cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-11104 | 2020-03-30T22:15:15.117 | An issue was discovered in USC iLab cereal through 1.3.0. Serialization of an (initialized) C/C++ long double variable into a BinaryArchive or PortableBinaryArchive leaks several bytes of stack or heap memory, from which sensitive information (such as memory layout or private keys) can be gleaned if the archive is dist... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/USCiLab/cereal/issues/625"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:usc:cereal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F4B1C0-4CBE-45BE-A5F5-F8E8F6DCF076",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": ... | [
"908"
] | 908 | https://github.com/USCiLab/cereal/issues/625 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"USCiLab",
"cereal"
] | Serializing the C/C++ native type ```long double``` stores uninitialized data into the serialized form.
Compile and run the following program with valgrind to observe this.
```cpp
#include <cereal/archives/binary.hpp>
#include <stdio.h>
#include <sstream>
#include <string>
int main(void)
{
std::strin... | Serializing long double variables leaks uninitialized memory | https://api.github.com/repos/USCiLab/cereal/issues/625/comments | 4 | 2020-03-03T02:10:37Z | 2020-04-03T10:05:01Z | https://github.com/USCiLab/cereal/issues/625 | 574,368,150 | 625 | 1,146 |
CVE-2020-11105 | 2020-03-30T22:15:15.180 | An issue was discovered in USC iLab cereal through 1.3.0. It employs caching of std::shared_ptr values, using the raw pointer address as a unique identifier. This becomes problematic if an std::shared_ptr variable goes out of scope and is freed, and a new std::shared_ptr is allocated at the same address. Serialization ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/USCiLab/cereal/issues/636"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:usc:cereal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F4B1C0-4CBE-45BE-A5F5-F8E8F6DCF076",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.0",
"versionStartExcluding": ... | [
"763"
] | 763 | https://github.com/USCiLab/cereal/issues/636 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"USCiLab",
"cereal"
] | Cereal employs caching of ```std::shared_ptr``` values, using the raw pointer as a unique identifier. This becomes problematic if an ```std::shared_ptr``` variable goes out of scope and is freed, and a new ```std::shared_ptr``` is allocated at the same address. Serialization fidelity thereby becomes dependent upon memo... | std::shared_ptr serialization asymmetry (depends on memory layout) | https://api.github.com/repos/USCiLab/cereal/issues/636/comments | 4 | 2020-03-27T23:28:34Z | 2021-02-01T23:50:29Z | https://github.com/USCiLab/cereal/issues/636 | 589,460,463 | 636 | 1,147 |
CVE-2020-11106 | 2020-03-30T22:15:15.243 | An issue was discovered in Responsive Filemanager through 9.14.0. In the dialog.php page, the session variable $_SESSION['RF']["view_type"] wasn't sanitized if it was already set. This made stored XSS possible if one opens ajax_calls.php and uses the "view" action and places a payload in the type parameter, and then re... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/trippo/ResponsiveFilemanager/issues/603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "ht... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54CD0F21-D4B5-4F0A-87ED-FA0D20A9D73C",
"versionEndExcluding": null,
"versionEndIncluding": "9.14.0",
"ver... | [
"79"
] | 79 | https://github.com/trippo/ResponsiveFilemanager/issues/603 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"trippo",
"ResponsiveFilemanager"
] | After taking another look at the ResponsiveFilemanager 9.14.0 i noticed that in the dialog.php file on line 197 that if the $_SESSION['RF']["view_type"] is already set that there would not be done any validation or would it take the data from the config.
https://github.com/trippo/ResponsiveFilemanager/blob/master/file... | Stored xss in v9.14.0 in dialog.php in $_SESSION['RF']["view_type"] because of no validation if ajax_calls.php setted this session. | https://api.github.com/repos/trippo/ResponsiveFilemanager/issues/603/comments | 1 | 2020-03-28T11:53:58Z | 2020-03-31T00:13:52Z | https://github.com/trippo/ResponsiveFilemanager/issues/603 | 589,562,673 | 603 | 1,148 |
CVE-2020-11111 | 2020-03-31T05:15:13.007 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2664"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96",
"versionEndExcluding": "2.9.10.4",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2664 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding classes of `org.apache.activemq:activemq-pool`, `org.apache.activemq:activemq-pool-jms` libraries.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-11111
Re... | Block one more gadget type (activemq-pool[-jms], CVE-2020-11111) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2664/comments | 2 | 2020-03-24T17:04:06Z | 2020-12-02T03:59:26Z | https://github.com/FasterXML/jackson-databind/issues/2664 | 587,124,374 | 2,664 | 1,149 |
CVE-2020-11112 | 2020-03-31T05:15:13.070 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2666"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96",
"versionEndExcluding": "2.9.10.4",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2666 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding a class of `org.apache.commons:commons-proxy` library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-11112
Reporter: Yiting Fan
Fix will be included i... | Block one more gadget type (apache/commons-proxy, CVE-2020-11112) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2666/comments | 0 | 2020-03-25T17:06:51Z | 2020-12-02T03:59:15Z | https://github.com/FasterXML/jackson-databind/issues/2666 | 587,851,588 | 2,666 | 1,150 |
CVE-2020-11113 | 2020-03-31T05:15:13.117 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.openjpa.ee.WASRegistryManagedRuntime (aka openjpa). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2670"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96",
"versionEndExcluding": "2.9.10.4",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2670 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `org.apache.openjpa:openjpa`. library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-11113
Reporter: XuYuanzhen (of Alibaba Cloud Security T... | Block one more gadget type (openjpa, CVE-2020-11113) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2670/comments | 0 | 2020-03-28T18:08:54Z | 2020-04-07T01:41:29Z | https://github.com/FasterXML/jackson-databind/issues/2670 | 589,629,001 | 2,670 | 1,151 |
CVE-2020-11441 | 2020-03-31T17:15:26.497 | phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/phpmyadmin/phpmyadmin/issues/16056"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpmyadmin:phpmyadmin:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "310D977D-2D64-4817-B054-2AC6CE7C6237",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"74"
] | 74 | https://github.com/phpmyadmin/phpmyadmin/issues/16056 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"phpmyadmin",
"phpmyadmin"
] | ### Describe the bug
The login form does not properly escape CRLF sequences, this can lead to HTML entity injection at the very least, or reflected XSS at the very worst.
### To Reproduce
Steps to reproduce the behavior:
1. Go to 'index.php'
2. Insert into the login fields, username, password, and the hidden... | CRLF/HTML entity injection with most recent version of PHPMyAdmin | https://api.github.com/repos/phpmyadmin/phpmyadmin/issues/16056/comments | 19 | 2020-03-30T01:21:02Z | 2022-07-16T00:27:33Z | https://github.com/phpmyadmin/phpmyadmin/issues/16056 | 589,932,745 | 16,056 | 1,152 |
CVE-2020-5290 | 2020-04-01T20:15:15.223 | In RedpwnCTF before version 2.3, there is a session fixation vulnerability in exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint. An attacker team could potentially steal flags by, for example, exploiting a stored XSS payload in a CTF challenge so that victim teams who solve the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/redpwn/rctf/issues/147"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ctfd:rctf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92D682E4-811E-49EF-A74D-F434C9831458",
"versionEndExcluding": "2.3",
"versionEndIncluding": null,
"versionStartExcluding": nul... | [
"384"
] | 384 | https://github.com/redpwn/rctf/issues/147 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"redpwn",
"rctf"
] | ### Description
There is a session fixation vulnerability in rCTF exploitable through the `#token=$ssid` hash when making a request to the `/verify` endpoint.
#### Vulnerable code
```js
document.title = 'Verify' + config.ctfTitle
const prefix = '#token='
if (document.location.hash.startsWith(prefix... | Session fixation vulnerability in /verify | https://api.github.com/repos/redpwn/rctf/issues/147/comments | 0 | 2020-03-29T07:04:38Z | 2020-04-01T23:21:44Z | https://github.com/redpwn/rctf/issues/147 | 589,734,776 | 147 | 1,153 |
CVE-2019-11254 | 2020-04-01T21:15:13.397 | The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/89535"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://groups.google.com/d/msg/kubernetes-announce/AL... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87849953-B423-4E3B-A977-A62A88B40037",
"versionEndExcluding": "1.15.10",
"versionEndIncluding": null,
"versionStar... | [
"1050"
] | 1050 | https://github.com/kubernetes/kubernetes/issues/89535 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVE-2019-11254 is a denial of service vulnerability in the kube-apiserver, allowing authorized users sending malicious YAML payloads to cause kube-apiserver to consume excessive CPU cycles while parsing YAML.
The issue was discovered via the fuzz test kubernetes/kubernetes#83750.
**Affected components:**
Kuber... | CVE-2019-11254: kube-apiserver Denial of Service vulnerability from malicious YAML payloads | https://api.github.com/repos/kubernetes/kubernetes/issues/89535/comments | 2 | 2020-03-26T18:55:26Z | 2022-08-23T02:18:32Z | https://github.com/kubernetes/kubernetes/issues/89535 | 588,652,998 | 89,535 | 1,154 |
CVE-2020-11499 | 2020-04-02T23:15:13.097 | Firmware Analysis and Comparison Tool (FACT) 3 has Stored XSS when updating analysis details via a localhost web request, as demonstrated by mishandling of the tags and version fields in helperFunctions/mongo_task_conversion.py. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fkie-cad/FACT_core/issues/375"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/f... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:firmware_analysis_and_comparison_tool_project:firmware_analysis_and_comparison_tool:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5F400E47-9DF3-4974-A0BA-1BEF7B90106C",
"versionEndExcluding": null,
... | [
"79"
] | 79 | https://github.com/fkie-cad/FACT_core/issues/375 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"fkie-cad",
"FACT_core"
] | The application does not sanitize the user input when updating the details of a firmware. When updating the firmware details, the applications posts the data to the "upload-analysis/[uid]" page. That page then runs the function "_get_meta_from_request()" within the /src/helperFunctions/mongo_task_conversion.py script. ... | Stored XSS when updating analysis details | https://api.github.com/repos/fkie-cad/FACT_core/issues/375/comments | 3 | 2020-03-29T18:07:13Z | 2020-03-31T11:56:40Z | https://github.com/fkie-cad/FACT_core/issues/375 | 589,848,961 | 375 | 1,155 |
CVE-2020-5283 | 2020-04-03T00:15:11.943 | ViewVC before versions 1.1.28 and 1.2.1 has a XSS vulnerability in CVS show_subdir_lastmod support. The impact of this vulnerability is mitigated by the need for an attacker to have commit privileges to a CVS repository exposed by an otherwise trusted ViewVC instance that also has the `show_subdir_lastmod` feature enab... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/viewvc/viewvc/commit/ad0f966e9a997b17d853a6972ea283d4dcd70fa8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracki... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:viewvc:viewvc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "317FCBFB-4761-4735-8367-4AE5D03AB998",
"versionEndExcluding": "1.1.28",
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/viewvc/viewvc/issues/211 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"viewvc",
"viewvc"
] | **Describe the bug**
When the `show_subdir_lastmod` option is enabled, ViewVC shows for directories in the directory view the log message of the most recently modified child thereof, along with the child file's name and revision number. Unfortunately, the child file's name is not properly HTML-escaped.
**Steps t... | XSS vulnerability: CVS lastlog filename not escaped | https://api.github.com/repos/viewvc/viewvc/issues/211/comments | 2 | 2020-03-26T18:08:02Z | 2020-03-31T09:35:52Z | https://github.com/viewvc/viewvc/issues/211 | 588,621,766 | 211 | 1,156 |
CVE-2020-10689 | 2020-04-03T15:15:14.420 | A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name and namespace of the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImp... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10689"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:che:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20B587B9-3F69-42CA-810C-CAFAB7CE29E3",
"versionEndExcluding": "7.9.0",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"862"
] | 862 | https://github.com/eclipse/che/issues/15651 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse",
"che"
] | ### Is your task related to a problem? Please describe.
Under some conditions, there is a possibility to reach the port of one workspace from another workspace. To improve the isolation of the major Eclipse Che components we would like to.
### Describe the solution you'd like
1. Use single pod for jwt proxy ... | Improve isolation of Che theia and che-machine-exec components | https://api.github.com/repos/eclipse-che/che/issues/15651/comments | 13 | 2020-01-10T11:56:26Z | 2020-03-06T16:05:15Z | https://github.com/eclipse-che/che/issues/15651 | 548,039,947 | 15,651 | 1,157 |
CVE-2020-11529 | 2020-04-04T19:15:11.537 | Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://getgrav.org/#changelog"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/getgrav/grav/commit/2eae104c7a4bf32... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A790171B-E361-45F8-AEC4-A4BDA5F5BD85",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.31",
"versionStartExcluding... | [
"601"
] | 601 | https://github.com/getgrav/grav/issues/3134 | [
"Third Party Advisory"
] | github.com | [
"getgrav",
"grav"
] | ## Environment
grav version: v1.6.31 - Admin v1.9.19
php: 7.4 and 7.2 tested
## Problem
If grav is on root folder on a domain it seems there is a open redirect.
## Fist analysis
Origin of the problem seems to be the redirect by setting `Redirect trailing slash` on.
## Examples
Open redirect if on roo... | [Security] Open redirect with trailing slash redirect | https://api.github.com/repos/getgrav/grav/issues/3134/comments | 6 | 2021-01-06T15:12:06Z | 2021-03-31T17:49:45Z | https://github.com/getgrav/grav/issues/3134 | 780,624,397 | 3,134 | 1,158 |
CVE-2020-11558 | 2020-04-05T20:15:12.650 | An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_movie_boxes. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"416"
] | 416 | https://github.com/gpac/gpac/issues/1440 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | 3 UAF bugs in box_funcs.c | https://api.github.com/repos/gpac/gpac/issues/1440/comments | 4 | 2020-03-24T17:16:05Z | 2020-03-26T19:28:46Z | https://github.com/gpac/gpac/issues/1440 | 587,134,103 | 1,440 | 1,159 |
CVE-2020-10266 | 2020-04-06T12:15:12.957 | UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these components in the robots (e.g. in the UR10), no integrity checks are performed. Moreover, the SDK for making such components can be easily obtained from Universal Robots. An attack... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/1487"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:universal-robots:ur\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91FE81D2-B3F6-4323-A765-CE44D324DBD9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExc... | [
"345"
] | 345 | https://github.com/aliasrobotics/RVD/issues/1487 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
{
"id": 1487,
"title": "RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot",
"type": "vulnerability",
"description": "UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these ... | RVD#1487: No integrity checks on UR+ platform artifacts when installed in the robot | https://api.github.com/repos/aliasrobotics/RVD/issues/1487/comments | 1 | 2020-04-03T14:22:23Z | 2020-09-30T11:00:13Z | https://github.com/aliasrobotics/RVD/issues/1487 | 593,418,549 | 1,487 | 1,160 |
CVE-2020-10267 | 2020-04-06T12:15:13.033 | Universal Robots control box CB 3.1 across firmware versions (tested on 1.12.1, 1.12, 1.11 and 1.10) does not encrypt or protect in any way the intellectual property artifacts installed from the UR+ platform of hardware and software components (URCaps). These files (*.urcaps) are stored under '/root/.urcaps' as plain z... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/1489"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:universal-robots:ur_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "914DFBBC-7743-4B1B-9875-8D6B6F907B99",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.18213",
"ve... | [
"312"
] | 312 | https://github.com/aliasrobotics/RVD/issues/1489 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
{
"id": 1489,
"title": "RVD#1489: Unprotected intelectual property in Universal Robots controller CB 3.1 across firmware versions",
"type": "vulnerability",
"description": "Universal Robots control box CB 3.1 across firmware versions (tested on 3.13.0, 3.12.1, 3.12, 3.11 and 3.10.0) does no... | RVD#1489: Unprotected intelectual property in Universal Robots controller CB 3.1 across firmware versions | https://api.github.com/repos/aliasrobotics/RVD/issues/1489/comments | 2 | 2020-04-03T14:28:43Z | 2020-04-29T17:37:33Z | https://github.com/aliasrobotics/RVD/issues/1489 | 593,422,790 | 1,489 | 1,161 |
CVE-2013-7488 | 2020-04-07T18:15:13.117 | perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gbarr/perl-Convert-ASN1/issues/14"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:convert\\:\\:asn1_project:convert\\:\\:asn1:*:*:*:*:*:perl:*:*",
"matchCriteriaId": "AC1E9726-31EE-417B-A4EE-375DEE099B59",
"versionEndExcluding": null,
"versionEndIncluding": "0.27",
... | [
"835"
] | 835 | https://github.com/gbarr/perl-Convert-ASN1/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gbarr",
"perl-Convert-ASN1"
] | The following test of decoding unsafe input will make an infinite loop spewing warnings in 0.26:
``` perl
use Convert::ASN1;
my $asn = Convert::ASN1->new;
$asn->prepare(q<
[APPLICATION 7] SEQUENCE {
int INTEGER
}
>);
my $out;
$out = $asn->decode( pack("H*", "dfccd3fde3") );
$out = $asn->decode( pack("H*", "b08... | Unsafe decoding creates infinite loop | https://api.github.com/repos/gbarr/perl-Convert-ASN1/issues/14/comments | 5 | 2013-10-08T23:35:28Z | 2021-05-23T20:08:56Z | https://github.com/gbarr/perl-Convert-ASN1/issues/14 | 20,714,227 | 14 | 1,162 |
CVE-2015-9544 | 2020-04-07T18:15:13.180 | An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/ofirdagan/cross-domain-local-storage"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ofirdagan/c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cross_domain_local_storage_project:cross_domain_local_storage:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1428644-A24A-485D-A274-640F02C82E25",
"versionEndExcluding": null,
"versionEndIncludi... | [
"20"
] | 20 | https://github.com/ofirdagan/cross-domain-local-storage/issues/17 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"ofirdagan",
"cross-domain-local-storage"
] | There doesn't appear to be a programmatic way to define a whitelist of origins that the iframe will accept requests from. This is something that's recommended by the `postMessage` (API documentation)[https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage]. It suggests that the receiver of function should "... | Restricting domain by origins | https://api.github.com/repos/ofirdagan/cross-domain-local-storage/issues/17/comments | 0 | 2015-08-13T00:40:18Z | 2015-08-13T02:05:17Z | https://github.com/ofirdagan/cross-domain-local-storage/issues/17 | 100,665,577 | 17 | 1,163 |
CVE-2020-11612 | 2020-04-07T18:15:13.697 | The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/netty... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D244264-A923-47AA-AAED-35C184E7E984",
"versionEndExcluding": "4.1.46",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"770"
] | 770 | https://github.com/netty/netty/issues/6168 | [
"Third Party Advisory"
] | github.com | [
"netty",
"netty"
] | ### Expected behavior
To protect against OOME the compression and decompression codecs should explicitly limit the amount of data they compress and decompress. We may be vulnerable to OOME from large or malicious input.
### Actual behavior
In light of https://github.com/netty/netty/pull/5997 most of the compressio... | Compression/Decompression Codecs should enforce memory allocation size limits | https://api.github.com/repos/netty/netty/issues/6168/comments | 2 | 2016-12-30T18:14:58Z | 2020-01-31T14:05:04Z | https://github.com/netty/netty/issues/6168 | 198,178,345 | 6,168 | 1,164 |
CVE-2020-11619 | 2020-04-07T23:15:12.077 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.springframework.aop.config.MethodLocatingFactoryBean (aka spring-aop). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2680"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96",
"versionEndExcluding": "2.9.10.4",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2680 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `org.springframework:spring-aop`. library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Type: SSRF
Mitre id: CVE-2020-11619
Reporter: Bui Duong from Viettel... | Block one more gadget type (SSRF, spring-jpa, CVE-2020-11619) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2680/comments | 0 | 2020-04-07T01:41:49Z | 2020-12-02T03:59:03Z | https://github.com/FasterXML/jackson-databind/issues/2680 | 595,531,291 | 2,680 | 1,165 |
CVE-2020-11620 | 2020-04-07T23:15:12.140 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2682"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "77F8EDB1-5890-4054-84FF-2034C7D2ED96",
"versionEndExcluding": "2.9.10.4",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2682 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `commons-jelly:commons-jelly`. library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-11620
Reporter(s):
* r00t4dm from A-TEAM of Legend... | Block one more gadget type (commons-jelly, CVE-2020-11620) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2682/comments | 0 | 2020-04-07T15:54:48Z | 2020-04-11T19:23:25Z | https://github.com/FasterXML/jackson-databind/issues/2682 | 595,974,605 | 2,682 | 1,166 |
CVE-2018-21034 | 2020-04-09T17:15:12.703 | In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to retrieve secrets and other manifests which were stored within git. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/argoproj/argo-cd/blob/a1afe44066fcd0a0ab90a02a23177164bbad42cf/util/diff/diff.go#L399"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5129B5E3-ABD7-4E99-BCF1-6EA5290F7108",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.2",
"versionStartExclud... | [
"200"
] | 200 | https://github.com/argoproj/argo-cd/issues/470 | [
"Third Party Advisory"
] | github.com | [
"argoproj",
"argo-cd"
] | We currently treat secrets the same as any other k8s object, displaying the YAML/JSON contents in the UI. But secret values need to be redacted or a separate RBAC rule to view them. | K8s secrets need to be redacted in API server | https://api.github.com/repos/argoproj/argo-cd/issues/470/comments | 0 | 2018-07-26T23:15:26Z | 2018-09-07T20:51:32Z | https://github.com/argoproj/argo-cd/issues/470 | 345,036,909 | 470 | 1,167 |
CVE-2020-11709 | 2020-04-12T14:15:10.750 | cpp-httplib through 0.5.8 does not filter \r\n in parameters passed into the set_redirect and set_header functions, which creates possibilities for CRLF injection and HTTP response splitting in some specific contexts. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/shouc/a9330df817128bc4c4132abf3de09495"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yh... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cpp-httplib_project:cpp-httplib:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20734923-D6DF-460F-B2BE-20879008EABB",
"versionEndExcluding": null,
"versionEndIncluding": "0.5.8",
"ver... | [
"74"
] | 74 | https://github.com/yhirose/cpp-httplib/issues/425 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yhirose",
"cpp-httplib"
] | ref: https://owasp.org/www-community/attacks/HTTP_Response_Splitting
### Analysis
```cpp
// L2766
inline void Response::set_header(const char *key, const char *val) {
headers.emplace(key, val);
}
inline void Response::set_header(const char *key, const std::string &val) {
headers.emplace(key, val);
}
i... | set_redirect & set_header are susceptible to http response splitting attack | https://api.github.com/repos/yhirose/cpp-httplib/issues/425/comments | 4 | 2020-04-11T03:38:58Z | 2020-04-14T12:30:06Z | https://github.com/yhirose/cpp-httplib/issues/425 | 598,181,627 | 425 | 1,168 |
CVE-2020-11721 | 2020-04-12T19:15:10.367 | load_png in loader.c in libsixel.a in libsixel 1.8.6 has an uninitialized pointer leading to an invalid call to free, which can cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/saitoha/libsixel/issues/134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"824"
] | 824 | https://github.com/saitoha/libsixel/issues/134 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"saitoha",
"libsixel"
] | `load_png` has a pointer `rows`, which should be set to NULL, otherwise `cleanup` code would use(calling `free`) it.
binary: img2sixel
file: loader.c
function: load_png
poc:
[poc.zip](https://github.com/saitoha/libsixel/files/4464131/poc.zip)
result:
```
#0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/... | Invalid free wild pointer lead to DOS in load_png in loader.c | https://api.github.com/repos/saitoha/libsixel/issues/134/comments | 12 | 2020-04-11T06:09:36Z | 2021-06-10T06:23:25Z | https://github.com/saitoha/libsixel/issues/134 | 598,200,091 | 134 | 1,169 |
CVE-2020-11005 | 2020-04-14T23:15:12.090 | The WindowsHello open source library (NuGet HaemmerElectronics.SeppPenner.WindowsHello), before version 1.0.4, has a vulnerability where encrypted data could potentially be decrypted without needing authentication. If the library is used to encrypt text and write the output to a txt file, another executable could be ab... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/SeppPenner/WindowsHello/issues/3"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:windowshello_project:windowshello:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E53E9C-C0EB-4730-A9AC-0837B12339DC",
"versionEndExcluding": "1.0.4",
"versionEndIncluding": null,
"v... | [
"327"
] | 327 | https://github.com/SeppPenner/WindowsHello/issues/3 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"SeppPenner",
"WindowsHello"
] | If I use this library to encrypt text and write the output to a txt file, could another executable be able to decrypt the text using the static method `NCryptDecrypt` from this same library, without the need to use Windows Hello Authentication?
Maybe for somebody the answer to this question is clear from the code, but... | [Question] Security of the Encrypted data | https://api.github.com/repos/SeppPenner/WindowsHello/issues/3/comments | 25 | 2019-08-22T02:16:23Z | 2023-04-07T14:00:08Z | https://github.com/SeppPenner/WindowsHello/issues/3 | 483,733,192 | 3 | 1,170 |
CVE-2020-10699 | 2020-04-15T14:15:19.873 | A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",... | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10699"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:targetcli-fb_project:targetcli-fb:2.1.50:*:*:*:*:*:*:*",
"matchCriteriaId": "8E46FFC1-C330-4010-9473-827CE2AEC843",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"732"
] | 732 | https://github.com/open-iscsi/targetcli-fb/issues/162 | [
"Third Party Advisory"
] | github.com | [
"open-iscsi",
"targetcli-fb"
] | The systemd socket unit fails to specify any `SocketMode` so the socket is world writable (0666) - as such any user can connect to it and send commands to targetclid without authentication. This is a likely a security vulnerability. https://github.com/open-iscsi/targetcli-fb/blob/23877ab4afbf0c2fe4092936261d92d7b7fbff1... | /var/run/targetclid.sock is world writable | https://api.github.com/repos/open-iscsi/targetcli-fb/issues/162/comments | 13 | 2020-03-23T05:08:02Z | 2020-04-01T14:58:51Z | https://github.com/open-iscsi/targetcli-fb/issues/162 | 585,933,826 | 162 | 1,171 |
CVE-2020-11872 | 2020-04-17T05:15:13.113 | The Cloud Functions subsystem in OpenTrace 1.0 might allow fabrication attacks by making billions of TempID requests before an AES-256-GCM key rotation occurs. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/opentrace-community/opentrace-cloud-functions/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Ad... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bluetrace:opentrace:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20BDD68E-1331-4BDE-B7F8-6AA97AA9CB6F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"327"
] | 327 | https://github.com/opentrace-community/opentrace-cloud-functions/issues/7 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"opentrace-community",
"opentrace-cloud-functions"
] | The current implementation does not follow NIST Special Publication 800-38D, in particular Section 8.2 IV Constructions and 8.3 Constraints on the Number of Invocations regarding the secret key.
To mitigate 8.2: IVs can be converted to deterministic construction per 8.2.1.
To mitigate 8.3: Temporary IDs should use ... | Incorrect IV Initialisation for AES-256-GCM and Constraints on the Number of Invocations | https://api.github.com/repos/opentrace-community/opentrace-cloud-functions/issues/7/comments | 7 | 2020-04-13T09:37:43Z | 2020-05-04T11:55:03Z | https://github.com/opentrace-community/opentrace-cloud-functions/issues/7 | 598,786,965 | 7 | 1,172 |
CVE-2020-11887 | 2020-04-17T21:15:13.273 | svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/domenic/svg2png/issues/117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:svg2png_project:svg2png:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09BB1AEE-7811-4B83-835C-4434D82E072E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"79"
] | 79 | https://github.com/domenic/svg2png/issues/117 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"domenic",
"svg2png"
] | this package uses phantomjs to render a xml snippet to image,thus the xml can be any html ,script.
As the render process runs at backend,so there are ssrf and server side xss risks.
| SSRF and Server Side XSS | https://api.github.com/repos/domenic/svg2png/issues/117/comments | 4 | 2020-04-17T02:35:29Z | 2025-06-01T04:02:34Z | https://github.com/domenic/svg2png/issues/117 | 601,659,481 | 117 | 1,173 |
CVE-2020-11894 | 2020-04-19T19:15:12.477 | Ming (aka libming) 0.4.8 has a heap-based buffer over-read (8 bytes) in the function decompileIF() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"125"
] | 125 | https://github.com/libming/libming/issues/196 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ./swftocxx $poc
[segmentaion_fault_decompile_569-out_of_bound-idx:0x1199-0xb.zip](https://github.com/libming/libming/files/4490660/segmentaion_fault_decompile_569-out_of_bound-idx.0x1199-0xb.zip)
```
root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56... | heap overflow in decompileIF decompile.c:2473 | https://api.github.com/repos/libming/libming/issues/196/comments | 0 | 2020-04-17T02:47:07Z | 2020-04-17T02:47:07Z | https://github.com/libming/libming/issues/196 | 601,663,070 | 196 | 1,174 |
CVE-2020-11895 | 2020-04-19T19:15:12.977 | Ming (aka libming) 0.4.8 has a heap-based buffer over-read (2 bytes) in the function decompileIF() in decompile.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/libming/libming/issues/197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"125"
] | 125 | https://github.com/libming/libming/issues/197 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libming",
"libming"
] | ./swftocxx $poc
[segmentaion_fault_decompile_569-out_of_bound-idx:0x1186-0x10.zip](https://github.com/libming/libming/files/4490668/segmentaion_fault_decompile_569-out_of_bound-idx.0x1186-0x10.zip)
```
root@ubuntu:/home/tim/libming/util# ../../libming-asan/util/swftocxx overflows/segmentaion_fault_decompile_56... | heap overflow in decompileIF decompile.c:2436 | https://api.github.com/repos/libming/libming/issues/197/comments | 0 | 2020-04-17T02:50:13Z | 2020-04-17T02:50:13Z | https://github.com/libming/libming/issues/197 | 601,663,990 | 197 | 1,175 |
CVE-2020-11888 | 2020-04-20T16:15:14.430 | python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00031.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00035.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python-markdown2_project:python-markdown2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0A5CE53-40D5-44F4-BC05-58C38233D0A7",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.8",
... | [
"79"
] | 79 | https://github.com/trentm/python-markdown2/issues/348 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"trentm",
"python-markdown2"
] | On the latest release (2.3.8) a payload like this one can lead to xss and bypass safe_mode when set to true.
`<lol@/ //id="pwn"//onclick="alert(1)"//**abc**`
The Problem:
I think its due to just bad regex's not detecting non alphanumeric tags.
 | Another Filter bypass leading to XSS | https://api.github.com/repos/trentm/python-markdown2/issues/348/comments | 12 | 2020-04-13T00:38:25Z | 2020-05-12T00:09:25Z | https://github.com/trentm/python-markdown2/issues/348 | 598,605,834 | 348 | 1,176 |
CVE-2020-11944 | 2020-04-20T22:15:13.650 | Abe (aka bitcoin-abe) through 0.7.2, and 0.8pre, allows XSS in __call__ in abe.py because the PATH_INFO environment variable is mishandled during a PageNotFound exception. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://geeknik-labs.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bitcoin-abe/bitcoin-abe/blob/d33f6e85de74e708e11cabe4ed0246... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitcoin-abe_project:bitcoin-abe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3795E81-B15D-454D-B76A-D58443FDC6E4",
"versionEndExcluding": null,
"versionEndIncluding": "0.7.2",
"ver... | [
"79"
] | 79 | https://github.com/bitcoin-abe/bitcoin-abe/issues/292 | [
"Broken Link"
] | github.com | [
"bitcoin-abe",
"bitcoin-abe"
] | A lack of filtering around line 253 of abe.py
```
except PageNotFound:
page['status'] = '404 Not Found'
page['body'] = ['<p class="error">Sorry, ', env['SCRIPT_NAME'],
env['PATH_INFO'],
' does not exist on this server.</p>']
... | Page Not Found Handler Cross-site Scripting -- CVE-2020-11944 | https://api.github.com/repos/bitcoin-abe/bitcoin-abe/issues/292/comments | 6 | 2020-04-20T21:24:43Z | 2021-02-13T02:44:03Z | https://github.com/bitcoin-abe/bitcoin-abe/issues/292 | 603,545,408 | 292 | 1,177 |
CVE-2020-5268 | 2020-04-21T17:15:13.053 | In Saml2 Authentication Services for ASP.NET versions before 1.0.2, and between 2.0.0 and 2.6.0, there is a vulnerability in how tokens are validated in some cases. Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Sam... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "PARTI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sustainsys:saml2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E920AE48-2FCB-479F-AA28-CD7AA3B548AD",
"versionEndExcluding": "1.0.2",
"versionEndIncluding": null,
"versionStartExclud... | [
"287"
] | 287 | https://github.com/Sustainsys/Saml2/issues/712 | [
"Third Party Advisory"
] | github.com | [
"Sustainsys",
"Saml2"
] | The issuer in the saml response is used to retreive signin keys and it is thus properly validated that the issuer of the response has access to the signing keys. The issuer in the assertion should also be validated, otherwise a malicious idp could craft a response where the assertion issuer identifies another Idp. It i... | Issuer Validation | https://api.github.com/repos/Sustainsys/Saml2/issues/712/comments | 0 | 2017-05-09T17:08:02Z | 2023-09-19T10:34:33Z | https://github.com/Sustainsys/Saml2/issues/712 | 227,434,908 | 712 | 1,178 |
CVE-2020-7350 | 2020-04-22T22:15:12.450 | Rapid7 Metasploit Framework versions before 5.0.85 suffers from an instance of CWE-78: OS Command Injection, wherein the libnotify plugin accepts untrusted user-supplied data via a remote computer's hostname or service name. An attacker can create a specially-crafted hostname or service name to be imported by Metasploi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@rapid7.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/rapid7/metasploit-framework/issues/13026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE42CAE4-4C47-40EC-AC83-D6EE17824B2B",
"versionEndExcluding": "5.0.85",
"versionEndIncluding": null,
"versionStartExcl... | [
"78"
] | 78 | https://github.com/rapid7/metasploit-framework/issues/13026 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"rapid7",
"metasploit-framework"
] | the plugin libnotify has a command injection vulnerability which could be triggered when the client imports info as hostnames or services specially crafted from another tool
The impact is low because is not possible to tamper the hostname when the client runs a scan with nmap for example
in the libnotify's callba... | possible vulnerability in libnotify | https://api.github.com/repos/rapid7/metasploit-framework/issues/13026/comments | 4 | 2020-03-04T17:31:41Z | 2020-04-16T21:30:12Z | https://github.com/rapid7/metasploit-framework/issues/13026 | 575,604,106 | 13,026 | 1,179 |
CVE-2020-12071 | 2020-04-23T02:15:11.407 | Anchor 0.12.7 allows admins to cause XSS via crafted post content. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/anchorcms/anchor-cms/issues/1333"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anchorcms:anchor:0.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C7BA55-A980-4713-AC70-5F93DF98D058",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/anchorcms/anchor-cms/issues/1333 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"anchorcms",
"anchor-cms"
] | ### Summary
A user is able to inject JavaScript into a post via the post creation feature.
### Expected Behaviour
The CMS should HTML encode any inputted data so it is reflected back safely to the user.
### Actual Behaviour
The CMS reflects back the post content without HTML encoding, meaning the client ... | Stored Cross Site Scripting vulnerability exists in post content. | https://api.github.com/repos/anchorcms/anchor-cms/issues/1333/comments | 4 | 2020-04-22T19:08:17Z | 2020-04-29T23:07:47Z | https://github.com/anchorcms/anchor-cms/issues/1333 | 604,994,344 | 1,333 | 1,180 |
CVE-2020-12079 | 2020-04-23T04:15:13.343 | Beaker before 0.8.9 allows a sandbox escape, enabling system access and code execution. This occurs because Electron context isolation is not used, and therefore an attacker can conduct a prototype-pollution attack against the Electron internal messaging API. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/beakerbrowser/beaker/issues/1519"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/beakerbrowser/beaker/rel... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:beakerbrowser:beaker:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA02EFF-ABB3-48D6-BA70-6EE025805C22",
"versionEndExcluding": "0.8.9",
"versionEndIncluding": null,
"versionStartEx... | [
"1321"
] | 1321 | https://github.com/beakerbrowser/beaker/issues/1519 | [
"Third Party Advisory"
] | github.com | [
"beakerbrowser",
"beaker"
] | hello, I've find a critical vulnerability inside beaker browser, and have sent you details of this vulnerability by sending email to @pfrazee . Please check it and feel free to contact me. | Critical security issue [solved in 0.8.9] [CVE-2020-12079] | https://api.github.com/repos/beakerbrowser/beaker/issues/1519/comments | 9 | 2020-03-10T08:47:37Z | 2020-04-28T21:27:31Z | https://github.com/beakerbrowser/beaker/issues/1519 | 578,422,250 | 1,519 | 1,181 |
CVE-2020-11004 | 2020-04-24T21:15:13.747 | SQL Injection was discovered in Admidio before version 3.3.13. The main cookie parameter is concatenated into a SQL query without any input validation/sanitization, thus an attacker without logging in, can send a GET request with arbitrary SQL queries appended to the cookie parameter and execute SQL queries. The vulner... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/Admidio/admidio/commit/ea5d6f114b151ed11ec0ad7cb47bd729e77a874a"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE46F157-622B-4017-8FC7-EB25A24FC4FA",
"versionEndExcluding": "3.3.13",
"versionEndIncluding": null,
"versionStartExclud... | [
"89"
] | 89 | https://github.com/Admidio/admidio/issues/908 | [
"Third Party Advisory"
] | github.com | [
"Admidio",
"admidio"
] | Hi,
I want to report a critical vulnerability in Admidio management system. Can you please start a security advisory in the security section and add me to it, so we can discuss the vulnerability privately? | Unauthenticated Blind SQL injection | https://api.github.com/repos/Admidio/admidio/issues/908/comments | 2 | 2020-04-06T12:29:36Z | 2020-04-12T19:29:26Z | https://github.com/Admidio/admidio/issues/908 | 595,075,321 | 908 | 1,182 |
CVE-2019-20789 | 2020-04-26T17:15:11.040 | Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/croogo/croogo/compare/3.0.6...3.0.7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/croogo/croogo/issues/940"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:croogo:croogo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57EC3AAD-0962-42F7-8565-CFF6F09BEF94",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.6",
"versionStartExcluding... | [
"79"
] | 79 | https://github.com/croogo/croogo/issues/940 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"croogo",
"croogo"
] | URL:http://10.211.55.7/croogo-3.0.5/admin/menus/menus
Payload:<img src=0 onerror=alert(/XSS/)>
parameter:title

 such that files from a malicious ... | Stored XSS in Raw File View | https://api.github.com/repos/hashicorp/nomad/issues/7468/comments | 1 | 2020-03-24T15:29:53Z | 2022-11-11T02:33:27Z | https://github.com/hashicorp/nomad/issues/7468 | 587,046,912 | 7,468 | 1,185 |
CVE-2020-12102 | 2020-04-28T21:15:11.773 | In Tiny File Manager 2.4.1, there is a Path Traversal vulnerability in the ajax recursive directory listing functionality. This allows authenticated users to enumerate directories and files on the filesystem (outside of the application scope). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://cyberaz0r.info/2020/04/tiny-file-manager-multiple-vulnerabilities/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/prasathmani/tinyfilemanager/commit/a0c595a8e11e55a43eeaa68e1a3ce76365f29d06"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tiny_file_manager_project:tiny_file_manager:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9D862BC9-ED4E-4324-9D7A-85722134DBF3",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"22"
] | 22 | https://github.com/prasathmani/tinyfilemanager/issues/357 | null | github.com | [
"prasathmani",
"tinyfilemanager"
] | hi,
are you aware of this?
https://www.quantumleap.it/tiny-file-manager-path-traversal-recursive-directory-listing-and-absolute-path-file-backup-copy/
see also other mentions:
https://www.google.com/search?newwindow=1&sxsrf=ALeKk0025t2B-Upsat5D1t8HcK2-iLWyTw%3A1582747077534&ei=xc1WXs2dIMSYkwWvyqGICQ&q=tiny%20... | security breaches in tiny file manager | https://api.github.com/repos/prasathmani/tinyfilemanager/issues/357/comments | 3 | 2020-05-11T04:33:34Z | 2020-05-19T19:00:49Z | https://github.com/prasathmani/tinyfilemanager/issues/357 | 615,579,802 | 357 | 1,186 |
CVE-2018-21232 | 2020-04-29T14:15:14.417 | re2c before 2.0 has uncontrolled recursion that causes stack consumption in find_fixed_tags. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://www.openwall.com/lists/oss-security/2020/05/14/4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/skvadrik/re2c/issues/219"
},
{
"sou... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:re2c:re2c:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF95DF80-2205-4CA8-A01F-C05F3626EFBA",
"versionEndExcluding": "2.0",
"versionEndIncluding": null,
"versionStartExcluding": nul... | [
"674"
] | 674 | https://github.com/skvadrik/re2c/issues/219 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"skvadrik",
"re2c"
] | Factoring out the issue of https://github.com/skvadrik/re2c/issues/215#issuecomment-418584435
On small stack systems (`ulimit -s 256`) `overflow-1.re` test fails:
```
$ ./autogen.sh
$ ulimit -s 256
$ make
$ LANG=C make check VERBOSE=1
...
./run_tests.sh: line 111: 17604 Segmentation fault (core dumped)... | overflow-1.re test fails on system with small stack | https://api.github.com/repos/skvadrik/re2c/issues/219/comments | 5 | 2018-09-05T07:12:10Z | 2022-07-25T07:36:53Z | https://github.com/skvadrik/re2c/issues/219 | 357,094,228 | 219 | 1,187 |
CVE-2020-12458 | 2020-04-29T16:15:11.760 | An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2020-12458"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"matchCriteriaId": "448ED4A6-404E-408B-8EF7-CFA3AB154CB4",
"versionEndExcluding": null,
"versionEndIncluding": "6.7.3",
"versionStartExcludi... | [
"732"
] | 732 | https://github.com/grafana/grafana/issues/8283 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"grafana",
"grafana"
] | It looks like in https://github.com/grafana/grafana/issues/2126 there were plans to lock down the sqlite DB to 0600. While grafana.ini did get locked down, the DB did not. Unless this is no longer believed to be necessary I could try to send a PR.
- What Grafana version are you using? 4.2.0
- What datasource are yo... | [Bug] Wrong permissions in grafana package for grafana.db | https://api.github.com/repos/grafana/grafana/issues/8283/comments | 8 | 2017-05-03T16:54:15Z | 2020-08-20T12:59:04Z | https://github.com/grafana/grafana/issues/8283 | 226,050,010 | 8,283 | 1,188 |
CVE-2020-12477 | 2020-04-29T22:15:12.577 | The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nilsteampassnet/TeamPass/issues/2761"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*",
"matchCriteriaId": "B0281707-7711-476C-86A7-2EFD6C8DD8DB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"863"
] | 863 | https://github.com/nilsteampassnet/TeamPass/issues/2761 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nilsteampassnet",
"TeamPass"
] | Teampass includes a feature to restrict the source IP address users can use to interact with Teampass. The value of the source IP address is [defined](https://github.com/nilsteampassnet/TeamPass/blob/b9cf22a78b6bb63346d7e593bc984d56316ed772/api/functions.php#L33) from the first value in the X-Forwarded-For header in th... | IP whitelist bypass | https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2761/comments | 1 | 2020-04-02T16:10:04Z | 2022-10-31T04:40:01Z | https://github.com/nilsteampassnet/TeamPass/issues/2761 | 592,750,440 | 2,761 | 1,189 |
CVE-2020-12478 | 2020-04-29T22:15:12.717 | TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nilsteampassnet/TeamPass/issues/2764"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*",
"matchCriteriaId": "B0281707-7711-476C-86A7-2EFD6C8DD8DB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"306"
] | 306 | https://github.com/nilsteampassnet/TeamPass/issues/2764 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nilsteampassnet",
"TeamPass"
] | Many of the files included in Teampass are available without authentication to anyone who can interact with the web server. While this may not be an issue for some of the images or Javascript files, it is an issue for the user-uploaded files that are available without authentication.
These include:
- upload dir -... | Some Teampass files are available without authentication | https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2764/comments | 2 | 2020-04-02T16:18:48Z | 2022-10-31T04:40:03Z | https://github.com/nilsteampassnet/TeamPass/issues/2764 | 592,756,360 | 2,764 | 1,190 |
CVE-2020-12479 | 2020-04-29T22:15:12.827 | TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nilsteampassnet/TeamPass/issues/2762"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teampass:teampass:2.1.27.36:*:*:*:*:*:*:*",
"matchCriteriaId": "B0281707-7711-476C-86A7-2EFD6C8DD8DB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"22"
] | 22 | https://github.com/nilsteampassnet/TeamPass/issues/2762 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nilsteampassnet",
"TeamPass"
] | Teampass allows users to choose from several different languages. The user changes their language preference by sending a POST request to Teampass (`/teampass/sources/users.queries.php`) that contains the string of the language they choose (“english”, “spanish”, etc). This string provided by the user is not validated o... | PHP arbitrary file include | https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2762/comments | 3 | 2020-04-02T16:12:17Z | 2022-10-31T04:40:02Z | https://github.com/nilsteampassnet/TeamPass/issues/2762 | 592,751,961 | 2,762 | 1,191 |
CVE-2020-10683 | 2020-05-01T19:15:12.927 | dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00061.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dom4j_project:dom4j:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7F74F1-B9EA-4659-9755-B23F7D747685",
"versionEndExcluding": "2.0.3",
"versionEndIncluding": null,
"versionStartExc... | [
"611"
] | 611 | https://github.com/dom4j/dom4j/issues/87 | [
"Third Party Advisory"
] | github.com | [
"dom4j",
"dom4j"
] | The constructor `new org.dom4j.io.SAXReader()` calls one of the factory method form Java runtime library – `org.xml.sax.helpers.XMLReaderFactory.createXMLReader()` or `javax.xml.parsers.SAXParserFactory.newInstance().newSAXParser()`. These factory methods do not have safe defaults, such as downloading external entities... | SAXReader uses system XMLReaderFactory.createXMLReader() or SAXParserFactory.newInstance().newSAXParser() which has unsecure defaults | https://api.github.com/repos/dom4j/dom4j/issues/87/comments | 4 | 2020-04-22T11:10:29Z | 2020-07-30T14:44:22Z | https://github.com/dom4j/dom4j/issues/87 | 604,669,593 | 87 | 1,192 |
CVE-2020-11671 | 2020-05-04T14:15:13.230 | Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nilsteampassnet/TeamPass/issues/2765"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*",
"matchCriteriaId": "819F6BD1-3958-4C85-B0B3-102A359A7634",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.27.36",
"versionStartE... | [
"862"
] | 862 | https://github.com/nilsteampassnet/TeamPass/issues/2765 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nilsteampassnet",
"TeamPass"
] | TeamPass provides several APIs that can be used for programmatic access. None of these API functions perform authorization checks which means that any client with a valid API token is effectively an administrator. Any client with a valid API token can:
- Read all passwords stored by Teampass
- Create users. This in... | TeamPass API has no authorization checks | https://api.github.com/repos/nilsteampassnet/TeamPass/issues/2765/comments | 3 | 2020-04-02T16:23:40Z | 2022-10-31T04:40:03Z | https://github.com/nilsteampassnet/TeamPass/issues/2765 | 592,759,568 | 2,765 | 1,193 |
CVE-2020-12439 | 2020-05-05T22:15:12.933 | Grin before 3.1.0 allows attackers to adversely affect availability of data on a Mimblewimble blockchain. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/mimblewimble/grin-security/blob/master/CVEs/CVE-2020-12439.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:grin:grin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F860E4C9-2EC4-4788-AD20-DC62ECF332EB",
"versionEndExcluding": "3.1.0",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"404"
] | 404 | https://github.com/mimblewimble/grin/issues/3235 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"mimblewimble",
"grin"
] | Recent exploration into the implementation of an index of "recently seen" kernels led us down the path of maintaining an "undo" list per block. This way we can robustly handle duplicate kernels, maintaining the pos of the most recent instance of the kernel in the index, while being able to handle rewind scenarios invol... | Rework output_pos index (better txhashset transactional support) | https://api.github.com/repos/mimblewimble/grin/issues/3235/comments | 0 | 2020-02-20T15:50:04Z | 2020-02-24T09:48:52Z | https://github.com/mimblewimble/grin/issues/3235 | 568,395,225 | 3,235 | 1,194 |
CVE-2020-12666 | 2020-05-05T22:15:13.027 | macaron before 1.3.7 has an open redirect in the static handler, as demonstrated by the http://127.0.0.1:4000//example.com/ URL. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/go-macaron/macaron/issues/198"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/go-macaron... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:go-macaron:macaron:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC570984-01B0-467F-BF87-4DD6A7047F30",
"versionEndExcluding": "1.3.7",
"versionEndIncluding": null,
"versionStartExcl... | [
"601"
] | 601 | https://github.com/go-macaron/macaron/issues/198 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"go-macaron",
"macaron"
] | 看了这个issue,觉得蛮有意思,试了一下发现这个问题在另一种场景里可以发生
https://github.com/go-macaron/macaron/issues/125
需要开启静态文件服务
漏洞代码
```go
package main
import "gopkg.in/macaron.v1"
func main() {
m := macaron.Classic()
m.Get("/", func(ctx *macaron.Context) string {
return "Hello world!"
})
m.Use(macaron.Static("static"))
m.Run()... | vulnerability: open redirect in static handler | https://api.github.com/repos/go-macaron/macaron/issues/198/comments | 6 | 2020-04-30T13:58:41Z | 2020-05-03T14:03:24Z | https://github.com/go-macaron/macaron/issues/198 | 610,028,077 | 198 | 1,195 |
CVE-2020-11042 | 2020-05-07T19:15:11.673 | In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PA... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F953BF38-4A6C-41EE-B646-37702989F524",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/FreeRDP/FreeRDP/issues/6010 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"FreeRDP",
"FreeRDP"
] | version
```
https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/window.c#L187
```
vuln code
`update_read_icon_info` first read `iconInfo->cbColorTable`, `iconInfo->cbBitsMask` and `iconInfo->cbBitsColor` from the wStream,
```
static BOOL update_read_icon_info... | memory out of bounds read in update_read_icon_info | https://api.github.com/repos/FreeRDP/FreeRDP/issues/6010/comments | 2 | 2020-03-31T06:54:51Z | 2020-05-15T00:17:56Z | https://github.com/FreeRDP/FreeRDP/issues/6010 | 590,846,045 | 6,010 | 1,196 |
CVE-2020-11045 | 2020-05-07T19:15:11.783 | In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PA... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FreeRDP/FreeRDP/commit/f8890a645c221823ac133dbf991f8a65ae50d637"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A5B1A9A-B56C-440D-9DD5-F8A6A9A4B7FF",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/FreeRDP/FreeRDP/issues/6005 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"FreeRDP",
"FreeRDP"
] | vuln code
```
static BOOL update_read_bitmap_data(rdpUpdate* update, wStream* s, BITMAP_DATA* bitmapData)
{
WINPR_UNUSED(update);
if (Stream_GetRemainingLength(s) < 18)
return FALSE;
Stream_Read_UINT16(s, bitmapData->destLeft);
Stream_Read_UINT16(s, bitmapData->destTop);
Stream_Read_UINT16(s, bitmap... | memory out of bounds read in update_read_bitmap_data | https://api.github.com/repos/FreeRDP/FreeRDP/issues/6005/comments | 4 | 2020-03-31T01:42:42Z | 2020-05-08T06:25:52Z | https://github.com/FreeRDP/FreeRDP/issues/6005 | 590,719,810 | 6,005 | 1,198 |
CVE-2020-11046 | 2020-05-07T19:15:11.843 | In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE"... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FreeRDP/FreeRDP/commit/ed53cd148f43cbab905eaa0f5308c2bf3c48cc37"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB5FC56A-970D-4AE5-A27E-EFD567E17449",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/FreeRDP/FreeRDP/issues/6006 | [
"Third Party Advisory"
] | github.com | [
"FreeRDP",
"FreeRDP"
] | version
```
https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/update.c#L293
```
vuln code
```
static void update_read_synchronize(rdpUpdate* update, wStream* s)
{
WINPR_UNUSED(update);
Stream_Seek_UINT16(s); /* pad2Octets (2 bytes) */
... | stream out of bounds seek in update_read_synchronize could lead out of bounds read later | https://api.github.com/repos/FreeRDP/FreeRDP/issues/6006/comments | 1 | 2020-03-31T02:32:52Z | 2020-05-08T06:25:21Z | https://github.com/FreeRDP/FreeRDP/issues/6006 | 590,739,057 | 6,006 | 1,199 |
CVE-2020-11047 | 2020-05-07T20:15:12.127 | In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PA... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FreeRDP/FreeRDP/commit/f5e73cc7c9cd973b516a618da877c87b80950b65"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F953BF38-4A6C-41EE-B646-37702989F524",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/FreeRDP/FreeRDP/issues/6009 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"FreeRDP",
"FreeRDP"
] | version
```
https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/autodetect.c#L459
```
vuln code
autodetect_recv_bandwidth_measure_results read 8 bytes from stream without check stream's length
```
static BOOL autodetect_recv_bandwidth_measure_results(rdpRdp* rd... | memory out of bounds read in autodetect_recv_bandwidth_measure_results | https://api.github.com/repos/FreeRDP/FreeRDP/issues/6009/comments | 0 | 2020-03-31T06:00:40Z | 2020-04-06T11:53:33Z | https://github.com/FreeRDP/FreeRDP/issues/6009 | 590,820,131 | 6,009 | 1,200 |
CVE-2020-11048 | 2020-05-07T20:15:12.190 | In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds read. It only allows to abort a session. No data extraction is possible. This has been fixed in 2.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE"... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FreeRDP/FreeRDP/commit/9301bfe730c66180263248b74353daa99f5a969b"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C492C074-0329-4949-9533-ED0FE1E0B088",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/FreeRDP/FreeRDP/issues/6007 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"FreeRDP",
"FreeRDP"
] | version
```
https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/rdp.c#L1129
```
vuln code
`rdp_read_share_control_header` could read 2 byte from stream, if `*length == 0x8000` , it could call `rdp_read_flow_control_pdu`.
```
BOOL rdp_read_share_control_header(wStr... | memory out of bounds read in rdp_read_flow_control_pdu | https://api.github.com/repos/FreeRDP/FreeRDP/issues/6007/comments | 0 | 2020-03-31T05:40:01Z | 2020-04-06T11:53:32Z | https://github.com/FreeRDP/FreeRDP/issues/6007 | 590,811,411 | 6,007 | 1,201 |
CVE-2020-11049 | 2020-05-07T20:15:12.237 | In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE"... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FreeRDP/FreeRDP/commit/c367f65d42e0d2e1ca248998175180aa9c2eacd0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Part... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F953BF38-4A6C-41EE-B646-37702989F524",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/FreeRDP/FreeRDP/issues/6008 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"FreeRDP",
"FreeRDP"
] | version
```
https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/rdp.c#L1129
```
vuln code
if `Stream_GetRemainingLength(s) = 5` and `*length = 5`, it could one byte overflow read in `Stream_Read_UINT16(s, *channel_id);`
```
BOOL rdp_read_share_contro... | memory out of bounds read in rdp_read_share_control_header | https://api.github.com/repos/FreeRDP/FreeRDP/issues/6008/comments | 0 | 2020-03-31T05:49:34Z | 2020-04-06T12:17:12Z | https://github.com/FreeRDP/FreeRDP/issues/6008 | 590,815,387 | 6,008 | 1,202 |
CVE-2020-11052 | 2020-05-07T21:15:11.483 | In Sorcery before 0.15.0, there is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sorcery_project:sorcery:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "07C2C42F-F970-4D1A-95FB-9EE238C0A190",
"versionEndExcluding": "0.15.0",
"versionEndIncluding": null,
"version... | [
"307"
] | 307 | https://github.com/Sorcery/sorcery/issues/231 | [
"Third Party Advisory"
] | github.com | [
"Sorcery",
"sorcery"
] | Sorcery 0.14.0 is vulnerable to brute force attacks even if a login_lock_time_period is configured.
If an attacker continues their login attempts after the initial login_lock_time_period has passed, Sorcery no longer rejects those login attempts until eventually the attacker has guessed the right password.
This i... | brute force vulnerability | https://api.github.com/repos/Sorcery/sorcery/issues/231/comments | 4 | 2020-04-30T15:06:10Z | 2020-05-02T22:01:48Z | https://github.com/Sorcery/sorcery/issues/231 | 610,116,215 | 231 | 1,203 |
CVE-2020-11054 | 2020-05-07T21:15:11.590 | In qutebrowser versions less than 1.11.1, reloading a page with certificate errors shows a green URL. After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg). However, when the affected website was subsequently loaded again, the URL was mistakenly disp... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.kde.org/show_bug.cgi?id=420902"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qutebrowser:qutebrowser:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED914DB-F493-4DC0-96DF-ED7B32A0316E",
"versionEndExcluding": "1.11.1",
"versionEndIncluding": null,
"versionSta... | [
"684"
] | 684 | https://github.com/qutebrowser/qutebrowser/issues/5403 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"qutebrowser",
"qutebrowser"
] | While working on 46b4d26a9ca1aba24a00ccd004606c8e3a6b17d4 I noticed that only the first load of pages with certificate errors gets a correctly colored URL.
When loading a page with the default `content.ssl_strict = ask` setting, there's a prompt to confirm the certificate issue:
 | https://api.github.com/repos/qutebrowser/qutebrowser/issues/5403/comments | 9 | 2020-05-02T14:11:19Z | 2020-05-07T15:44:59Z | https://github.com/qutebrowser/qutebrowser/issues/5403 | 611,198,849 | 5,403 | 1,204 |
CVE-2020-12735 | 2020-05-08T05:15:11.717 | reset.php in DomainMOD 4.13.0 uses insufficient entropy for password reset requests, leading to account takeover. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/domainmod/domainmod/issues/122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:domainmod:domainmod:4.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3FE0220B-A5E7-4C9A-9DBD-31D840F2DDB5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"331"
] | 331 | https://github.com/domainmod/domainmod/issues/122 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"domainmod",
"domainmod"
] | **Summary**:
reset.php handles “resetting”/changing an existing user’s password. The reset functionality uses PHP’s time() to derive the new password for the user that is attempting to change their password. This method of using time() to create a temporary password is very deterministic and allows an attacker to i... | Authentication Bypass via reset.php | https://api.github.com/repos/domainmod/domainmod/issues/122/comments | 1 | 2020-05-02T05:10:09Z | 2020-05-03T05:23:17Z | https://github.com/domainmod/domainmod/issues/122 | 611,109,561 | 122 | 1,205 |
CVE-2020-12740 | 2020-05-08T18:15:10.457 | tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/appneta/tcpreplay/issues/576"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announc... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:broadcom:tcpreplay:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB196463-1184-4D1D-936B-8B9105BDDFD7",
"versionEndExcluding": null,
"versionEndIncluding": "4.3.2",
"versionStartExcl... | [
"125"
] | 125 | https://github.com/appneta/tcpreplay/issues/576 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"appneta",
"tcpreplay"
] | **Describe the bug**
A heap-based buffer overflow was discovered in tcprewrite binary, during the get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
**To Reproduce**
Steps to reproduce the behavior:
1. Compile tcpreplay according to the default configuration
2. execute... | Heap overflow in get_ipv6_next() | https://api.github.com/repos/appneta/tcpreplay/issues/576/comments | 4 | 2020-05-08T15:35:39Z | 2020-06-02T00:41:03Z | https://github.com/appneta/tcpreplay/issues/576 | 614,818,164 | 576 | 1,206 |
CVE-2020-12767 | 2020-05-09T21:15:11.007 | exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https:... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libexif_project:libexif:0.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CA97AE-0601-4A69-BC8A-AEBAF8CD7EEA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSt... | [
"369"
] | 369 | https://github.com/libexif/libexif/issues/31 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"libexif",
"libexif"
] | The problem of dividing by zero was found during the OSS Fuzz project test.
Project: libexif
Fuzzer: libFuzzer_libexif_exif_loader_fuzzer
Fuzz target binary: exif_loader_fuzzer
Platform Id: linux
Type of test:undefined
Command:
` python infra/helper.py build_fuzzers --sanitizer undefined libexif `
`pyt... | division by zero in libexif/exif-entry.c | https://api.github.com/repos/libexif/libexif/issues/31/comments | 6 | 2020-02-18T01:59:09Z | 2020-06-05T05:47:40Z | https://github.com/libexif/libexif/issues/31 | 566,598,341 | 31 | 1,208 |
CVE-2020-11058 | 2020-05-12T21:15:11.383 | In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE"... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FreeRDP/FreeRDP/commit/3627aaf7d289315b614a584afb388f04abfb5bbf"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D51A2C7-56AC-4CD2-B6AC-560C3B166209",
"versionEndExcluding": null,
"versionEndIncluding": "2.0.0",
"versionStartExcludi... | [
"125"
] | 125 | https://github.com/FreeRDP/FreeRDP/issues/6011 | [
"Third Party Advisory"
] | github.com | [
"FreeRDP",
"FreeRDP"
] | version
```
https://github.com/FreeRDP/FreeRDP/blob/9ef1e81c559bb19d613b4da2d68908ea5d7f9259/libfreerdp/core/capabilities.c#L1398
```
vuln code
`rdp_read_capability_sets` first read 2 byte to length, then check `Stream_GetRemainingLength(s) + 4 < length`
assume `Stream_GetRemainingLength(s)=1` and `length... | stream out of bounds seek in rdp_read_font_capability_set could lead out of bounds read later | https://api.github.com/repos/FreeRDP/FreeRDP/issues/6011/comments | 0 | 2020-03-31T10:46:15Z | 2020-04-06T11:53:34Z | https://github.com/FreeRDP/FreeRDP/issues/6011 | 590,998,060 | 6,011 | 1,209 |
CVE-2020-11073 | 2020-05-13T19:15:11.863 | In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/commit/30c77db7c83eca2bc5f6134fccbdc117b49a6a05"
},
{
"source": "security-advisories@github.com",
"tags": [
"E... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:autoswitch_python_virtualenv_project:autoswitch_python_virtualenv:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBFC8718-42EA-4765-B37C-9F5840333015",
"versionEndExcluding": "1.16.0",
"versionEn... | [
"22"
] | 22 | https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"MichaelAquilina",
"zsh-autoswitch-virtualenv"
] | ```bash
git clone https://github.com/saleemrashid/evil-zsh-autoswitch-virtualenv.git
cd evil-zsh-autoswitch-virtualenv
cat evil.txt
```
The script `evil_virtualenv/bin/activate` will be sourced **without any user interaction**, which will:
1. Erase the "Switching virtualenv" message from the terminal (so the ... | Malicious scripts in untrusted directories are executed | https://api.github.com/repos/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122/comments | 8 | 2020-01-07T11:00:15Z | 2020-01-07T21:15:15Z | https://github.com/MichaelAquilina/zsh-autoswitch-virtualenv/issues/122 | 546,219,667 | 122 | 1,210 |
CVE-2020-12882 | 2020-05-15T05:15:13.397 | Submitty through 20.04.01 allows XSS via upload of an SVG document, as demonstrated by an attack by a Student against a Teaching Fellow. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://packetstormsecurity.com/files/157756/Submitty-20.04.01-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Submitty/Submitty/issues/5266"
},
{
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rcos:submitty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA5D74C-AE38-41CE-B0C1-EFF897221AF6",
"versionEndExcluding": null,
"versionEndIncluding": "20.04.01",
"versionStartExclud... | [
"79"
] | 79 | https://github.com/Submitty/Submitty/issues/5266 | [
"Third Party Advisory"
] | github.com | [
"Submitty",
"Submitty"
] | **Describe the bug**
_This vulnerability can potentially enable any student to takeover the account of TA if they open the attachment as the cookie gets exposed._
A student logged in via username/password student:student has the ability to submit submissions for grading.
This can be then viewed by TA from their... | [Security bug] Stored XSS Trigger for TA by user account | https://api.github.com/repos/Submitty/Submitty/issues/5266/comments | 3 | 2020-04-19T19:46:42Z | 2021-06-23T02:49:36Z | https://github.com/Submitty/Submitty/issues/5266 | 602,803,937 | 5,266 | 1,211 |
CVE-2020-12872 | 2020-05-15T19:15:12.087 | yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, as demonstrated by ones that allow Sweet32 attacks, if running on an Erlang/OTP virtual machine with a version less than 21.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/erlyaws/yaws/blob/c0fd79f17d52628fcec527da7fa3e788c283c445/src/yaws_config.erl#L2068-L2075"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yaws:yaws:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97BA4D60-E43A-4599-9B59-570183B4CC05",
"versionEndExcluding": null,
"versionEndIncluding": "2.0.6",
"versionStartExcluding": n... | [
"326"
] | 326 | https://github.com/erlyaws/yaws/issues/402 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"erlyaws",
"yaws"
] | While going trough some CVE feeds and track the information noticed the [CVE-2020-12872](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12872) assignment for yaws, which is from the following [report](https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70)
Were you informed about this? | CVE-2020-12872 | https://api.github.com/repos/erlyaws/yaws/issues/402/comments | 2 | 2020-05-24T13:03:23Z | 2020-09-04T12:42:11Z | https://github.com/erlyaws/yaws/issues/402 | 623,860,560 | 402 | 1,212 |
CVE-2020-13118 | 2020-05-16T20:15:11.890 | An issue was discovered in Mikrotik-Router-Monitoring-System through 2018-10-22. SQL Injection exists in check_community.php via the parameter community. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/157733/Mikrotik-Router-Monitoring-System-1.2.3-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mikrotik-router-monitoring-system_project:mikrotik-router-monitoring-system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B6256EC-597F-4E6A-B56A-3D014879EDF1",
"versionEndExcluding": null,
"ver... | [
"89"
] | 89 | https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"adeoluwa-adebiyi",
"Mikrotik-Router-Monitoring-System"
] | ### Vulnerability type:
SQL injection
### vulnerability code:
in file `check_community.php line 49`:
```
include('credentials.php');
$community = $_GET['community'];
$_SESSION['community'] = $community;
$query = "SELECT name from router where `community`='$community'";
$conn = new mysqli($db_host,$db_user,$d... | Security issue: SQL injection | https://api.github.com/repos/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4/comments | 0 | 2020-05-16T17:52:00Z | 2021-09-27T19:44:27Z | https://github.com/adeoluwa-adebiyi/Mikrotik-Router-Monitoring-System/issues/4 | 619,524,622 | 4 | 1,213 |
CVE-2020-13121 | 2020-05-16T20:15:12.000 | Submitty through 20.04.01 has an open redirect via authentication/login?old= during an invalid login attempt. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Submitty/Submitty/issues/5265"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rcos:submitty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA5D74C-AE38-41CE-B0C1-EFF897221AF6",
"versionEndExcluding": null,
"versionEndIncluding": "20.04.01",
"versionStartExclud... | [
"601"
] | 601 | https://github.com/Submitty/Submitty/issues/5265 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Submitty",
"Submitty"
] | **Describe the bug**
It is possible to redirect a user to an attacker owned domain and trick the user. I am investigating on the potential chaining of this bug to perform other attacks.
**Expected behavior**
Redirection to external urls must not be allowed.
**To Reproduce**
This occurs at the main login page ... | [Security Bug] Open Redirection Vulnerability at Login Page | https://api.github.com/repos/Submitty/Submitty/issues/5265/comments | 3 | 2020-04-19T16:32:45Z | 2020-05-28T23:42:01Z | https://github.com/Submitty/Submitty/issues/5265 | 602,760,697 | 5,265 | 1,214 |
CVE-2019-20798 | 2020-05-18T00:15:11.157 | An XSS issue was discovered in handler_server_info.c in Cherokee through 1.2.104. The requested URL is improperly displayed on the About page in the default configuration of the web server and its administrator panel. The XSS in the administrator panel can be used to reconfigure the server and execute arbitrary command... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webserver/issues/1227"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://logicaltrust.net/blog/2019... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.104",
"version... | [
"79"
] | 79 | https://github.com/cherokee/webserver/issues/1227 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cherokee",
"webserver"
] | Requested URL is improperly displayed on the About page. The problem occurs on default configuration in Cherokee and Cheroke administrator panel. XSS in administrator panel can be used to reconfigure the server and execute arbitrary commands.
### PoC
```
http://127.0.0.1/about/"><script>alert(1)</script>
http://1... | Reflected XSS in handler_server_info | https://api.github.com/repos/cherokee/webserver/issues/1227/comments | 1 | 2019-07-25T14:44:52Z | 2019-11-14T07:47:17Z | https://github.com/cherokee/webserver/issues/1227 | 472,908,037 | 1,227 | 1,215 |
CVE-2019-20799 | 2020-05-18T00:15:11.237 | In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webserver/issues/1221"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webser... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.104",
"version... | [
"787"
] | 787 | https://github.com/cherokee/webserver/issues/1221 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cherokee",
"webserver"
] | It's possible to trigger NULL pointer dereference in case if request uses POST method with empty body.
cherokee/handler_admin.c
```
[...]
204 ret_t
205 cherokee_handler_admin_read_post (cherokee_handler_admin_t *hdl)
206 {
207 int re;
208 ret_t ret;
209 char ... | remote null pointer dereference trigger in admin handler | https://api.github.com/repos/cherokee/webserver/issues/1221/comments | 4 | 2019-07-25T14:31:07Z | 2019-11-14T08:11:35Z | https://github.com/cherokee/webserver/issues/1221 | 472,900,471 | 1,221 | 1,216 |
CVE-2019-20799 | 2020-05-18T00:15:11.237 | In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webserver/issues/1221"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webser... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.104",
"version... | [
"787"
] | 787 | https://github.com/cherokee/webserver/issues/1222 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cherokee",
"webserver"
] | cherokee/buffer.c:
```
[...]
escape_with_table (cherokee_buffer_t *buffer,
1342 cherokee_buffer_t *src,
1343 uint32_t *is_char_escaped)
[...]
1346 const char *s,*s_next;
[...]
1359 s = src->buf;
1360 do {
1361 s_next = utf8_get_next_char (s);
1362
... | escape_with_table invalid access | https://api.github.com/repos/cherokee/webserver/issues/1222/comments | 0 | 2019-07-25T14:34:23Z | 2019-11-14T14:59:41Z | https://github.com/cherokee/webserver/issues/1222 | 472,902,318 | 1,222 | 1,217 |
CVE-2019-20799 | 2020-05-18T00:15:11.237 | In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webserver/issues/1221"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webser... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.104",
"version... | [
"787"
] | 787 | https://github.com/cherokee/webserver/issues/1225 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cherokee",
"webserver"
] | ### PoC
```
echo -n 'R0VUIC90ZXN0MTAvdGVzdC5odG1sIEhUVFAvMS4xCkFjY2VwdDogMTI3LjAuMC4xCkFjY2VwdC1DaGFyc2V0OiAxMjcuMC4wLjEKQWNjZXB0LUVuY29kaW5nOiAxMjcuMC4wLjEKQWNjZXB0LUxhbmd1YWdlOiAxMjcuMC4wLjEKQXV0aG9yaXphdGlvbjogMTI3LjAuMC4xCkNhY2hlLUNvbnRyb2w6IDEyNy4wLjAuMQpDaGFyZ2UtVG86IDEyNy4wLjAuMQpDb25uZWN0aW9uOiAxMjcuMC4wLjE... | heap-buffer-overflow in handler cgi | https://api.github.com/repos/cherokee/webserver/issues/1225/comments | 1 | 2019-07-25T14:41:51Z | 2019-11-16T20:58:16Z | https://github.com/cherokee/webserver/issues/1225 | 472,906,399 | 1,225 | 1,218 |
CVE-2019-20799 | 2020-05-18T00:15:11.237 | In Cherokee through 1.2.104, multiple memory corruption errors may be used by a remote attacker to destabilize the work of a server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webserver/issues/1221"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webser... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.104",
"version... | [
"787"
] | 787 | https://github.com/cherokee/webserver/issues/1226 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cherokee",
"webserver"
] | A socket structure is incorrectly used as ipv6 while connecting to a proxy server.
### PoC
```
echo -e "GET /test8/test.html HTTP/1.0\nUser-Agent: python\n\n" | nc 127.0.0.1 80
```
### ASAN
```
==27029==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600001cd98 at pc 0x55ea3748a492 bp 0x7f6bc4... | incorrectly used ipv6 in proxy connection | https://api.github.com/repos/cherokee/webserver/issues/1226/comments | 5 | 2019-07-25T14:44:01Z | 2019-11-16T20:57:54Z | https://github.com/cherokee/webserver/issues/1226 | 472,907,578 | 1,226 | 1,219 |
CVE-2019-20800 | 2020-05-18T00:15:11.330 | In Cherokee through 1.2.104, remote attackers can trigger an out-of-bounds write in cherokee_handler_cgi_add_env_pair in handler_cgi.c by sending many request headers, as demonstrated by a GET request with many "Host: 127.0.0.1" headers. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cherokee/webserver/issues/1224"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://logicaltrust.net/blog/2019... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FDFC431-553A-4EF1-9450-9F9310415845",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.104",
"version... | [
"787"
] | 787 | https://github.com/cherokee/webserver/issues/1224 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cherokee",
"webserver"
] | struct cherokee_handler_cgi_t (handler_cgi.h) consist of a fixed sized array (char *envp[ENV_VAR_NUM]) for environ variables. Sending a request with a lot of headers, causes to
increment int envp_last to a value greater than ENV_VAR_NUM resulting in reading outside the array.
handler_cgi.c:
```
310 cgi->... | CGI Handler too many headers | https://api.github.com/repos/cherokee/webserver/issues/1224/comments | 1 | 2019-07-25T14:37:07Z | 2019-11-16T19:39:09Z | https://github.com/cherokee/webserver/issues/1224 | 472,903,806 | 1,224 | 1,220 |
CVE-2020-13128 | 2020-05-18T00:15:11.547 | An issue was discovered in Manolo GWTUpload 1.0.3. server/UploadServlet.java (the servlet for handling file upload) accepts a delay parameter that causes a thread to sleep. It can be abused to cause all of a server's threads to sleep, leading to denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/manolo/gwtupload/issues/33"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://logicaltrust.net/blog/2020/02/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gwtupload_project:gwtupload:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "83DF83B6-87E9-4C19-8616-59B0CE2A0364",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"434"
] | 434 | https://github.com/manolo/gwtupload/issues/33 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"manolo",
"gwtupload"
] | There is a vulnerability which allows to perform DoS attack against the application
server. The problem lies in handling `delay` parameter when upload is
initiated (`gwtupload.server.UploadServlet#parsePostRequest`). Value from
this parameter is used as an argument for `Thread.sleep` invocation.
Malicious user can ... | Upload delay resulting in DoS | https://api.github.com/repos/manolo/gwtupload/issues/33/comments | 3 | 2020-02-17T21:17:42Z | 2021-02-14T16:44:21Z | https://github.com/manolo/gwtupload/issues/33 | 566,521,167 | 33 | 1,221 |
CVE-2020-2024 | 2020-05-19T21:15:10.070 | An improper link resolution vulnerability affects Kata Containers versions prior to 1.11.0. Upon container teardown, a malicious guest can trick the kata-runtime into unmounting any mount point on the host and all mount points underneath it, potentiality resulting in a host DoS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kata-containers/runtime/issues/2474"
},
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kat... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D33AE8C-B850-4A56-B7F2-8D9CD0839E83",
"versionEndExcluding": "1.11.0",
"versionEndIncluding": null,
"versionStar... | [
"59"
] | 59 | https://github.com/kata-containers/runtime/issues/2474 | [
"Third Party Advisory"
] | github.com | [
"kata-containers",
"runtime"
] | # Description of problem
A container's host path might be changed by the guest to point to some other places by placing a symlink there. kata runtime should not follow link when unmounting them otherwise we might end up unmounting some other mountpoints unexpectedly. | harden container hostpath cleanup | https://api.github.com/repos/kata-containers/runtime/issues/2474/comments | 0 | 2020-02-19T12:52:15Z | 2020-05-29T14:05:22Z | https://github.com/kata-containers/runtime/issues/2474 | 567,548,955 | 2,474 | 1,222 |
CVE-2020-13163 | 2020-05-19T22:15:12.090 | em-imap 0.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ConradIrwin/em-imap/issues/25"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:em-imap_project:em-imap:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC712B8-7E31-4395-8FD2-18FAD5A67C9E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"295"
] | 295 | https://github.com/ConradIrwin/em-imap/issues/25 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ConradIrwin",
"em-imap"
] | # GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-095`
The [GitHub Security Lab](https://securitylab.github.com) team has identified potential security vulnerabilities in [em-imap](https://github.com/ConradIrwin/em-imap).
We are committed to working with you to help resolve these issues. In this repor... | Security vulnerability: missing SSL hostname validation | https://api.github.com/repos/ConradIrwin/em-imap/issues/25/comments | 5 | 2020-05-18T21:43:41Z | 2020-11-23T14:20:57Z | https://github.com/ConradIrwin/em-imap/issues/25 | 620,524,200 | 25 | 1,223 |
CVE-2020-13225 | 2020-05-20T04:15:10.427 | phpIPAM 1.4 contains a stored cross site scripting (XSS) vulnerability within the Edit User Instructions field of the User Instructions widget. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/phpipam/phpipam/issues/3025"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.youtube.com/watch?v=SpFmM... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpipam:phpipam:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3B073F95-66BA-4D4E-888F-51DC1B2B834A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/phpipam/phpipam/issues/3025 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"phpipam",
"phpipam"
] | Version: 1.4
Within the Edit User Instructions field where you can enter source code you are able to generate scripting that then executes in the user's browser when they click on the instructions page.
POC:
``` <body onload=alert(1)></body>```
Additionally,
```<a href=# onmouseover=alert(1)>Text</a>```
... | Stored XSS in User Instructions Widget | https://api.github.com/repos/phpipam/phpipam/issues/3025/comments | 3 | 2020-05-17T10:45:44Z | 2020-09-14T10:26:31Z | https://github.com/phpipam/phpipam/issues/3025 | 619,669,375 | 3,025 | 1,224 |
CVE-2020-13226 | 2020-05-20T12:15:11.520 | WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Security+Advisories"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/WSO2+Security+Vulnerability+Ma... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF14774-8935-4FC9-B5C8-9771B3D6EBFD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"918"
] | 918 | https://github.com/wso2/docs-apim/issues/816 | [
"Third Party Advisory"
] | github.com | [
"wso2",
"docs-apim"
] | **Description:**
in a WSO2 API-M deployment, we recommend restricting outbound connections of the Publisher node only to the required internal nodes (only to the nodes which Publisher portal is intended to communicate with) of the deployment. So even if privileged user credentials were exploited to a user with malicio... | Add n/w level security guideline to to restrict outbound connections of Publisher node. | https://api.github.com/repos/wso2/docs-apim/issues/816/comments | 1 | 2020-03-10T05:34:53Z | 2020-06-09T07:00:28Z | https://github.com/wso2/docs-apim/issues/816 | 578,348,516 | 816 | 1,225 |
CVE-2020-13226 | 2020-05-20T12:15:11.520 | WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/Security+Advisories"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://docs.wso2.com/display/Security/WSO2+Security+Vulnerability+Ma... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wso2:api_manager:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF14774-8935-4FC9-B5C8-9771B3D6EBFD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"918"
] | 918 | https://github.com/wso2/product-apim/issues/7677 | [
"Third Party Advisory"
] | github.com | [
"wso2",
"product-apim"
] | ### Describe your problem(s)
Currently, the API endpoint validation (`https://localhost:9443/api/am/publisher/v1.0/apis/validate-endpoint?endpointUrl=''`) in the Publisher portal takes place via a direct HTTP Head call initiated from the Publisher node. This can be further improved by routing this request through th... | Deploy endpoint validation API in API Gateway | https://api.github.com/repos/wso2/product-apim/issues/7677/comments | 1 | 2020-03-10T05:23:03Z | 2020-06-09T07:01:55Z | https://github.com/wso2/product-apim/issues/7677 | 578,345,111 | 7,677 | 1,226 |
CVE-2020-13230 | 2020-05-20T14:15:11.407 | In Cacti before 1.2.11, disabling a user account does not immediately invalidate any permissions granted to that account (e.g., permission to view logs). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cacti/cacti/issues/3343"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71E927CB-B43A-486F-980C-24BB8CF50FBD",
"versionEndExcluding": "1.2.11",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"281"
] | 281 | https://github.com/Cacti/cacti/issues/3343 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
Cacti admin console provides a functionality to disable a created user which takes his privileges to perform any action but if a page is auto-refreshed a disabled user can view updated data.
**To Reproduce**
Steps to reproduce the behavior:
1. Log in with Admin account and navigate to http://... | Improper Access Control on disabling a user. | https://api.github.com/repos/Cacti/cacti/issues/3343/comments | 2 | 2020-03-11T14:37:20Z | 2020-06-30T12:20:21Z | https://github.com/Cacti/cacti/issues/3343 | 579,312,165 | 3,343 | 1,227 |
CVE-2020-13231 | 2020-05-20T14:15:11.487 | In Cacti before 1.2.11, auth_profile.php?action=edit allows CSRF for an admin email change. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Cacti/cacti/issues/3342"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/Cacti/cacti/releases/t... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71E927CB-B43A-486F-980C-24BB8CF50FBD",
"versionEndExcluding": "1.2.11",
"versionEndIncluding": null,
"versionStartExcluding"... | [
"352"
] | 352 | https://github.com/Cacti/cacti/issues/3342 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | **Describe the bug**
A malformed GET request at http://192.168.56.106/cacti/auth_profile.php?action=edit can lead to admin email change.
Affected URI
http://192.168.56.106/cacti/auth_profile.php?action=edit
**To Reproduce**
Steps to reproduce the behavior:
1. Go to 'http://192.168.56.106/cacti/auth_profile.ph... | CSRF at Admin Email | https://api.github.com/repos/Cacti/cacti/issues/3342/comments | 2 | 2020-03-11T13:32:33Z | 2020-06-30T12:20:22Z | https://github.com/Cacti/cacti/issues/3342 | 579,267,172 | 3,342 | 1,228 |
CVE-2020-13246 | 2020-05-20T18:15:12.667 | An issue was discovered in Gitea through 1.11.5. An attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/go-gitea/gitea/issues/10549"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6017D44E-852F-4935-B006-64BF03A9F091",
"versionEndExcluding": null,
"versionEndIncluding": "1.11.5",
"versionStartExcluding"... | [
"667"
] | 667 | https://github.com/go-gitea/gitea/issues/10549 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"go-gitea",
"gitea"
] | - Gitea version (or commit ref): v1.11.1
- Git version: 2.20.1
- Operating system: Debian 10.3
- Database (use `[x]`):
- [ ] PostgreSQL
- [ ] MySQL
- [ ] MSSQL
- [x] SQLite
- Can you reproduce the bug at https://try.gitea.io:
- [ ] Yes (provide example URL)
- [x] No
- [ ] Not relevant
- Log gi... | Server freezes when transferring the ownership | https://api.github.com/repos/go-gitea/gitea/issues/10549/comments | 27 | 2020-03-01T08:47:20Z | 2020-11-24T02:14:54Z | https://github.com/go-gitea/gitea/issues/10549 | 573,508,870 | 10,549 | 1,229 |
CVE-2020-13258 | 2020-05-21T17:15:10.353 | Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/contentful/the-example-app.py/issues/44"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:contentful:python_example:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75F6AE03-95E4-4482-8F91-17E45B1B3E67",
"versionEndExcluding": null,
"versionEndIncluding": "2020-05-21",
"vers... | [
"79"
] | 79 | https://github.com/contentful/the-example-app.py/issues/44 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"contentful",
"the-example-app.py"
] | Hi Team
I found a reflected xss vulnerability.
routes/base.py
```
def query_string():
"""Returns a sanitized query string."""
rejected_keys = [
'space_id',
'delivery_token',
'preview_token',
'editorial_features'
]
args = {k: v for k, v
in ... | Reflected Xss | https://api.github.com/repos/contentful/the-example-app.py/issues/44/comments | 3 | 2020-05-21T13:52:53Z | 2020-06-17T13:56:18Z | https://github.com/contentful/the-example-app.py/issues/44 | 622,514,092 | 44 | 1,230 |
CVE-2019-20803 | 2020-05-21T22:15:09.957 | Gila CMS before 1.11.6 has reflected XSS via the admin/content/postcategory id parameter, which is mishandled for g_preview_theme. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gilacms:gila_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F865E099-01EA-40D5-A296-3E1BF736AF8E",
"versionEndExcluding": "1.11.6",
"versionEndIncluding": null,
"versionStartExclu... | [
"79"
] | 79 | https://github.com/GilaCMS/gila/issues/56 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"GilaCMS",
"gila"
] | **Describe the bug**
XSS when a admin click on the link bellow, the g_preview_theme parameter not encoding the double quotes, an attacker could trick the admin to click on that link..
https://demo.gilacms.com/cm/edit_form/postcategory?id=8%22+%3E%3Cscript%3Ealert(1)%3C/script%3E
**To Reproduce**
Steps to reprodu... | Cross Site Scripting (XSS) - | https://api.github.com/repos/GilaCMS/gila/issues/56/comments | 2 | 2019-10-29T14:30:35Z | 2019-11-10T22:54:40Z | https://github.com/GilaCMS/gila/issues/56 | 513,961,405 | 56 | 1,231 |
CVE-2019-20804 | 2020-05-21T22:15:10.003 | Gila CMS before 1.11.6 allows CSRF with resultant XSS via the admin/themes URI, leading to compromise of the admin account. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/158201/GilaCMS-1.11.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gilacms:gila_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F865E099-01EA-40D5-A296-3E1BF736AF8E",
"versionEndExcluding": "1.11.6",
"versionEndIncluding": null,
"versionStartExclu... | [
"352"
] | 352 | https://github.com/GilaCMS/gila/issues/57 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"GilaCMS",
"gila"
] | #### Title
- Persistence XSS at "https://demo.gilacms.com/admin/themes"
#### Description
- A number of factors lead to an attack that could compromise an admin user account. The following steps describe how to achieve it.
First, the functionality in question is vulnerable to XSS attacks in the field responsible ... | XSS + CSRF - Admin account takeover | https://api.github.com/repos/GilaCMS/gila/issues/57/comments | 1 | 2019-10-29T16:48:33Z | 2019-11-10T22:44:27Z | https://github.com/GilaCMS/gila/issues/57 | 514,068,129 | 57 | 1,232 |
CVE-2018-21234 | 2020-05-21T23:15:11.103 | Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/oblac/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jodd:jodd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD427A38-CFDA-4A9B-ADD2-F56A19928CDD",
"versionEndExcluding": "5.0.4",
"versionEndIncluding": null,
"versionStartExcluding": n... | [
"502"
] | 502 | https://github.com/oblac/jodd/issues/628 | [
"Third Party Advisory"
] | github.com | [
"oblac",
"jodd"
] | ## Current behavior
Jodd's Json parser supports polymorphic deserialization when setClassMetadataName is set.
If an application parses JSON with this configuration from an untrusted source, it could lead to remote code execution.
The problem is quite the same as in other Java JSON libraries.
Here you can read more:... | Potential vulnerability in JSON deserialization | https://api.github.com/repos/oblac/jodd/issues/628/comments | 5 | 2018-08-17T13:37:15Z | 2022-03-29T02:10:34Z | https://github.com/oblac/jodd/issues/628 | 351,597,881 | 628 | 1,233 |
CVE-2020-13429 | 2020-05-24T18:15:10.003 | legend.ts in the piechart-panel (aka Pie Chart Panel) plugin before 1.5.0 for Grafana allows XSS via the Values Header (aka legend header) option. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/grafana/piechart-panel/issues/218"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:grafana:piechart-panel:*:*:*:*:*:grafana:*:*",
"matchCriteriaId": "F1789E82-FAE0-4BA1-BFD2-E59E155B44DC",
"versionEndExcluding": "1.5.0",
"versionEndIncluding": null,
"versio... | [
"79"
] | 79 | https://github.com/grafana/piechart-panel/issues/218 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"grafana",
"piechart-panel"
] | The pie-chart panel is potentially vulnerable to XSS scripting as it processes any javascript in the "Values Header" configuration option. e.g.
<img src=/ onerror=alert('piechart_XSS')>

| XSS flaw in piechart panel | https://api.github.com/repos/grafana/piechart-panel/issues/218/comments | 0 | 2020-02-05T14:23:34Z | 2020-05-14T22:13:21Z | https://github.com/grafana/piechart-panel/issues/218 | 560,405,028 | 218 | 1,234 |
CVE-2020-13438 | 2020-05-24T23:15:09.867 | ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008",
"versionEndExcluding": null,
"versionEndIncluding": "2020-02-24",
"versionStartE... | [
"125"
] | 125 | https://github.com/rockcarry/ffjpeg/issues/23 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | Tested in Ubuntu 16.04, 64bit.
The testcase is [segv_ffjpeg_e2](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/segv_ffjpeg_e2).
I use the following command:
```
ffjpeg -e segv_ffjpeg_e2
```
and get:
```
Segmentation fault
```
I use **valgrind** to analysis the bug and get the be... | SEGV in function jfif_encode in jfif.c:748 | https://api.github.com/repos/rockcarry/ffjpeg/issues/23/comments | 2 | 2020-05-23T17:08:31Z | 2020-07-27T08:14:45Z | https://github.com/rockcarry/ffjpeg/issues/23 | 623,701,501 | 23 | 1,235 |
CVE-2020-13439 | 2020-05-24T23:15:09.927 | ffjpeg through 2020-02-24 has a heap-based buffer over-read in jfif_decode in jfif.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/24"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008",
"versionEndExcluding": null,
"versionEndIncluding": "2020-02-24",
"versionStartE... | [
"125"
] | 125 | https://github.com/rockcarry/ffjpeg/issues/24 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | Tested in Ubuntu 16.04, 64bit.
The tesecase is [heap-buffer-overflow_ffjpeg_d1](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/heap-buffer-overflow_ffjpeg_d1).
I use the following command:
```
ffjpeg -d heap-buffer-overflow_ffjpeg_d1
```
and get:
```
Segmentation fault
```
I use... | heap-buffer-overflow in function jfif_decode at jfif.c:546 | https://api.github.com/repos/rockcarry/ffjpeg/issues/24/comments | 2 | 2020-05-23T17:09:21Z | 2020-07-27T08:17:04Z | https://github.com/rockcarry/ffjpeg/issues/24 | 623,701,677 | 24 | 1,236 |
CVE-2020-13440 | 2020-05-24T23:15:09.990 | ffjpeg through 2020-02-24 has an invalid write in bmp_load in bmp.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Pa... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008",
"versionEndExcluding": null,
"versionEndIncluding": "2020-02-24",
"versionStartE... | [
"787"
] | 787 | https://github.com/rockcarry/ffjpeg/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | Tested in Ubuntu 16.04, 64bit.
The testcase is [segv_ffjpeg_e1](https://github.com/xiaoxiongwang/function_bugs/blob/master/ffjpeg/segv_ffjpeg_e1).
I use the following command:
```
ffjpeg -e segv_ffjpeg_e1
```
and get:
```
Segmentation fault
```
I use **valgrind** to analysis the bug and get the be... | SEGV in function bmp_load at bmp.c:57 | https://api.github.com/repos/rockcarry/ffjpeg/issues/22/comments | 3 | 2020-05-23T17:07:53Z | 2022-05-22T03:18:28Z | https://github.com/rockcarry/ffjpeg/issues/22 | 623,701,352 | 22 | 1,237 |
CVE-2020-13482 | 2020-05-25T22:15:09.860 | EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/igrigorik/em-http-request/issues/339"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archiv... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:em-http-request_project:em-http-request:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7290B2E9-010E-426D-8D25-255A1F3A8F39",
"versionEndExcluding": null,
"versionEndIncluding": null,
... | [
"295"
] | 295 | https://github.com/igrigorik/em-http-request/issues/339 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"igrigorik",
"em-http-request"
] | # GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-094`
## Summary
Missing hostname validation allows an attacker to perform a man in the middle attack against users of the library.
## Product
em-http-request
## Tested Version
1.1.5
### Missing SSL/TLS certificate hostname validation
... | Security vulnerability: missing SSL hostname validation | https://api.github.com/repos/igrigorik/em-http-request/issues/339/comments | 10 | 2020-05-24T21:28:35Z | 2020-06-01T23:55:37Z | https://github.com/igrigorik/em-http-request/issues/339 | 623,949,977 | 339 | 1,238 |
CVE-2020-13614 | 2020-05-26T23:15:10.460 | An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00006.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:axel_project:axel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF615CC-5169-409A-AA55-1F60BFFAEA6F",
"versionEndExcluding": "2.17.8",
"versionEndIncluding": null,
"versionStartExcl... | [
"295"
] | 295 | https://github.com/axel-download-accelerator/axel/issues/262 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"axel-download-accelerator",
"axel"
] | It looks like Axel's SSL's connections do not verify server certificate hostnames. To fix this the SSL context should set a certificate callback or use `SSL_set1_host` to set the intended hostname.
This is an issue since it uses `SSL_CTX_set_default_verify_paths` and loads all root authorities from the OS. See https... | Axel may not verify server certificate CN/SAN/hostname (allowing SSL interception) | https://api.github.com/repos/axel-download-accelerator/axel/issues/262/comments | 0 | 2020-03-16T22:55:56Z | 2020-03-23T22:35:39Z | https://github.com/axel-download-accelerator/axel/issues/262 | 582,644,624 | 262 | 1,239 |
CVE-2020-13615 | 2020-05-26T23:15:10.973 | lib/QoreSocket.cpp in Qore before 0.9.4.2 lacks hostname verification for X.509 certificates. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/qorelanguage/qore/compare/release-0.9.4.1...release-0.9.4.2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qore:qore:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4217183A-CB12-4768-BCA3-524B5DAEBD82",
"versionEndExcluding": "0.9.4.2",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"295"
] | 295 | https://github.com/qorelanguage/qore/issues/3808 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"qorelanguage",
"qore"
] | see: https://gist.github.com/theopolis/aeaa8e4808f6b09328dd6996a2ed6c34 | Qore does not perform hostname validation during certification X.509 validation | https://api.github.com/repos/qorelanguage/qore/issues/3808/comments | 0 | 2020-03-04T06:46:33Z | 2020-03-07T15:11:28Z | https://github.com/qorelanguage/qore/issues/3808 | 575,174,425 | 3,808 | 1,240 |
CVE-2020-13622 | 2020-05-27T00:15:11.497 | JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3787"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/pull... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/3787 | [
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9
###### Build platform
Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64)
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--error-... | Assertion 'ecma_is_value_string (value)' failed at jerry-core/ecma/base/ecma-helpers-value.c(ecma_get_string_from_value):742 | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3787/comments | 0 | 2020-05-23T17:53:33Z | 2020-05-26T13:22:51Z | https://github.com/jerryscript-project/jerryscript/issues/3787 | 623,709,607 | 3,787 | 1,241 |
CVE-2020-13623 | 2020-05-27T00:15:11.557 | JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/3785"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"400"
] | 400 | https://github.com/jerryscript-project/jerryscript/issues/3785 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
https://github.com/jerryscript-project/jerryscript/commit/6cd309b5252d15f3e3e6481c72a4d8fa7f9557a9
###### Build platform
Ubuntu 20.04 LTS (Linux 5.4.0-31-generic x86_64)
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \
--error-... | Stack Exhaustion (ecma_proxy_object_get, ecma_proxy_object_set) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3785/comments | 3 | 2020-05-23T08:58:58Z | 2020-05-26T07:44:39Z | https://github.com/jerryscript-project/jerryscript/issues/3785 | 623,613,918 | 3,785 | 1,242 |
CVE-2020-11075 | 2020-05-27T22:15:11.000 | In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a valid API request t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/anchore/anchore-engine/commit/e41786901f097fd32104447a45864073105d37db"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:anchore:engine:0.7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CCBB339C-2583-4E05-9F59-70B8C6B677D3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"114"
] | 114 | https://github.com/anchore/anchore-engine/issues/430 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"anchore",
"anchore-engine"
] | In the anchore skopeo wrapper, as of 0.7.0, there is logic that supports multiple attempts to download an image from a registry using a combination of os override and destination type options. The initial implementation in 0.7.0 attempts to derive an os override option from the image manifest itself, but there are onl... | Ensure only supported os overrides are used in skopeo download commands | https://api.github.com/repos/anchore/anchore-engine/issues/430/comments | 0 | 2020-04-22T22:33:27Z | 2020-04-22T22:54:56Z | https://github.com/anchore/anchore-engine/issues/430 | 605,116,300 | 430 | 1,243 |
CVE-2019-20805 | 2020-06-01T14:15:09.977 | p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking via crafted values in a PT_DYNAMIC segment. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/commit/8be9da8280dfa69d5df4417d4d81bda1cab78010"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/upx/upx/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4A2432-18AE-4B27-A527-030DD9D34F93",
"versionEndExcluding": "3.96",
"versionEndIncluding": null,
"versionStartExcludin... | [
"190"
] | 190 | https://github.com/upx/upx/issues/317 | [
"Third Party Advisory"
] | github.com | [
"upx",
"upx"
] | ubuntu 1604 x32
////////////////////////////////////////////////////////////
ddos 1 attachment p_lx_elf.cpp^%1613
p_lx_elf.cpp:1613
unsigned const nbucket = get_te32(&hashtab[0]); crashes
/////////////////////////////////////////////////////////////////////
ddos 2 attachment p_lx_elf.cpp^%1635
p_lx_elf.cpp:1635... | upx-devel ddos Vulnerability | https://api.github.com/repos/upx/upx/issues/317/comments | 1 | 2019-11-21T09:32:01Z | 2020-01-16T11:38:51Z | https://github.com/upx/upx/issues/317 | 526,469,669 | 317 | 1,246 |
CVE-2020-13757 | 2020-06-01T19:15:10.067 | Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sybrenstuvel/python-rsa/issues/146"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python-rsa_project:python-rsa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF2CAA4-9911-439F-88CC-526D14B768A4",
"versionEndExcluding": "4.1",
"versionEndIncluding": null,
"version... | [
"327"
] | 327 | https://github.com/sybrenstuvel/python-rsa/issues/146 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sybrenstuvel",
"python-rsa"
] | Hello,
Using this testcase from Google Wycheproof:
```
{
"algorithm" : "RSAES-PKCS1-v1_5",
"generatorVersion" : "0.8r12",
"numberOfTests" : 65,
"header" : [
"Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption",
"of RSA encrypted ciphertexts."
],
"notes" : {
... | python-rsa does not detect ciphertext modification (prepended "0" bytes) in PKCS1_v1_5 | https://api.github.com/repos/sybrenstuvel/python-rsa/issues/146/comments | 12 | 2020-05-27T08:11:51Z | 2020-06-10T22:08:17Z | https://github.com/sybrenstuvel/python-rsa/issues/146 | 625,477,884 | 146 | 1,247 |
CVE-2020-13757 | 2020-06-01T19:15:10.067 | Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sybrenstuvel/python-rsa/issues/146"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python-rsa_project:python-rsa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF2CAA4-9911-439F-88CC-526D14B768A4",
"versionEndExcluding": "4.1",
"versionEndIncluding": null,
"version... | [
"327"
] | 327 | https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sybrenstuvel",
"python-rsa"
] | Hello,
Using this testcase from Google Wycheproof:
```
{
"algorithm" : "RSAES-PKCS1-v1_5",
"generatorVersion" : "0.8r12",
"numberOfTests" : 65,
"header" : [
"Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption",
"of RSA encrypted ciphertexts."
],
"notes" : {
... | python-rsa does not detect ciphertext modification (prepended "0" bytes) in PKCS1_v1_5 | https://api.github.com/repos/sybrenstuvel/python-rsa/issues/146/comments | 12 | 2020-05-27T08:11:51Z | 2020-06-10T22:08:17Z | https://github.com/sybrenstuvel/python-rsa/issues/146 | 625,477,884 | 146 | 1,248 |
CVE-2018-18623 | 2020-06-02T17:15:11.427 | Grafana 5.3.1 has XSS via the "Dashboard > Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/grafana/grafana/issues/15293"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/grafana/grafana/p... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:grafana:grafana:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A57091-8B8C-48EE-AD42-0E16B2961231",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"79"
] | 79 | https://github.com/grafana/grafana/issues/15293 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"grafana",
"grafana"
] | #### Grafana is vulnerable to XSS vulnerability because the panels included in the description below can contain html. Therefore, the option to disable or filter the html source must be provided.
> [Affected Component]
> #Grafana(5.3.1)
> Dashboard > Text Panel
>
> [Attack Vectors]
> 1. Grafana(5.3.1) Launch
... | XSS: Option to disable or sanitize html source in some panels | https://api.github.com/repos/grafana/grafana/issues/15293/comments | 4 | 2019-02-07T05:48:46Z | 2019-11-06T01:37:45Z | https://github.com/grafana/grafana/issues/15293 | 407,551,041 | 15,293 | 1,249 |
CVE-2020-12607 | 2020-06-02T21:15:10.607 | An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. The... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/AntonKueltz/fastecdsa/commit/4a16daeaf139be20654ef58a9fe4c79dc030458c"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:antonkueltz:fastecdsa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "757F0CBF-E904-4C5C-9247-A116DABA2DA3",
"versionEndExcluding": "2.1.2",
"versionEndIncluding": null,
"versionStartE... | [
"347"
] | 347 | https://github.com/AntonKueltz/fastecdsa/issues/52 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AntonKueltz",
"fastecdsa"
] | Hello,
When verifying a ECDSA signature (P-256, SHA-256) with a extreme value in k and s^-1, the verification fails even if the signature is correct. It is possible to check this using the Google Wycheproof test 345 (https://github.com/google/wycheproof/blob/master/testvectors/ecdsa_secp256r1_sha256_test.json):
`... | ECDSA verification fails for extreme value in k and s^-1 (P-256, SHA-256) | https://api.github.com/repos/AntonKueltz/fastecdsa/issues/52/comments | 4 | 2020-04-13T15:05:16Z | 2020-05-26T07:55:47Z | https://github.com/AntonKueltz/fastecdsa/issues/52 | 598,941,747 | 52 | 1,251 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.