/Mikrotik-Router-Monitoring-System-1.2.3-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mikrotik-router-monitoring-system_project:mikrotik-router-monitoring-system:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B6256EC-597F-4E6A-B56A-3D014879EDF1", "versionEndExcluding": null, "ver...
[ "89" ]
89
https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "adeoluwa-adebiyi", "Mikrotik-Router-Monitoring-System" ]
### Vulnerability type: SQL injection ### vulnerability code: in file `check_community.php line 49`: ``` include('credentials.php'); $community = $_GET['community']; $_SESSION['community'] = $community; $query = "SELECT name from router where `community`='$community'"; $conn = new mysqli($db_host,$db_user,$d...
Security issue: SQL injection
https://api.github.com/repos/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4/comments
0
2020-05-16T17:52:00Z
2021-09-27T19:44:27Z
https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4
619,524,622
4
1,213
CVE-2020-13121
2020-05-16T20:15:12.000
Submitty through 20.04.01 has an open redirect via authentication/login?old= during an invalid login attempt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Submitty/Submitty/issues/5265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rcos:submitty:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AA5D74C-AE38-41CE-B0C1-EFF897221AF6", "versionEndExcluding": null, "versionEndIncluding": "20.04.01", "versionStartExclud...
[ "601" ]
601
https://github.com/Submitty/Submitty/issues/5265
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Submitty", "Submitty" ]
**Describe the bug** It is possible to redirect a user to an attacker owned domain and trick the user. I am investigating on the potential chaining of this bug to perform other attacks. **Expected behavior** Redirection to external urls must not be allowed. **To Reproduce** This occurs at the main login page ...
[Security Bug] Open Redirection Vulnerability at Login Page
https://api.github.com/repos/Submitty/Submitty/issues/5265/comments
3
2020-04-19T16:32:45Z
2020-05-28T23:42:01Z
https://github.com/Submitty/Submitty/issues/5265
602,760,697
5,265
1,214
CVE-2019-20798
2020-05-18T00:15:11.157
An XSS issue was discovered in handler_server_info.c in Cherokee through 1.2.104. The requested URL is improperly displayed on the About page in the default configuration of the web server and its administrator panel. The XSS in the administrator panel can be used to reconfigure the server and execute arbitrary command...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1227" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://logicaltrust.net/blog/2019...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "version...
[ "79" ]
79
https://github.com/cherokee/webserver/issues/1227
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
Requested URL is improperly displayed on the About page. The problem occurs on default configuration in Cherokee and Cheroke administrator panel. XSS in administrator panel can be used to reconfigure the server and execute arbitrary commands. ### PoC ``` http://127.0.0.1/about/"><script>alert(1)</script> http://1...
Reflected XSS in handler_server_info
https://api.github.com/repos/cherokee/webserver/issues/1227/comments
1
2019-07-25T14:44:52Z
2019-11-14T07:47:17Z
https://github.com/cherokee/webserver/issues/1227
472,908,037
1,227
1,215
CVE-2019-20799
2020-05-18T00:15:11.237
In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1221" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webser...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "version...
[ "787" ]
787
https://github.com/cherokee/webserver/issues/1221
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
It's possible to trigger NULL pointer dereference in case if request uses POST method with empty body. cherokee/handler_admin.c ``` [...] 204 ret_t 205 cherokee_handler_admin_read_post (cherokee_handler_admin_t *hdl) 206 { 207 int re; 208 ret_t ret; 209 char ...
remote null pointer dereference trigger in admin handler
https://api.github.com/repos/cherokee/webserver/issues/1221/comments
4
2019-07-25T14:31:07Z
2019-11-14T08:11:35Z
https://github.com/cherokee/webserver/issues/1221
472,900,471
1,221
1,216
CVE-2019-20799
2020-05-18T00:15:11.237
In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1221" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webser...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "version...
[ "787" ]
787
https://github.com/cherokee/webserver/issues/1222
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
cherokee/buffer.c: ``` [...] escape_with_table (cherokee_buffer_t *buffer, 1342 cherokee_buffer_t *src, 1343 uint32_t *is_char_escaped) [...] 1346 const char *s,*s_next; [...] 1359 s = src->buf; 1360 do { 1361 s_next = utf8_get_next_char (s); 1362 ...
escape_with_table invalid access
https://api.github.com/repos/cherokee/webserver/issues/1222/comments
0
2019-07-25T14:34:23Z
2019-11-14T14:59:41Z
https://github.com/cherokee/webserver/issues/1222
472,902,318
1,222
1,217
CVE-2019-20799
2020-05-18T00:15:11.237
In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1221" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webser...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "version...
[ "787" ]
787
https://github.com/cherokee/webserver/issues/1225
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
### PoC ``` echo -n 'R0VUIC90ZXN0MTAvdGVzdC5odG1sIEhUVFAvMS4xCkFjY2VwdDogMTI3LjAuMC4xCkFjY2VwdC1DaGFyc2V0OiAxMjcuMC4wLjEKQWNjZXB0LUVuY29kaW5nOiAxMjcuMC4wLjEKQWNjZXB0LUxhbmd1YWdlOiAxMjcuMC4wLjEKQXV0aG9yaXphdGlvbjogMTI3LjAuMC4xCkNhY2hlLUNvbnRyb2w6IDEyNy4wLjAuMQpDaGFyZ2UtVG86IDEyNy4wLjAuMQpDb25uZWN0aW9uOiAxMjcuMC4wLjE...
heap-buffer-overflow in handler cgi
https://api.github.com/repos/cherokee/webserver/issues/1225/comments
1
2019-07-25T14:41:51Z
2019-11-16T20:58:16Z
https://github.com/cherokee/webserver/issues/1225
472,906,399
1,225
1,218
CVE-2019-20799
2020-05-18T00:15:11.237
In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1221" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webser...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "version...
[ "787" ]
787
https://github.com/cherokee/webserver/issues/1226
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
A socket structure is incorrectly used as ipv6 while connecting to a proxy server. ### PoC ``` echo -e "GET /test8/test.html HTTP/1.0\nUser-Agent: python\n\n" | nc 127.0.0.1 80 ``` ### ASAN ``` ==27029==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600001cd98 at pc 0x55ea3748a492 bp 0x7f6bc4...
incorrectly used ipv6 in proxy connection
https://api.github.com/repos/cherokee/webserver/issues/1226/comments
5
2019-07-25T14:44:01Z
2019-11-16T20:57:54Z
https://github.com/cherokee/webserver/issues/1226
472,907,578
1,226
1,219
CVE-2019-20800
2020-05-18T00:15:11.330
In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cherokee/webserver/issues/1224" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://logicaltrust.net/blog/2019...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845", "versionEndExcluding": null, "versionEndIncluding": "1.2.104", "version...
[ "787" ]
787
https://github.com/cherokee/webserver/issues/1224
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cherokee", "webserver" ]
struct cherokee_handler_cgi_t (handler_cgi.h) consist of a fixed sized array (char *envp[ENV_VAR_NUM]) for environ variables. Sending a request with a lot of headers, causes to increment int envp_last to a value greater than ENV_VAR_NUM resulting in reading outside the array. handler_cgi.c: ``` 310 cgi->...
CGI Handler too many headers
https://api.github.com/repos/cherokee/webserver/issues/1224/comments
1
2019-07-25T14:37:07Z
2019-11-16T19:39:09Z
https://github.com/cherokee/webserver/issues/1224
472,903,806
1,224
1,220
CVE-2020-13128
2020-05-18T00:15:11.547
An issue was discovered in Manolo GWTUpload 1.0.3. server/UploadServlet.java (the servlet for handling file upload) accepts a delay parameter that causes a thread to sleep. It can be abused to cause all of a server's threads to sleep, leading to denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/manolo/gwtupload/issues/33" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://logicaltrust.net/blog/2020/02/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gwtupload_project:gwtupload:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "83DF83B6-87E9-4C19-8616-59B0CE2A0364", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "434" ]
434
https://github.com/manolo/gwtupload/issues/33
[ "Exploit", "Third Party Advisory" ]
github.com
[ "manolo", "gwtupload" ]
There is a vulnerability which allows to perform DoS attack against the application server. The problem lies in handling `delay` parameter when upload is initiated (`gwtupload.server.UploadServlet#parsePostRequest`). Value from this parameter is used as an argument for `Thread.sleep` invocation. Malicious user can ...
Upload delay resulting in DoS
https://api.github.com/repos/manolo/gwtupload/issues/33/comments
3
2020-02-17T21:17:42Z
2021-02-14T16:44:21Z
https://github.com/manolo/gwtupload/issues/33
566,521,167
33
1,221
CVE-2020-2024
2020-05-19T21:15:10.070
An improper link resolution vulnerability affects Kata Containers versions prior to 1.11.0. Upon container teardown, a malicious guest can trick the kata-runtime into unmounting any mount point on the host and all mount points underneath it, potentiality resulting in a host DoS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2474" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kat...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D33AE8C-B850-4A56-B7F2-8D9CD0839E83", "versionEndExcluding": "1.11.0", "versionEndIncluding": null, "versionStar...
[ "59" ]
59
https://github.com/kata-containers/runtime/issues/2474
[ "Third Party Advisory" ]
github.com
[ "kata-containers", "runtime" ]
# Description of problem A container's host path might be changed by the guest to point to some other places by placing a symlink there. kata runtime should not follow link when unmounting them otherwise we might end up unmounting some other mountpoints unexpectedly.
harden container hostpath cleanup
https://api.github.com/repos/kata-containers/runtime/issues/2474/comments
0
2020-02-19T12:52:15Z
2020-05-29T14:05:22Z
https://github.com/kata-containers/runtime/issues/2474
567,548,955
2,474
1,222
CVE-2020-13163
2020-05-19T22:15:12.090
em-imap 0.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ConradIrwin/em-imap/issues/25" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:em-imap_project:em-imap:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "EBC712B8-7E31-4395-8FD2-18FAD5A67C9E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "295" ]
295
https://github.com/ConradIrwin/em-imap/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ConradIrwin", "em-imap" ]
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-095` The [GitHub Security Lab](https://securitylab.github.com) team has identified potential security vulnerabilities in [em-imap](https://github.com/ConradIrwin/em-imap). We are committed to working with you to help resolve these issues. In this repor...
Security vulnerability: missing SSL hostname validation
https://api.github.com/repos/ConradIrwin/em-imap/issues/25/comments
5
2020-05-18T21:43:41Z
2020-11-23T14:20:57Z
https://github.com/ConradIrwin/em-imap/issues/25
620,524,200
25
1,223
CVE-2020-13225
2020-05-20T04:15:10.427
phpIPAM 1.4 contains a stored cross site scripting (XSS) vulnerability within the Edit User Instructions field of the User Instructions widget.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phpipam/phpipam/issues/3025" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=SpFmM...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpipam:phpipam:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B073F95-66BA-4D4E-888F-51DC1B2B834A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/phpipam/phpipam/issues/3025
[ "Exploit", "Third Party Advisory" ]
github.com
[ "phpipam", "phpipam" ]
Version: 1.4 Within the Edit User Instructions field where you can enter source code you are able to generate scripting that then executes in the user's browser when they click on the instructions page. POC: ``` <body onload=alert(1)></body>``` Additionally, ```<a href=# onmouseover=alert(1)>Text</a>``` ...
Stored XSS in User Instructions Widget
https://api.github.com/repos/phpipam/phpipam/issues/3025/comments
3
2020-05-17T10:45:44Z
2020-09-14T10:26:31Z
https://github.com/phpipam/phpipam/issues/3025
619,669,375
3,025
1,224
CVE-2020-13226
2020-05-20T12:15:11.520
WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisories" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/WSO2+Security+Vulnerability+Ma...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8FF14774-8935-4FC9-B5C8-9771B3D6EBFD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "918" ]
918
https://github.com/wso2/docs-apim/issues/816
[ "Third Party Advisory" ]
github.com
[ "wso2", "docs-apim" ]
**Description:** in a WSO2 API-M deployment, we recommend restricting outbound connections of the Publisher node only to the required internal nodes (only to the nodes which Publisher portal is intended to communicate with) of the deployment. So even if privileged user credentials were exploited to a user with malicio...
Add n/w level security guideline to to restrict outbound connections of Publisher node.
https://api.github.com/repos/wso2/docs-apim/issues/816/comments
1
2020-03-10T05:34:53Z
2020-06-09T07:00:28Z
https://github.com/wso2/docs-apim/issues/816
578,348,516
816
1,225
CVE-2020-13226
2020-05-20T12:15:11.520
WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/Security+Advisories" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.wso2.com/display/Security/WSO2+Security+Vulnerability+Ma...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8FF14774-8935-4FC9-B5C8-9771B3D6EBFD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "918" ]
918
https://github.com/wso2/product-apim/issues/7677
[ "Third Party Advisory" ]
github.com
[ "wso2", "product-apim" ]
### Describe your problem(s) Currently, the API endpoint validation (`https://localhost:9443/api/am/publisher/v1.0/apis/validate-endpoint?endpointUrl=''`) in the Publisher portal takes place via a direct HTTP Head call initiated from the Publisher node. This can be further improved by routing this request through th...
Deploy endpoint validation API in API Gateway
https://api.github.com/repos/wso2/product-apim/issues/7677/comments
1
2020-03-10T05:23:03Z
2020-06-09T07:01:55Z
https://github.com/wso2/product-apim/issues/7677
578,345,111
7,677
1,226
CVE-2020-13230
2020-05-20T14:15:11.407
In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3343" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E927CB-B43A-486F-980C-24BB8CF50FBD", "versionEndExcluding": "1.2.11", "versionEndIncluding": null, "versionStartExcluding"...
[ "281" ]
281
https://github.com/Cacti/cacti/issues/3343
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** Cacti admin console provides a functionality to disable a created user which takes his privileges to perform any action but if a page is auto-refreshed a disabled user can view updated data. **To Reproduce** Steps to reproduce the behavior: 1. Log in with Admin account and navigate to http://...
Improper Access Control on disabling a user.
https://api.github.com/repos/Cacti/cacti/issues/3343/comments
2
2020-03-11T14:37:20Z
2020-06-30T12:20:21Z
https://github.com/Cacti/cacti/issues/3343
579,312,165
3,343
1,227
CVE-2020-13231
2020-05-20T14:15:11.487
In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Cacti/cacti/issues/3342" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/Cacti/cacti/releases/t...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E927CB-B43A-486F-980C-24BB8CF50FBD", "versionEndExcluding": "1.2.11", "versionEndIncluding": null, "versionStartExcluding"...
[ "352" ]
352
https://github.com/Cacti/cacti/issues/3342
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
**Describe the bug** A malformed GET request at http://192.168.56.106/cacti/auth_profile.php?action=edit can lead to admin email change. Affected URI http://192.168.56.106/cacti/auth_profile.php?action=edit **To Reproduce** Steps to reproduce the behavior: 1. Go to 'http://192.168.56.106/cacti/auth_profile.ph...
CSRF at Admin Email
https://api.github.com/repos/Cacti/cacti/issues/3342/comments
2
2020-03-11T13:32:33Z
2020-06-30T12:20:22Z
https://github.com/Cacti/cacti/issues/3342
579,267,172
3,342
1,228
CVE-2020-13246
2020-05-20T18:15:12.667
An issue was discovered in Gitea through 1.11.5. An attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/go-gitea/gitea/issues/10549" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*", "matchCriteriaId": "6017D44E-852F-4935-B006-64BF03A9F091", "versionEndExcluding": null, "versionEndIncluding": "1.11.5", "versionStartExcluding"...
[ "667" ]
667
https://github.com/go-gitea/gitea/issues/10549
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "go-gitea", "gitea" ]
- Gitea version (or commit ref): v1.11.1 - Git version: 2.20.1 - Operating system: Debian 10.3 - Database (use `[x]`): - [ ] PostgreSQL - [ ] MySQL - [ ] MSSQL - [x] SQLite - Can you reproduce the bug at https://try.gitea.io: - [ ] Yes (provide example URL) - [x] No - [ ] Not relevant - Log gi...
Server freezes when transferring the ownership
https://api.github.com/repos/go-gitea/gitea/issues/10549/comments
27
2020-03-01T08:47:20Z
2020-11-24T02:14:54Z
https://github.com/go-gitea/gitea/issues/10549
573,508,870
10,549
1,229
CVE-2020-13258
2020-05-21T17:15:10.353
Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/contentful/the-example-app.py/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contentful:python_example:*:*:*:*:*:*:*:*", "matchCriteriaId": "75F6AE03-95E4-4482-8F91-17E45B1B3E67", "versionEndExcluding": null, "versionEndIncluding": "2020-05-21", "vers...
[ "79" ]
79
https://github.com/contentful/the-example-app.py/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "contentful", "the-example-app.py" ]
Hi Team I found a reflected xss vulnerability. routes/base.py ``` def query_string(): """Returns a sanitized query string.""" rejected_keys = [ 'space_id', 'delivery_token', 'preview_token', 'editorial_features' ] args = {k: v for k, v in ...
Reflected Xss
https://api.github.com/repos/contentful/the-example-app.py/issues/44/comments
3
2020-05-21T13:52:53Z
2020-06-17T13:56:18Z
https://github.com/contentful/the-example-app.py/issues/44
622,514,092
44
1,230
CVE-2019-20803
2020-05-21T22:15:09.957
Gila CMS before 1.11.6 has reflected XSS via the admin/content/postcategory id parameter, which is mishandled for g_preview_theme.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gilacms:gila_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F865E099-01EA-40D5-A296-3E1BF736AF8E", "versionEndExcluding": "1.11.6", "versionEndIncluding": null, "versionStartExclu...
[ "79" ]
79
https://github.com/GilaCMS/gila/issues/56
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GilaCMS", "gila" ]
**Describe the bug** XSS when a admin click on the link bellow, the g_preview_theme parameter not encoding the double quotes, an attacker could trick the admin to click on that link.. https://demo.gilacms.com/cm/edit_form/postcategory?id=8%22+%3E%3Cscript%3Ealert(1)%3C/script%3E **To Reproduce** Steps to reprodu...
Cross Site Scripting (XSS) -
https://api.github.com/repos/GilaCMS/gila/issues/56/comments
2
2019-10-29T14:30:35Z
2019-11-10T22:54:40Z
https://github.com/GilaCMS/gila/issues/56
513,961,405
56
1,231
CVE-2019-20804
2020-05-21T22:15:10.003
Gila CMS before 1.11.6 allows CSRF with resultant XSS via the admin/themes URI, leading to compromise of the admin account.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gilacms:gila_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "F865E099-01EA-40D5-A296-3E1BF736AF8E", "versionEndExcluding": "1.11.6", "versionEndIncluding": null, "versionStartExclu...
[ "352" ]
352
https://github.com/GilaCMS/gila/issues/57
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GilaCMS", "gila" ]
#### Title - Persistence XSS at "https://demo.gilacms.com/admin/themes" #### Description - A number of factors lead to an attack that could compromise an admin user account. The following steps describe how to achieve it. First, the functionality in question is vulnerable to XSS attacks in the field responsible ...
XSS + CSRF - Admin account takeover
https://api.github.com/repos/GilaCMS/gila/issues/57/comments
1
2019-10-29T16:48:33Z
2019-11-10T22:44:27Z
https://github.com/GilaCMS/gila/issues/57
514,068,129
57
1,232
CVE-2018-21234
2020-05-21T23:15:11.103
Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/oblac/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jodd:jodd:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD427A38-CFDA-4A9B-ADD2-F56A19928CDD", "versionEndExcluding": "5.0.4", "versionEndIncluding": null, "versionStartExcluding": n...
[ "502" ]
502
https://github.com/oblac/jodd/issues/628
[ "Third Party Advisory" ]
github.com
[ "oblac", "jodd" ]
## Current behavior Jodd's Json parser supports polymorphic deserialization when setClassMetadataName is set. If an application parses JSON with this configuration from an untrusted source, it could lead to remote code execution. The problem is quite the same as in other Java JSON libraries. Here you can read more:...
Potential vulnerability in JSON deserialization
https://api.github.com/repos/oblac/jodd/issues/628/comments
5
2018-08-17T13:37:15Z
2022-03-29T02:10:34Z
https://github.com/oblac/jodd/issues/628
351,597,881
628
1,233
CVE-2020-13429
2020-05-24T18:15:10.003
legend.ts in the piechart-panel (aka Pie Chart Panel) plugin before 1.5.0 for Grafana allows XSS via the Values Header (aka legend header) option.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/grafana/piechart-panel/issues/218" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grafana:piechart-panel:*:*:*:*:*:grafana:*:*", "matchCriteriaId": "F1789E82-FAE0-4BA1-BFD2-E59E155B44DC", "versionEndExcluding": "1.5.0", "versionEndIncluding": null, "versio...
[ "79" ]
79
https://github.com/grafana/piechart-panel/issues/218
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "grafana", "piechart-panel" ]
The pie-chart panel is potentially vulnerable to XSS scripting as it processes any javascript in the "Values Header" configuration option. e.g. <img src=/ onerror=alert('piechart_XSS')> ![image](https://user-images.githubusercontent.com/8004654/73850017-deaa1d80-4822-11ea-9b15-30f14c20f853.png)
XSS flaw in piechart panel
https://api.github.com/repos/grafana/piechart-panel/issues/218/comments
0
2020-02-05T14:23:34Z
2020-05-14T22:13:21Z
https://github.com/grafana/piechart-panel/issues/218
560,405,028
218
1,234
CVE-2020-13438
2020-05-24T23:15:09.867
ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
[ "125" ]
125
https://github.com/rockcarry/ffjpeg/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Tested in Ubuntu 16.04, 64bit. The testcase is [segv_ffjpeg_e2](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/segv_ffjpeg_e2). I use the following command: ``` ffjpeg -e segv_ffjpeg_e2 ``` and get: ``` Segmentation fault ``` I use **valgrind** to analysis the bug and get the be...
SEGV in function jfif_encode in jfif.c:748
https://api.github.com/repos/rockcarry/ffjpeg/issues/23/comments
2
2020-05-23T17:08:31Z
2020-07-27T08:14:45Z
https://github.com/rockcarry/ffjpeg/issues/23
623,701,501
23
1,235
CVE-2020-13439
2020-05-24T23:15:09.927
ffjpeg through 2020-02-24 has a heap-based buffer over-read in jfif_decode in jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
[ "125" ]
125
https://github.com/rockcarry/ffjpeg/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Tested in Ubuntu 16.04, 64bit. The tesecase is [heap-buffer-overflow_ffjpeg_d1](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/heap-buffer-overflow_ffjpeg_d1). I use the following command: ``` ffjpeg -d heap-buffer-overflow_ffjpeg_d1 ``` and get: ``` Segmentation fault ``` I use...
heap-buffer-overflow in function jfif_decode at jfif.c:546
https://api.github.com/repos/rockcarry/ffjpeg/issues/24/comments
2
2020-05-23T17:09:21Z
2020-07-27T08:17:04Z
https://github.com/rockcarry/ffjpeg/issues/24
623,701,677
24
1,236
CVE-2020-13440
2020-05-24T23:15:09.990
ffjpeg through 2020-02-24 has an invalid write in bmp_load in bmp.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Pa...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
[ "787" ]
787
https://github.com/rockcarry/ffjpeg/issues/22
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
Tested in Ubuntu 16.04, 64bit. The testcase is [segv_ffjpeg_e1](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/segv_ffjpeg_e1). I use the following command: ``` ffjpeg -e segv_ffjpeg_e1 ``` and get: ``` Segmentation fault ``` I use **valgrind** to analysis the bug and get the be...
SEGV in function bmp_load at bmp.c:57
https://api.github.com/repos/rockcarry/ffjpeg/issues/22/comments
3
2020-05-23T17:07:53Z
2022-05-22T03:18:28Z
https://github.com/rockcarry/ffjpeg/issues/22
623,701,352
22
1,237
CVE-2020-13482
2020-05-25T22:15:09.860
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/igrigorik/em-http-request/issues/339" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archiv...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:em-http-request_project:em-http-request:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7290B2E9-010E-426D-8D25-255A1F3A8F39", "versionEndExcluding": null, "versionEndIncluding": null, ...
[ "295" ]
295
https://github.com/igrigorik/em-http-request/issues/339
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "igrigorik", "em-http-request" ]
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-094` ## Summary Missing hostname validation allows an attacker to perform a man in the middle attack against users of the library. ## Product em-http-request ## Tested Version 1.1.5 ### Missing SSL/TLS certificate hostname validation ...
Security vulnerability: missing SSL hostname validation
https://api.github.com/repos/igrigorik/em-http-request/issues/339/comments
10
2020-05-24T21:28:35Z
2020-06-01T23:55:37Z
https://github.com/igrigorik/em-http-request/issues/339
623,949,977
339
1,238
CVE-2020-13614
2020-05-26T23:15:10.460
An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axel_project:axel:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EF615CC-5169-409A-AA55-1F60BFFAEA6F", "versionEndExcluding": "2.17.8", "versionEndIncluding": null, "versionStartExcl...
[ "295" ]
295
https://github.com/axel-download-accelerator/axel/issues/262
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axel-download-accelerator", "axel" ]
It looks like Axel's SSL's connections do not verify server certificate hostnames. To fix this the SSL context should set a certificate callback or use `SSL_set1_host` to set the intended hostname. This is an issue since it uses `SSL_CTX_set_default_verify_paths` and loads all root authorities from the OS. See https...
Axel may not verify server certificate CN/SAN/hostname (allowing SSL interception)
https://api.github.com/repos/axel-download-accelerator/axel/issues/262/comments
0
2020-03-16T22:55:56Z
2020-03-23T22:35:39Z
https://github.com/axel-download-accelerator/axel/issues/262
582,644,624
262
1,239
CVE-2020-13615
2020-05-26T23:15:10.973
lib/QoreSocket.cpp in Qore before 0.9.4.2 lacks hostname verification for X.509 certificates.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/qorelanguage/qore/compare/release-0.9.4.1...release-0.9.4.2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:qore:qore:*:*:*:*:*:*:*:*", "matchCriteriaId": "4217183A-CB12-4768-BCA3-524B5DAEBD82", "versionEndExcluding": "0.9.4.2", "versionEndIncluding": null, "versionStartExcluding":...
[ "295" ]
295
https://github.com/qorelanguage/qore/issues/3808
[ "Patch", "Third Party Advisory" ]
github.com
[ "qorelanguage", "qore" ]
see: https://gist.github.com/theopolis/aeaa8e4808f6b09328dd6996a2ed6c34
Qore does not perform hostname validation during certification X.509 validation
https://api.github.com/repos/qorelanguage/qore/issues/3808/comments
0
2020-03-04T06:46:33Z
2020-03-07T15:11:28Z
https://github.com/qorelanguage/qore/issues/3808
575,174,425
3,808
1,240
CVE-2020-13622
2020-05-27T00:15:11.497
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3787" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/pull...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3787
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9 ###### Build platform Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64) ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-...
Assertion 'ecma_is_value_string (value)' failed at jerry-core/ecma/base/ecma-helpers-value.c(ecma_get_string_from_value):742
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3787/comments
0
2020-05-23T17:53:33Z
2020-05-26T13:22:51Z
https://github.com/jerryscript-project/jerryscript/issues/3787
623,709,607
3,787
1,241
CVE-2020-13623
2020-05-27T00:15:11.557
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "400" ]
400
https://github.com/jerryscript-project/jerryscript/issues/3785
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9 ###### Build platform Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64) ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-...
Stack Exhaustion (ecma_proxy_object_get, ecma_proxy_object_set)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3785/comments
3
2020-05-23T08:58:58Z
2020-05-26T07:44:39Z
https://github.com/jerryscript-project/jerryscript/issues/3785
623,613,918
3,785
1,242
CVE-2020-11075
2020-05-27T22:15:11.000
In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/anchore/anchore-engine/commit/e41786901f097fd32104447a45864073105d37db" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:anchore:engine:0.7.0:-:*:*:*:*:*:*", "matchCriteriaId": "CCBB339C-2583-4E05-9F59-70B8C6B677D3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "114" ]
114
https://github.com/anchore/anchore-engine/issues/430
[ "Patch", "Third Party Advisory" ]
github.com
[ "anchore", "anchore-engine" ]
In the anchore skopeo wrapper, as of 0.7.0, there is logic that supports multiple attempts to download an image from a registry using a combination of os override and destination type options. The initial implementation in 0.7.0 attempts to derive an os override option from the image manifest itself, but there are onl...
Ensure only supported os overrides are used in skopeo download commands
https://api.github.com/repos/anchore/anchore-engine/issues/430/comments
0
2020-04-22T22:33:27Z
2020-04-22T22:54:56Z
https://github.com/anchore/anchore-engine/issues/430
605,116,300
430
1,243
CVE-2019-20805
2020-06-01T14:15:09.977
p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking via crafted values in a PT_DYNAMIC segment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/8be9da8280dfa69d5df4417d4d81bda1cab78010" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/upx/upx/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93", "versionEndExcluding": "3.96", "versionEndIncluding": null, "versionStartExcludin...
[ "190" ]
190
https://github.com/upx/upx/issues/317
[ "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
ubuntu 1604 x32 //////////////////////////////////////////////////////////// ddos 1 attachment p_lx_elf.cpp^%1613 p_lx_elf.cpp:1613 unsigned const nbucket = get_te32(&hashtab[0]); crashes ///////////////////////////////////////////////////////////////////// ddos 2 attachment p_lx_elf.cpp^%1635 p_lx_elf.cpp:1635...
upx-devel ddos Vulnerability
https://api.github.com/repos/upx/upx/issues/317/comments
1
2019-11-21T09:32:01Z
2020-01-16T11:38:51Z
https://github.com/upx/upx/issues/317
526,469,669
317
1,246
CVE-2020-13757
2020-06-01T19:15:10.067
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sybrenstuvel/python-rsa/issues/146" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python-rsa_project:python-rsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FF2CAA4-9911-439F-88CC-526D14B768A4", "versionEndExcluding": "4.1", "versionEndIncluding": null, "version...
[ "327" ]
327
https://github.com/sybrenstuvel/python-rsa/issues/146
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sybrenstuvel", "python-rsa" ]
Hello, Using this testcase from Google Wycheproof: ``` { "algorithm" : "RSAES-PKCS1-v1_5", "generatorVersion" : "0.8r12", "numberOfTests" : 65, "header" : [ "Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption", "of RSA encrypted ciphertexts." ], "notes" : { ...
python-rsa does not detect ciphertext modification (prepended "0" bytes) in PKCS1_v1_5
https://api.github.com/repos/sybrenstuvel/python-rsa/issues/146/comments
12
2020-05-27T08:11:51Z
2020-06-10T22:08:17Z
https://github.com/sybrenstuvel/python-rsa/issues/146
625,477,884
146
1,247
CVE-2020-13757
2020-06-01T19:15:10.067
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sybrenstuvel/python-rsa/issues/146" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python-rsa_project:python-rsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FF2CAA4-9911-439F-88CC-526D14B768A4", "versionEndExcluding": "4.1", "versionEndIncluding": null, "version...
[ "327" ]
327
https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sybrenstuvel", "python-rsa" ]
Hello, Using this testcase from Google Wycheproof: ``` { "algorithm" : "RSAES-PKCS1-v1_5", "generatorVersion" : "0.8r12", "numberOfTests" : 65, "header" : [ "Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption", "of RSA encrypted ciphertexts." ], "notes" : { ...
python-rsa does not detect ciphertext modification (prepended "0" bytes) in PKCS1_v1_5
https://api.github.com/repos/sybrenstuvel/python-rsa/issues/146/comments
12
2020-05-27T08:11:51Z
2020-06-10T22:08:17Z
https://github.com/sybrenstuvel/python-rsa/issues/146
625,477,884
146
1,248
CVE-2018-18623
2020-06-02T17:15:11.427
Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/grafana/grafana/issues/15293" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/grafana/grafana/p...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:grafana:grafana:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B5A57091-8B8C-48EE-AD42-0E16B2961231", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "79" ]
79
https://github.com/grafana/grafana/issues/15293
[ "Exploit", "Third Party Advisory" ]
github.com
[ "grafana", "grafana" ]
#### Grafana is vulnerable to XSS vulnerability because the panels included in the description below can contain html. Therefore, the option to disable or filter the html source must be provided. > [Affected Component] > #Grafana(5.3.1) > Dashboard > Text Panel > > [Attack Vectors] > 1. Grafana(5.3.1) Launch ...
XSS: Option to disable or sanitize html source in some panels
https://api.github.com/repos/grafana/grafana/issues/15293/comments
4
2019-02-07T05:48:46Z
2019-11-06T01:37:45Z
https://github.com/grafana/grafana/issues/15293
407,551,041
15,293
1,249
CVE-2020-12607
2020-06-02T21:15:10.607
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. The...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/AntonKueltz/fastecdsa/commit/4a16daeaf139be20654ef58a9fe4c79dc030458c" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:antonkueltz:fastecdsa:*:*:*:*:*:*:*:*", "matchCriteriaId": "757F0CBF-E904-4C5C-9247-A116DABA2DA3", "versionEndExcluding": "2.1.2", "versionEndIncluding": null, "versionStartE...
[ "347" ]
347
https://github.com/AntonKueltz/fastecdsa/issues/52
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AntonKueltz", "fastecdsa" ]
Hello, When verifying a ECDSA signature (P-256, SHA-256) with a extreme value in k and s^-1, the verification fails even if the signature is correct. It is possible to check this using the Google Wycheproof test 345 (https://github.com/google/wycheproof/blob/master/testvectors/ecdsa_secp256r1_sha256_test.json): `...
ECDSA verification fails for extreme value in k and s^-1 (P-256, SHA-256)
https://api.github.com/repos/AntonKueltz/fastecdsa/issues/52/comments
4
2020-04-13T15:05:16Z
2020-05-26T07:55:47Z
https://github.com/AntonKueltz/fastecdsa/issues/52
598,941,747
52
1,251