cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164
values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-13776 | 2020-06-03T03:15:10.677 | systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLET... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/systemd/systemd/issues/15985"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10761C00-6450-4377-8DFC-16AE46BE54BB",
"versionEndExcluding": null,
"versionEndIncluding": "245",
"versionStartE... | [
"269"
] | 269 | https://github.com/systemd/systemd/issues/15985 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"systemd",
"systemd"
] | **Version the issue has been seen with**
> `245` ea500ac513cf51bcb79a5666f1519499d029428f and the current `master` d904afc730268d50502f764dfd55b8cf4906c46f
**Used distribution**
> Ubuntu 20.04 LTS
**Expected behaviour you didn't see**
> ```bash
> loginctl show-user $(id -u)
> ```
>
> ```ini
> U... | User names beginning with 0x being interpreted as user identifiers | https://api.github.com/repos/systemd/systemd/issues/15985/comments | 11 | 2020-05-31T09:13:53Z | 2020-06-04T03:40:05Z | https://github.com/systemd/systemd/issues/15985 | 627,924,396 | 15,985 | 1,252 |
CVE-2020-13597 | 2020-06-03T17:15:24.887 | Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "psirt@tigera.io",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/91507"
},
{
"source": "psirt@tigera.io",
"tags": null,
"url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "95DB38FE-A03E-456B-874A-A58C31BE7592",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.2",
"versi... | [
"200"
] | 200 | https://github.com/kubernetes/kubernetes/issues/91507 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L) (6.0 Medium)
A cluster configured to use an affected container networking implementation is susceptible to man-in-the-middle (MitM) attacks. By sending “rogue” router ad... | CVE-2020-10749: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements | https://api.github.com/repos/kubernetes/kubernetes/issues/91507/comments | 7 | 2020-05-27T19:32:29Z | 2022-09-14T11:48:50Z | https://github.com/kubernetes/kubernetes/issues/91507 | 625,973,443 | 91,507 | 1,253 |
CVE-2020-13790 | 2020-06-03T19:15:10.817 | libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F91F79CC-B2C4-4D9E-99AA-5D6A49D41561",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"125"
] | 125 | https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"libjpeg-turbo",
"libjpeg-turbo"
] | **Have you searched the existing issues (both open and closed) in the libjpeg-turbo issue tracker to ensure that this bug report is not a duplicate?**
Yes
**Does this bug report describe one of the [two known and unsolvable issues with the JPEG format](https://libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththe... | Heap-based buffer over-read in get_rgb_row() in rdppm.c | https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/433/comments | 3 | 2020-05-25T18:37:38Z | 2020-11-04T03:26:12Z | https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433 | 624,437,621 | 433 | 1,254 |
CVE-2020-13822 | 2020-06-04T15:15:13.510 | The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/indutny/elliptic/issues/226"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://medium.com/%40herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:indutny:elliptic:6.5.2:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E5343FAF-0200-473D-922C-51CB46D28A7F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStar... | [
"190"
] | 190 | https://github.com/indutny/elliptic/issues/226 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"indutny",
"elliptic"
] | Hello,
Using elliptic 6.5.2 I've found that the ECDSA verification functionality validates signatures as 'true' when the encoding is incorrect i.e. it has been modified / altered against the standard, allowing a certain degree of malleability in the signatures. Based on the Google Wycheproof test vectors, the follow... | Lack of encoding checks allows a certain degree of signature malleability in ECDSA signatures | https://api.github.com/repos/indutny/elliptic/issues/226/comments | 19 | 2020-06-01T09:49:31Z | 2020-11-12T16:45:49Z | https://github.com/indutny/elliptic/issues/226 | 628,302,319 | 226 | 1,255 |
CVE-2020-7661 | 2020-06-04T18:15:15.013 | all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kevva/url-regex/issues/70"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-URLREGEX... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:url-regex_project:url-regex:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E568BB4-BE50-4B0C-8F38-2FF8DF24DC98",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"400"
] | 400 | https://github.com/kevva/url-regex/issues/70 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kevva",
"url-regex"
] | # IMPORTANT UPDATE (8/15/20)
[Per my comment below](https://github.com/kevva/url-regex/issues/70#issuecomment-674365368), I have released my own package, `url-regex-safe`, which resolves this issue, and all (solvable) existing issues and pull requests here in this GitHub repository. The new package has 100% test co... | [VULNERABILITY] Parsing a long String will result in 100% CPU usage and `String.test` will never finish | https://api.github.com/repos/kevva/url-regex/issues/70/comments | 12 | 2020-04-26T22:13:22Z | 2020-11-24T22:00:59Z | https://github.com/kevva/url-regex/issues/70 | 607,126,399 | 70 | 1,256 |
CVE-2020-13848 | 2020-06-04T20:15:12.050 | Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00033.html"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libupnp_project:libupnp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92BB7079-C245-481E-A592-D88889DC1D95",
"versionEndExcluding": null,
"versionEndIncluding": "1.12.1",
"versionSta... | [
"476"
] | 476 | https://github.com/pupnp/pupnp/issues/177 | [
"Third Party Advisory"
] | github.com | [
"pupnp",
"pupnp"
] | There is a NULL pointer dereference in the function FindServiceControlURLPath in genlib/service_table/service_table.c.
A segmentation fault occurs if the string controlURLPath is NULL. This crash can be triggered by sending a malformed SUBSCRIBE or UNSUBSCRIBE using any of the attached files.
`cat <subscribe/unsu... | NULL pointer dereference in FindServiceControlURLPath | https://api.github.com/repos/pupnp/pupnp/issues/177/comments | 4 | 2020-06-02T08:54:59Z | 2020-06-05T15:04:55Z | https://github.com/pupnp/pupnp/issues/177 | 629,026,044 | 177 | 1,257 |
CVE-2020-12723 | 2020-06-05T15:15:10.800 | regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Pe... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C171B203-3DAA-43B7-A0BE-DDB0895EB744",
"versionEndExcluding": "5.30.3",
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"120"
] | 120 | https://github.com/Perl/perl5/issues/16947 | [
"Third Party Advisory"
] | github.com | [
"Perl",
"perl5"
] | Migrated from [rt.perl.org#134017](https://rt-archive.perl.org/perl5/Ticket/Display.html?id=134017) (status was 'open')
Searchable as RT134017$
| Segfault in S_study_chunk (regcomp.c:4870) | https://api.github.com/repos/Perl/perl5/issues/16947/comments | 28 | 2019-04-10T13:09:22Z | 2020-04-23T12:40:12Z | https://github.com/Perl/perl5/issues/16947 | 509,396,691 | 16,947 | 1,258 |
CVE-2020-12723 | 2020-06-05T15:15:10.800 | regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Pe... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C171B203-3DAA-43B7-A0BE-DDB0895EB744",
"versionEndExcluding": "5.30.3",
"versionEndIncluding": null,
"versionStartExcluding": ... | [
"120"
] | 120 | https://github.com/Perl/perl5/issues/17743 | [
"Third Party Advisory"
] | github.com | [
"Perl",
"perl5"
] | This is a placeholder ticket for consideration of a theoretically possible bug.
In #16947 we found that study_chunk reinvokes itself in two ways - by simple recursion, and by enframing. In some cases that involves restudying regexp ops multiple times, whereas in other cases the reinvocation is the only time the rele... | study_chunk recursion | https://api.github.com/repos/Perl/perl5/issues/17743/comments | 1 | 2020-04-23T13:10:14Z | 2020-09-15T15:28:27Z | https://github.com/Perl/perl5/issues/17743 | 605,518,922 | 17,743 | 1,259 |
CVE-2020-8555 | 2020-06-05T17:15:11.640 | The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/01/4"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://w... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB84B14-8D71-4BEA-90FC-DB76F9A0F781",
"versionEndExcluding": "1.15.11",
"versionEndIncluding": null,
"versionStar... | [
"918"
] | 918 | https://github.com/kubernetes/kubernetes/issues/91542 | [
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)
There exists a Server Side Request Forgery (SSRF) vulnerability in kube-controller-manager that allows certain authorized users to leak up to 500 bytes of arbitrary info... | CVE-2020-8555: Half-Blind SSRF in kube-controller-manager | https://api.github.com/repos/kubernetes/kubernetes/issues/91542/comments | 4 | 2020-05-28T16:13:34Z | 2021-12-02T22:54:48Z | https://github.com/kubernetes/kubernetes/issues/91542 | 626,636,248 | 91,542 | 1,260 |
CVE-2020-13881 | 2020-06-06T19:15:09.610 | In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/08/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://gi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pam_tacplus_project:pam_tacplus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CBB04E0-1798-4128-B107-EC27FE0CEAAB",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.1",
"ver... | [
"532"
] | 532 | https://github.com/kravietz/pam_tacplus/issues/149 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kravietz",
"pam_tacplus"
] | In the example, we can see that server secret key is printed in plain text in journalctl logs. If an attacker is using man-in-the-middle attack and somehow gets these logs, he/she can decrypt and see all packets. User passwords will also be exposed by that. | Printing server secret key in plain text in journalctl | https://api.github.com/repos/kravietz/pam_tacplus/issues/149/comments | 12 | 2020-06-02T16:40:38Z | 2020-06-08T12:28:31Z | https://github.com/kravietz/pam_tacplus/issues/149 | 629,350,947 | 149 | 1,261 |
CVE-2020-13889 | 2020-06-06T20:15:11.200 | showAlert() in the administration panel in Bludit 3.12.0 allows XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/1205"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/bludit/bludit/issues/1205 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | Hello I think I found a vulnerability.
This vulnerability consists in a function called showAlert() in the administration panel of bludit,that when accessed in DOM, allows users define the text to be popped up in the message box. But this function dont have any sanatization and the user can inject any javascript and... | Possible XSS and HTML injection on admin page. | https://api.github.com/repos/bludit/bludit/issues/1205/comments | 1 | 2020-06-05T01:31:12Z | 2020-06-07T10:05:27Z | https://github.com/bludit/bludit/issues/1205 | 631,247,131 | 1,205 | 1,262 |
CVE-2020-13895 | 2020-06-07T01:15:10.550 | Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FGasper/p5-Crypt-Perl/commit/f960ce75502acf7404187231a706672f8369acb2"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:p5-crypt-perl_project:p5-crypt-perl:*:*:*:*:*:perl:*:*",
"matchCriteriaId": "1EEE3CFF-1E10-4097-9BBC-02DF00813008",
"versionEndExcluding": "0.32",
"versionEndIncluding": null,
... | [
"347"
] | 347 | https://github.com/FGasper/p5-Crypt-Perl/issues/14 | [
"Third Party Advisory"
] | github.com | [
"FGasper",
"p5-Crypt-Perl"
] | Hello, I'm using Crypt::Perl::ECDSA 0.31:
```
cpan -D Crypt::Perl::ECDSA
Database was generated on Thu, 04 Jun 2020 08:41:03 GMT
Crypt::Perl::ECDSA
-------------------------------------------------------------------------
CPAN: Module::CoreList loaded ok (v5.20181129_28)
(no description)
F/FE/FELIPE/Crypt-P... | Crypt::Perl::ECDSA fails to verify ECDSA signatures when r and s are small and when s = 1 | https://api.github.com/repos/FGasper/p5-Crypt-Perl/issues/14/comments | 4 | 2020-06-04T10:07:35Z | 2020-06-07T07:42:13Z | https://github.com/FGasper/p5-Crypt-Perl/issues/14 | 630,689,834 | 14 | 1,263 |
CVE-2020-13978 | 2020-06-09T14:15:10.140 | Monstra CMS 3.0.4 allows an attacker, who already has administrative access to modify .chunk.php files on the Edit Chunk screen, to execute arbitrary OS commands via the Theme Module by visiting the admin/index.php?id=themes&action=edit_chunk URI. NOTE: there is no indication that the Edit Chunk feature was intended to... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/monstra-cms/monstra/issues/464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A2226D9F-8476-4F0F-9DE3-21A8FE290533",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"78"
] | 78 | https://github.com/monstra-cms/monstra/issues/464 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"monstra-cms",
"monstra"
] | **Describe the bug**
An attacker could insert any executable code through php via Theme Module to execution command in the server
**To Reproduce**
- Log into the panel.
- Go to "/admin/index.php?id=themes&action=edit_chunk"
- Click edit
- Insert payload
```
<?php exec('cat /etc/passwd 2>&1', $output); ?>
... | Remote Code Execution via Theme module | https://api.github.com/repos/monstra-cms/monstra/issues/464/comments | 1 | 2020-05-22T18:06:25Z | 2024-09-14T08:18:06Z | https://github.com/monstra-cms/monstra/issues/464 | 623,393,091 | 464 | 1,264 |
CVE-2020-13980 | 2020-06-09T14:15:10.217 | OpenCart 3.0.3.3 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section because of a lack of entity encoding. NOTE: this issue exists because of an incomplete fix for CVE-2020-10596. The vendor states "this is not a massive issue as you are still required to b... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/opencart/opencart/issues/7974"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gith... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opencart:opencart:3.0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F0CB49BB-ED76-4815-9DA0-12B76DDAE975",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/opencart/opencart/issues/7974 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"opencart",
"opencart"
] | Spam | Store XSS Vulnerability in Opencart 3.0.3.3 - Upload Images | https://api.github.com/repos/opencart/opencart/issues/7974/comments | 5 | 2020-05-31T16:35:45Z | 2021-08-03T11:05:07Z | https://github.com/opencart/opencart/issues/7974 | 627,998,047 | 7,974 | 1,265 |
CVE-2020-7670 | 2020-06-10T16:15:10.540 | agoo prior to 2.14.0 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": null,
"url": "https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130"
},
{
"source": "report@snyk.io",
"tags": null,
"url": "https://github.com/ohler55/agoo/issues/88"
},
{
"source": "report@snyk.io",
"tags": [
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ohler:agoo:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "6A41F130-9592-48D6-9B78-86D688B56D5A",
"versionEndExcluding": null,
"versionEndIncluding": "2.12.3",
"versionStartExcludin... | [
"444"
] | 444 | https://github.com/ohler55/agoo/issues/88 | null | github.com | [
"ohler55",
"agoo"
] | Testbed used to verify the vulnerability: https://github.com/ohler55/agoo#rack
The following requests can be send via command line (tested on ubuntu) to reproduce the behaviour
## Double Content Length Headers
printf 'GET /hello HTTP/1.1\r\n'\
'Content-Length: 47\r\n'\
'Content-Length: 0\r\n'\
'Host: 127.0.0... | Protect against smuggling attacks | https://api.github.com/repos/ohler55/agoo/issues/88/comments | 3 | 2020-05-16T00:01:28Z | 2020-11-12T16:09:05Z | https://github.com/ohler55/agoo/issues/88 | 619,332,166 | 88 | 1,266 |
CVE-2020-7671 | 2020-06-10T16:15:10.587 | goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": null,
"url": "https://github.com/postrank-labs/goliath/issues/351%2C"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136"
},
{
"source": "af854a3a-2127-422b-91a... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:goliath_project:goliath:*:*:*:*:*:ruby:*:*",
"matchCriteriaId": "079332CF-A488-425D-A4C7-3804B6EBE665",
"versionEndExcluding": null,
"versionEndIncluding": "1.0.6",
"versionS... | [
"444"
] | 444 | https://github.com/postrank-labs/goliath/issues/351%2C | null | github.com | [
"postrank-labs",
"goliath"
] | Posting it here for community patches after talking with the maintainers privately.
Issue: Goliath doesn't prevent Request Smuggling attacks
1. Goliath allows requests with multiple content-lengths.
When sent a request such as the below, the first content-length header is ignored and the second content-lengt... | HTTP Request Smuggling Hardening | https://api.github.com/repos/postrank-labs/goliath/issues/351/comments | 0 | 2020-06-02T19:56:15Z | 2020-11-23T14:21:05Z | https://github.com/postrank-labs/goliath/issues/351 | 629,473,498 | 351 | 1,267 |
CVE-2020-14012 | 2020-06-10T18:15:10.890 | scp/categories.php in osTicket 1.14.2 allows XSS via a Knowledgebase Category Name or Category Description. The attacker must be an Agent. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/osTicket/osTicket/issues/5514"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:enhancesoft:osticket:1.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "81B1474A-11DC-489E-9A4A-F57F4110D087",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStart... | [
"79"
] | 79 | https://github.com/osTicket/osTicket/issues/5514 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"osTicket",
"osTicket"
] | Description:
A authenticated malicious user can take advantage of a Reflected XSS vulnerability in the "Knowledgebase" feature. This was can be bypassed by using HTML event handlers, such as "ontoggle".
OS: firefox
Steps to Reproduce:
1. Log into the panel OsTicket
2. Go to "/osticket/scp/kb.php"
3. Go to "/ostic... | Cross Site Scripting Vulnerability on "Knowledgebase" feature in OsTicket | https://api.github.com/repos/osTicket/osTicket/issues/5514/comments | 3 | 2020-05-21T10:01:21Z | 2020-06-16T21:52:33Z | https://github.com/osTicket/osTicket/issues/5514 | 622,390,539 | 5,514 | 1,268 |
CVE-2020-2023 | 2020-06-10T18:15:11.280 | Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kata-containers/agent/issues/791"
},
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Patch"
],
"url": "https://github.com/kata-containers/agent/pull/792"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31",
"versionEndExcluding": null,
"versionEndIncluding": "1.9",
"versionStartEx... | [
"250"
] | 250 | https://github.com/kata-containers/agent/issues/791 | [
"Third Party Advisory"
] | github.com | [
"kata-containers",
"agent"
] | Explicitly deny any access to the nvdimm root partition by adding the nvdimm device to the device cgroup. | Explicitly deny any access to the nvdimm root partition | https://api.github.com/repos/kata-containers/agent/issues/791/comments | 0 | 2020-06-03T15:33:02Z | 2020-06-03T20:30:09Z | https://github.com/kata-containers/agent/issues/791 | 630,096,691 | 791 | 1,269 |
CVE-2020-2023 | 2020-06-10T18:15:11.280 | Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kata-containers/agent/issues/791"
},
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Patch"
],
"url": "https://github.com/kata-containers/agent/pull/792"
},... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31",
"versionEndExcluding": null,
"versionEndIncluding": "1.9",
"versionStartEx... | [
"250"
] | 250 | https://github.com/kata-containers/runtime/issues/2488 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"kata-containers",
"runtime"
] | CLH recently introduced a new stable branch `stable/v0.5.x` [here](https://github.com/cloud-hypervisor/cloud-hypervisor/tree/stable/v0.5.x), and it is advised to use this branch. This branch includes updates that allow the root file system to be mounted as read-only. | clh: update CLH to stable/v0.5.x | https://api.github.com/repos/kata-containers/runtime/issues/2488/comments | 0 | 2020-02-20T16:13:48Z | 2020-05-29T15:38:09Z | https://github.com/kata-containers/runtime/issues/2488 | 568,410,720 | 2,488 | 1,270 |
CVE-2020-2026 | 2020-06-10T18:15:11.360 | A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 vers... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kata-containers/runtime/issues/2712"
},
{
"source": "psirt@paloaltonetworks.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/kata-containers/ru... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31",
"versionEndExcluding": null,
"versionEndIncluding": "1.9",
"versionStartEx... | [
"59"
] | 59 | https://github.com/kata-containers/runtime/issues/2712 | [
"Third Party Advisory"
] | github.com | [
"kata-containers",
"runtime"
] | We need to make sure containers cannot modify host path unless it is explicitly shared to it. Right now we expose an additional top level shared directory to the guest and allow it to be modified. This is less ideal and can be enhanced by following method:
1. create two directories for each sandbox:
-. /run/kata-co... | host shared directory should be readonly | https://api.github.com/repos/kata-containers/runtime/issues/2712/comments | 0 | 2020-05-29T15:40:02Z | 2020-06-03T02:18:21Z | https://github.com/kata-containers/runtime/issues/2712 | 627,358,605 | 2,712 | 1,271 |
CVE-2020-4043 | 2020-06-10T20:15:14.483 | phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versi... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4"
},
{
"source": "security-advisories@github.com",
"tags": [
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpmussel_project:phpmussel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2EC9BA66-3EEA-45DA-9609-227B31D00DE5",
"versionEndExcluding": "1.6.0",
"versionEndIncluding": null,
"version... | [
"502"
] | 502 | https://github.com/phpMussel/phpMussel/issues/167 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"phpMussel",
"phpMussel"
] | An unserialization vulnerability was recently discovered which affects the phar wrapper. Due to that phpMussel implements the phar wrapper for reading archives, this vulnerability also currently affects all currently supported versions of phpMussel to the extent of its ability to read archives.
I would __*strongly*_... | Phar unserialization vulnerability. | https://api.github.com/repos/phpMussel/phpMussel/issues/167/comments | 3 | 2018-08-23T19:12:13Z | 2024-05-10T03:17:40Z | https://github.com/phpMussel/phpMussel/issues/167 | 353,515,512 | 167 | 1,272 |
CVE-2020-12725 | 2020-06-11T19:15:10.000 | Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting a... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://blog.redash.io"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/getredash/redash/commits/master"
},
{
"source": "cve@mitre.org"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E6EF81-37F5-42AC-A33F-3A8A7D1971C4",
"versionEndExcluding": null,
"versionEndIncluding": "8.0.0",
"versionStartExcluding... | [
"918"
] | 918 | https://github.com/getredash/redash/issues/4869 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"getredash",
"redash"
] | # Summary
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source version. Possibly, other connectors are affected however the JSON data source provides a lot of flexibility in terms of being able to craft HTTP requests eg., by adding headers, se... | CVE-2020-12725 - Authenticated Server-Side Request Forgery (SSRF) in the JSON data source / internal addresses restriction bypass | https://api.github.com/repos/getredash/redash/issues/4869/comments | 4 | 2020-05-07T10:53:13Z | 2020-06-15T10:25:00Z | https://github.com/getredash/redash/issues/4869 | 613,961,475 | 4,869 | 1,273 |
CVE-2020-10732 | 2020-06-12T14:15:11.277 | A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F9567FB-F394-443B-9A95-1DA060A9CCA6",
"versionEndExcluding": "3.16.85",
"versionEndIncluding": null,
"versionStartEx... | [
"908"
] | 908 | https://github.com/google/kmsan/issues/76 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"google",
"kmsan"
] | While fuzzing latest KMSAN-build with HEALER(syscall fuzzer, not published yet), uninit-value is found in kmsan_handle_dma. It seems KMSAN found bugs in itself.
Caused by this call sequence [syscalls.txt](https://github.com/google/kmsan/files/4496358/syscalls.txt).
With this crash [msg.txt](https://github.com/goog... | BUG: KMSAN: uninit-value in kmsan_handle_dma | https://api.github.com/repos/google/kmsan/issues/76/comments | 8 | 2020-04-18T09:13:03Z | 2020-09-17T09:24:49Z | https://github.com/google/kmsan/issues/76 | 602,416,429 | 76 | 1,274 |
CVE-2020-14061 | 2020-06-14T20:15:10.027 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnect... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2698"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0",
"versionEndExcluding": "2.9.10.5",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2698 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `aqapi.jar` library, included in Weblogic (for Oracle AQ/JMS support).
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-14061
Reporter(s): F... | Block one more gadget type (weblogic/oracle-aqjms, CVE-2020-14061) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2698/comments | 0 | 2020-04-25T02:27:29Z | 2020-07-16T17:22:34Z | https://github.com/FasterXML/jackson-databind/issues/2698 | 606,669,819 | 2,698 | 1,275 |
CVE-2020-14062 | 2020-06-14T20:15:10.167 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2704"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0",
"versionEndExcluding": "2.9.10.5",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2704 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `com.sun.xml.parsers:jaxp-ri` (in shaded copy of Xalan2).
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-14062
Reporter(s): XuYuanzhen fro... | Block one more gadget type (jaxp-ri, CVE-2020-14062) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2704/comments | 0 | 2020-04-30T00:43:03Z | 2020-07-16T17:22:25Z | https://github.com/FasterXML/jackson-databind/issues/2704 | 609,469,620 | 2,704 | 1,276 |
CVE-2020-14060 | 2020-06-14T21:15:09.817 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2688"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.or... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0",
"versionEndExcluding": "2.9.10.5",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2688 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `org.apache.drill.exec:drill-jdbc-all`. library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-14060
Reporter(s): Topsec(tcc) from Alphalab... | Block one more gadget type (apache-drill, CVE-2020-14060) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2688/comments | 0 | 2020-04-16T15:11:49Z | 2020-08-24T22:25:58Z | https://github.com/FasterXML/jackson-databind/issues/2688 | 601,148,139 | 2,688 | 1,277 |
CVE-2017-18869 | 2020-06-15T15:15:09.317 | A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985"
},
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614"
},
{... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chownr_project:chownr:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BA4EAB96-893F-489C-B2A1-C677624250D6",
"versionEndExcluding": "1.1.0",
"versionEndIncluding": null,
"version... | [
"367"
] | 367 | https://github.com/isaacs/chownr/issues/14 | [
"Third Party Advisory"
] | github.com | [
"isaacs",
"chownr"
] | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985#10 | This package appears to have a TOCTOU bug | https://api.github.com/repos/isaacs/chownr/issues/14/comments | 23 | 2017-07-02T07:22:36Z | 2019-01-04T19:26:02Z | https://github.com/isaacs/chownr/issues/14 | 239,994,436 | 14 | 1,278 |
CVE-2020-14153 | 2020-06-15T17:15:10.637 | In IJG JPEG (aka libjpeg) from version 8 through 9c, jdhuff.c has an out-of-bounds array read for certain table pointers. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://www.ijg.org/files/jpegsrc.v9d.tar.gz"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/727908"
},
{
"source": "cve@mit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ijg:libjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8B6F197-0A40-4DA0-A5CF-BFEC3763A2F7",
"versionEndExcluding": null,
"versionEndIncluding": "9c",
"versionStartExcluding": nu... | [
"125"
] | 125 | https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libjpeg-turbo",
"libjpeg-turbo"
] | https://nvd.nist.gov/vuln/detail/CVE-2020-14153
https://security-tracker.debian.org/tracker/CVE-2020-14153
My best guess is that this is fixed in the following change in jpeg 9d:
```
/* Precalculate which table to use for each block */
entropy->dc_cur_tbls[blkn] = entropy->dc_derived_tbls[compptr->... | Is CVE-2020-14153 present in libjpeg-turbo? | https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/445/comments | 2 | 2020-07-27T14:47:40Z | 2020-07-27T17:56:12Z | https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445 | 666,353,637 | 445 | 1,279 |
CVE-2020-14148 | 2020-06-15T18:15:15.067 | The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ngircd/ngircd/issues/274"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ngircd/ngircd/issues/277"
},
{
"source": "cve@m... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:barton:ngircd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A04351C-B842-4BD8-97EC-30534FA95055",
"versionEndExcluding": null,
"versionEndIncluding": "25.0",
"versionStartExcluding"... | [
"125"
] | 125 | https://github.com/ngircd/ngircd/issues/274 | [
"Third Party Advisory"
] | github.com | [
"ngircd",
"ngircd"
] | I have been fuzzing ngircd using AFL a bit, based on inputs that are used in the testsuite. AFL has found input that can be used to crash a server that has been built with `--with-iconv`. My current hypothesis is that the crash happens because the `iconv_t` context that is passed into `iconv` is invalid (i.e. has not b... | iconv-related crash (AFL) | https://api.github.com/repos/ngircd/ngircd/issues/274/comments | 2 | 2020-05-10T16:39:55Z | 2023-01-02T14:31:25Z | https://github.com/ngircd/ngircd/issues/274 | 615,429,224 | 274 | 1,280 |
CVE-2020-14148 | 2020-06-15T18:15:15.067 | The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ngircd/ngircd/issues/274"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ngircd/ngircd/issues/277"
},
{
"source": "cve@m... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:barton:ngircd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A04351C-B842-4BD8-97EC-30534FA95055",
"versionEndExcluding": null,
"versionEndIncluding": "25.0",
"versionStartExcluding"... | [
"125"
] | 125 | https://github.com/ngircd/ngircd/issues/277 | [
"Third Party Advisory"
] | github.com | [
"ngircd",
"ngircd"
] | I have found an out-of-bounds error by fuzzing ngircd using AFL and libdislocate (a custom memory allocator). `Conn_Write` is called with `Idx=-1` which leads to a crash when accessing `My_Connections[Idx].sock`.
The binary is built from `rel-26-rc1` with patches to fix #275 and #276 and `__AFL_INIT()` patched into... | Conn_Write: out-of-bounds index access (AFL + libdislocate) | https://api.github.com/repos/ngircd/ngircd/issues/277/comments | 2 | 2020-05-12T18:35:15Z | 2023-01-02T14:31:37Z | https://github.com/ngircd/ngircd/issues/277 | 616,871,665 | 277 | 1,281 |
CVE-2020-14149 | 2020-06-15T18:15:15.147 | In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": null,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.gentoo.org/726308"
},
{
"source": "cve@... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:troglobit:uftpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCA9C907-3944-4BA8-957C-7292B017966C",
"versionEndExcluding": "2.12",
"versionEndIncluding": null,
"versionStartExcludin... | [
"476"
] | 476 | https://github.com/troglobit/uftpd/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"troglobit",
"uftpd"
] | Hi!
I found a bug that crashes the forked child pre-authenticated. The details are as follows:
## Triggering the Bug
```shell
root@5829efcb25f7:/opt/uftpd# uftpd -v
2.11
root@5829efcb25f7:/opt/uftpd# uftpd -n /tmp
root@5829efcb25f7:/opt# nc 127.0.0.1 21
220 uftpd (2.11) ready.
CWD /../../../../.... | Null Pointer Dereference / Crash | https://api.github.com/repos/troglobit/uftpd/issues/30/comments | 1 | 2020-05-21T14:54:52Z | 2020-05-22T06:44:25Z | https://github.com/troglobit/uftpd/issues/30 | 622,557,607 | 30 | 1,282 |
CVE-2020-14156 | 2020-06-15T18:15:15.207 | user_channel/passwd_mgr.cpp in OpenBMC phosphor-host-ipmid before 2020-04-03 does not ensure that /etc/ipmi-pass has strong file permissions. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/openbmc/openbmc/issues/3670"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/openbmc/phosphor-host-ipmid/commit/b2... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbmc-project:openbmc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE58FF9E-003C-46AB-9FCE-2A21807009C7",
"versionEndExcluding": "2020-04-03",
"versionEndIncluding": null,
"versio... | [
"276"
] | 276 | https://github.com/openbmc/openbmc/issues/3670 | [
"Third Party Advisory"
] | github.com | [
"openbmc",
"openbmc"
] | OpenBMC Security Advisory
Title: CVE-2020-14156. Network IPMI before 2020-04-03 does not ensure the `/etc/ipmi_pass` file has strong file permissions.
The `/etc/ipmi_pass` file was created with world-readable permission. Any user with SSH or SCP access to the BMC can read and decode the credentials and escalate... | Security Advisory for CVE-2020-14156 - Network IPMI file permissions | https://api.github.com/repos/openbmc/openbmc/issues/3670/comments | 2 | 2020-06-15T14:49:16Z | 2020-08-17T13:31:48Z | https://github.com/openbmc/openbmc/issues/3670 | 638,914,866 | 3,670 | 1,283 |
CVE-2020-14163 | 2020-06-15T21:15:10.553 | An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | [
"125"
] | 125 | https://github.com/jerryscript-project/jerryscript/issues/3804 | [
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
7a20150ae747742c178e7d61bb4b3c71476925e2
###### Build platform
Ubuntu 18.04.4 LTS (Linux 4.15.0-91-generic x86_64)
and
ProductName: Mac OS X
ProductVersion: 10.15.4
BuildVersion: 19E287
###### Build steps
```sh
python tools/build.py --profile=es2015-subset --lto=off --com... | Memory corruption in ecma_gc_set_object_visited (jerry-core/ecma/base/ecma-gc.c:85) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/3804/comments | 0 | 2020-05-27T18:29:22Z | 2020-05-28T05:55:17Z | https://github.com/jerryscript-project/jerryscript/issues/3804 | 625,930,295 | 3,804 | 1,284 |
CVE-2020-14195 | 2020-06-16T16:15:11.107 | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-databind/issues/2765"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0",
"versionEndExcluding": "2.9.10.5",
"versionEndIncluding": null,
"versi... | [
"502"
] | 502 | https://github.com/FasterXML/jackson-databind/issues/2765 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-databind"
] | Another gadget type(s) reported regarding class(es) of `org.jsecurity:jsecurity`. library.
See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem.
Mitre id: CVE-2020-14195
Reporter(s): Al1ex@knownsec
Fix will likely be i... | Block one more gadget type (org.jsecurity, CVE-2020-14195) | https://api.github.com/repos/FasterXML/jackson-databind/issues/2765/comments | 0 | 2020-06-13T23:22:50Z | 2020-07-16T17:22:08Z | https://github.com/FasterXML/jackson-databind/issues/2765 | 638,251,364 | 2,765 | 1,285 |
CVE-2020-10268 | 2020-06-16T18:15:17.027 | Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs to be performed. Be noted that this only can be accomplished either by a Kuka technician or by Kuka issued calibration hardware that interfaces with the manipu... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2550"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:kuka:kr_c4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "377A0187-FEE3-48BB-A225-30B13FBC3EF9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"749"
] | 749 | https://github.com/aliasrobotics/RVD/issues/2550 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
{
"id": 2550,
"title": "RVD#2550: Terminate Critical Services in KUKA controller KR C4",
"type": "Vulnerability",
"description": "Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs ... | RVD#2550: Terminate Critical Services in KUKA controller KR C4 | https://api.github.com/repos/aliasrobotics/RVD/issues/2550/comments | 0 | 2020-06-16T17:22:11Z | 2020-06-19T07:29:29Z | https://github.com/aliasrobotics/RVD/issues/2550 | 639,842,815 | 2,550 | 1,286 |
CVE-2020-14295 | 2020-06-17T14:15:10.617 | A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTI... | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cacti:cacti:1.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "697145F3-CB18-45CF-9671-148B10B2F3F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"89"
] | 89 | https://github.com/Cacti/cacti/issues/3622 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Cacti",
"cacti"
] | # sqli as admin v1.2.12
There is an sql injection on the latest version (in the /cacti/color.php page on the parameter filter.
## To Reproduce
Steps to reproduce the behavior:
call `/cacti/color.php?action=export&header=false&filter=')<SQLI HERE>--+-`
 | https://api.github.com/repos/Cacti/cacti/issues/3622/comments | 13 | 2020-06-17T07:02:46Z | 2020-10-11T00:06:05Z | https://github.com/Cacti/cacti/issues/3622 | 640,193,667 | 3,622 | 1,287 |
CVE-2018-21247 | 2020-06-17T16:15:11.367 | An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A03A7282-D445-4E26-98A0-6A1597838D35",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.12",
"versio... | [
"909"
] | 909 | https://github.com/LibVNC/libvncserver/issues/253 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibVNC",
"libvncserver"
] | ConnectToRFBRepeater https://github.com/LibVNC/libvncserver/blob/79516a6aa3e875c8d9f4c83667076aa070fe5d6e/libvncclient/rfbproto.c#L401 function leaks memory, because `tmphost` buffer is filled by using `snprintf` function, but after buffer is being sent back to client using `WriteToRFBServer(client, tmphost, sizeof(tmp... | SECURITY: memory leak in libvncclient in ConnectToRFBRepeater function | https://api.github.com/repos/LibVNC/libvncserver/issues/253/comments | 0 | 2018-09-11T15:29:14Z | 2018-09-29T18:55:31Z | https://github.com/LibVNC/libvncserver/issues/253 | 359,100,627 | 253 | 1,288 |
CVE-2020-14408 | 2020-06-17T20:15:10.117 | An issue was discovered in Agentejo Cockpit 0.10.2. Insufficient sanitization of the to parameter in the /auth/login route allows for injection of arbitrary JavaScript code into a web page's content, creating a Reflected XSS attack vector. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/agentejo/cockpit/issues/1310"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://githu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:agentejo:cockpit:0.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4251B1B-6FD9-4351-BD19-1EC433B1BE8E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/agentejo/cockpit/issues/1310 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"agentejo",
"cockpit"
] | Insufficient sanitization of `to` parameter in `/auth/login` route allows for injection of arbitrary JavaScript code into webpage content creating a reflected XSS attack vector.
See below POC :
```
https://cms.hosted.com/auth/login?to=/92874%27;alert(%27reflected%20xss!\ncookie:%20%27%2bdocument.cookie)//280
``` | Reflected XSS in login panel | https://api.github.com/repos/agentejo/cockpit/issues/1310/comments | 0 | 2020-06-17T11:03:12Z | 2020-06-17T12:01:46Z | https://github.com/agentejo/cockpit/issues/1310 | 640,351,730 | 1,310 | 1,289 |
CVE-2020-12883 | 2020-06-18T19:15:09.893 | Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-coap/pull/116"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-os/issues/12925"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/ARMmbed/mbed-os/issues/12925 | [
"Third Party Advisory"
] | github.com | [
"ARMmbed",
"mbed-os"
] | ### Description of defect
**References:**
https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap
https://github.com/ARMmbed/mbed-coap/tree/v5.1.5
**File:**
[sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m... | Out of range memory access in MbedOS CoAP library parser | https://api.github.com/repos/ARMmbed/mbed-os/issues/12925/comments | 3 | 2020-05-05T20:59:22Z | 2020-07-02T09:31:16Z | https://github.com/ARMmbed/mbed-os/issues/12925 | 612,891,401 | 12,925 | 1,290 |
CVE-2020-12883 | 2020-06-18T19:15:09.893 | Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-coap/pull/116"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-os/issues/12925"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/ARMmbed/mbed-os/issues/12926 | [
"Third Party Advisory"
] | github.com | [
"ARMmbed",
"mbed-os"
] | ### Description of defect
**References:**
https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap
https://github.com/ARMmbed/mbed-coap/tree/v5.1.5
**File:**
[sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m... | Out of range memory access in MbedOS CoAP library parser - option number | https://api.github.com/repos/ARMmbed/mbed-os/issues/12926/comments | 2 | 2020-05-05T21:02:26Z | 2020-11-04T17:41:49Z | https://github.com/ARMmbed/mbed-os/issues/12926 | 612,893,067 | 12,926 | 1,291 |
CVE-2020-12883 | 2020-06-18T19:15:09.893 | Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-coap/pull/116"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-os/issues/12925"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/ARMmbed/mbed-os/issues/12927 | [
"Third Party Advisory"
] | github.com | [
"ARMmbed",
"mbed-os"
] | ### Description of defect
**References:**
https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap
https://github.com/ARMmbed/mbed-coap/tree/v5.1.5
**File:**
[sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m... | Out of range memory access in MbedOS CoAP library parser - option value length | https://api.github.com/repos/ARMmbed/mbed-os/issues/12927/comments | 2 | 2020-05-05T21:04:21Z | 2020-07-02T09:28:36Z | https://github.com/ARMmbed/mbed-os/issues/12927 | 612,894,091 | 12,927 | 1,292 |
CVE-2020-12884 | 2020-06-18T19:15:09.973 | A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options that may occur multiple consecutive times in a single packet. While processing the options, pack... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-coap/pull/116"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-os/issues/12928"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/ARMmbed/mbed-os/issues/12928 | [
"Third Party Advisory"
] | github.com | [
"ARMmbed",
"mbed-os"
] | ### Description of defect
**References:**
https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap
https://github.com/ARMmbed/mbed-coap/tree/v5.1.5
**File:**
[sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m... | Out of range memory access in MbedOS CoAP library parser - sn_coap_parser_options_parse_multiple_options | https://api.github.com/repos/ARMmbed/mbed-os/issues/12928/comments | 2 | 2020-05-05T21:05:47Z | 2020-07-02T09:34:51Z | https://github.com/ARMmbed/mbed-os/issues/12928 | 612,894,830 | 12,928 | 1,293 |
CVE-2020-12885 | 2020-06-18T19:15:10.050 | An infinite loop was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options in a while loop. This loop's exit condition is computed using the previously allocated heap memory... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-coap/pull/116"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-os/issues/12929"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"835"
] | 835 | https://github.com/ARMmbed/mbed-os/issues/12929 | [
"Third Party Advisory"
] | github.com | [
"ARMmbed",
"mbed-os"
] | ### Description of defect
**References:**
https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap
https://github.com/ARMmbed/mbed-coap/tree/v5.1.5
**File:**
[sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m... | Infinite loop in MbedOS CoAP library parser | https://api.github.com/repos/ARMmbed/mbed-os/issues/12929/comments | 4 | 2020-05-05T21:08:59Z | 2020-05-28T15:21:43Z | https://github.com/ARMmbed/mbed-os/issues/12929 | 612,896,526 | 12,929 | 1,294 |
CVE-2020-12886 | 2020-06-18T19:15:11.567 | A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses the CoAP packet header starting from the message token. The length of the token in the received message is provided in the fir... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-coap/pull/116"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ARMmbed/mbed-os/issues/12948"
},
{
"source": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/ARMmbed/mbed-os/issues/12948 | [
"Third Party Advisory"
] | github.com | [
"ARMmbed",
"mbed-os"
] | ### Description of defect
**References:**
https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap
https://github.com/ARMmbed/mbed-coap/tree/v5.1.5
**File:**
[sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m... | Out of range memory access in MbedOS CoAP library parser - token length not validated | https://api.github.com/repos/ARMmbed/mbed-os/issues/12948/comments | 1 | 2020-05-08T18:10:34Z | 2020-07-02T09:31:10Z | https://github.com/ARMmbed/mbed-os/issues/12948 | 614,898,715 | 12,948 | 1,295 |
CVE-2020-14462 | 2020-06-19T12:15:11.193 | CALDERA 2.7.0 allows XSS via the Operation Name box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mitre/caldera/issues/1755"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mitre:caldera:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "61EF0CDC-CB5F-416D-BC17-7DA2ACF784CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludin... | [
"79"
] | 79 | https://github.com/mitre/caldera/issues/1755 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mitre",
"caldera"
] | Hello,
I was playing with your framework when i came across a XSS in the Operation Name box:
payload: <script>alert()</script>

I have no idea if you guys are interested in that type of vulnerability ... | [Security] Cross Site Scripting in the operation name value | https://api.github.com/repos/mitre/caldera/issues/1755/comments | 3 | 2020-06-15T13:33:47Z | 2020-07-18T20:54:04Z | https://github.com/mitre/caldera/issues/1755 | 638,858,369 | 1,755 | 1,298 |
CVE-2020-14470 | 2020-06-19T16:15:10.983 | In Octopus Deploy 2018.8.0 through 2019.x before 2019.12.2, an authenticated user with could trigger a deployment that leaks the Helm Chart repository password. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/issues/6438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/OctopusDeploy/Issues/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42BAC346-1A6F-48B0-A0C1-8D420011E67C",
"versionEndExcluding": "2019.12.2",
"versionEndIncluding": null,
"versionS... | [
"532"
] | 532 | https://github.com/OctopusDeploy/Issues/issues/6438 | [
"Third Party Advisory"
] | github.com | [
"OctopusDeploy",
"Issues"
] | # Prerequisites
- [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy).
- [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w... | Helm chart download can leak feed password | https://api.github.com/repos/OctopusDeploy/Issues/issues/6438/comments | 5 | 2020-06-19T04:37:00Z | 2020-06-24T05:23:29Z | https://github.com/OctopusDeploy/Issues/issues/6438 | 641,698,080 | 6,438 | 1,299 |
CVE-2020-14927 | 2020-06-19T17:15:18.303 | Navigate CMS 2.9 allows XSS via the Alias or Real URL field of the "Web Sites > Create > Aliases > Add" screen. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/NavigateCMS/Navigate-CMS/issues/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Adviso... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:naviwebs:navigate_cms:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5B84FCB0-AA74-4258-B186-491AB6AC304D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"79"
] | 79 | https://github.com/NavigateCMS/Navigate-CMS/issues/19 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"NavigateCMS",
"Navigate-CMS"
] | **Expected behaviour**
An authenticated malicious user can take advantage of a Reflected XSS vulnerability in the **name=**"**Aliases**" feature.
**Impact**
Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the ... | Cross Site Script Vulnerability NavigateCMS 2.9 | https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/19/comments | 1 | 2020-06-19T04:43:11Z | 2020-06-19T07:52:27Z | https://github.com/NavigateCMS/Navigate-CMS/issues/19 | 641,699,890 | 19 | 1,300 |
CVE-2020-14931 | 2020-06-19T22:15:13.163 | A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jaygreig86/dmitry/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dmitry_project:dmitry:1.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1678D5E3-D98D-4EDB-8611-9A1BECFE0325",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartE... | [
"787"
] | 787 | https://github.com/jaygreig86/dmitry/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jaygreig86",
"dmitry"
] | Continuing my analysis, this software is also vulnerable to stack overflows triggered by responses from WHOIS servers, which is dangerous since these connections are unencrypted TCP.
This is distinctly different from CVE-2017-7938 because the attack vector is a remote adversary (not local), either controlling the WH... | Remote Stack Overflow (possible RCE) | https://api.github.com/repos/jaygreig86/dmitry/issues/4/comments | 1 | 2020-06-19T16:45:09Z | 2020-07-02T14:54:22Z | https://github.com/jaygreig86/dmitry/issues/4 | 642,103,179 | 4 | 1,301 |
CVE-2020-14942 | 2020-06-21T15:15:10.903 | Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tendenci/tendenci/issues/867"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tendenci/tendenci/issues/867... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tendenci:tendenci:12.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B71B64BD-B2E6-48DD-829E-BAF28E712648",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartEx... | [
"502"
] | 502 | https://github.com/tendenci/tendenci/issues/867 | [
"Third Party Advisory"
] | github.com | [
"tendenci",
"tendenci"
] | `tendenci\apps\helpdesk\views\staff.py`
There is no limit to the input of the pickle called, there will be problems
```
def ticket_list(request):
context = {}
......
if request.GET.get('saved_query', None):
from_saved_query = True
try:
saved_query = SavedSear... | Unrestricted deserialization | https://api.github.com/repos/tendenci/tendenci/issues/867/comments | 5 | 2020-06-19T05:57:47Z | 2020-12-04T19:17:54Z | https://github.com/tendenci/tendenci/issues/867 | 641,725,716 | 867 | 1,302 |
CVE-2020-14966 | 2020-06-22T12:15:10.087 | An issue was discovered in the jsrsasign package through 8.0.18 for Node.js. It allows a malleability in ECDSA signatures by not checking overflows in the length of a sequence and '0' characters appended or prepended to an integer. The modified signatures are verified as valid. This could have a security-relevant impac... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kjur/jsrsasign/issues/437"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "435B4E0A-10B0-41B8-B6DA-454D375C127D",
"versionEndExcluding": null,
"versionEndIncluding": "8.0.18",
"... | [
"347"
] | 347 | https://github.com/kjur/jsrsasign/issues/437 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kjur",
"jsrsasign"
] | Hello,
I've found that jsrsasign 8.0.16 allows a certain degree of malleability in ECDSA signatures by
not checking overflows in the length of sequence and 0s appended or prepended to an integer.
Using the secp256r1 curve it its possible to verify this issue using the following test vectors of Google Wycheproof... | Lack of encoding checking in jsrsasign allows a certain degree of malleability in ECDSA signatures | https://api.github.com/repos/kjur/jsrsasign/issues/437/comments | 2 | 2020-06-06T18:11:17Z | 2020-08-24T23:05:44Z | https://github.com/kjur/jsrsasign/issues/437 | 632,639,446 | 437 | 1,303 |
CVE-2020-14967 | 2020-06-22T12:15:10.150 | An issue was discovered in the jsrsasign package before 8.0.18 for Node.js. Its RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification by prepending '\0' bytes to ciphertexts (it decrypts modified ciphertexts without error). An attacker might prepend these bytes with the goal of triggering mem... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kjur/jsrsasign/issues/439"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "6DDC5099-39B1-4D97-BF5E-9E6458481AAC",
"versionEndExcluding": "8.0.18",
"versionEndIncluding": null,
"... | [
"119"
] | 119 | https://github.com/kjur/jsrsasign/issues/439 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kjur",
"jsrsasign"
] | The jsrsasign 8.0.16 RSA PKCS1 v1.5 decryption implementation does not detect prepended 0's bytes to the ciphertext and accepts modified ciphertexts without error.
You can verify this using the following test vectors from Google Wycheproof:
```
{
"algorithm" : "RSAES-PKCS1-v1_5",
"generatorVersion" : "0.8r... | The RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification (prepended 0's bytes to the ciphertext) | https://api.github.com/repos/kjur/jsrsasign/issues/439/comments | 3 | 2020-06-06T18:19:15Z | 2020-08-18T10:34:28Z | https://github.com/kjur/jsrsasign/issues/439 | 632,645,335 | 439 | 1,304 |
CVE-2020-14968 | 2020-06-22T12:15:10.227 | An issue was discovered in the jsrsasign package before 8.0.17 for Node.js. Its RSASSA-PSS (RSA-PSS) implementation does not detect signature manipulation/modification by prepending '\0' bytes to a signature (it accepts these modified signatures as valid). An attacker can abuse this behavior in an application by creati... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kjur/jsrsasign/issues/438"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://g... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "2C7116EE-0321-40CF-94E7-EF494E9DF12C",
"versionEndExcluding": "8.0.17",
"versionEndIncluding": null,
"... | [
"119"
] | 119 | https://github.com/kjur/jsrsasign/issues/438 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kjur",
"jsrsasign"
] | The jsrsasign 8.0.16 RSASSA-PSS (RSA-PSS) implementation does not detect prepending 0s to the signature and accepts modifies signatures with prepended 0's as valid.
You can verify this using the following test vectors from Google Wycheproof:
```
{
"algorithm" : "RSASSA-PSS",
"generatorVersion" : "0.8r12",
... | The RSA-PSS implementation does not detect signature modification (prepending "0" bytes) to the signature | https://api.github.com/repos/kjur/jsrsasign/issues/438/comments | 3 | 2020-06-06T18:15:25Z | 2020-08-18T10:36:20Z | https://github.com/kjur/jsrsasign/issues/438 | 632,642,479 | 438 | 1,305 |
CVE-2020-4068 | 2020-06-22T16:15:11.870 | In APNSwift 1.0.0, calling APNSwiftSigner.sign(digest:) is likely to result in a heap buffer overflow. This has been fixed in 1.0.1. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/kylebrowning/APNSwift/commit/97fa7f69dcdd89168fff84e0ba8f999881ee3d3f"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.c... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apnswift_project:apnswift:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15C15C89-986E-4A2C-AB33-92A3C5417759",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionS... | [
"122"
] | 122 | https://github.com/kylebrowning/APNSwift/issues/31 | [
"Issue Tracking"
] | github.com | [
"kylebrowning",
"APNSwift"
] | **Describe the bug**
This looks like quite a serious bug, the test suite is failing address sanitizer:
```
Test Suite 'All tests' started at 2019-07-22 11:43:35.772 am
Test Suite 'apnswiftPackageTests.xctest' started at 2019-07-22 11:43:35.773 am
Test Suite 'APNSwiftConfigurationTests' started at 2019-07-22 11:4... | memory unsafety -- address sanitizer failure | https://api.github.com/repos/swift-server-community/APNSwift/issues/31/comments | 0 | 2019-07-22T13:01:29Z | 2019-07-23T17:27:08Z | https://github.com/swift-server-community/APNSwift/issues/31 | 471,082,442 | 31 | 1,306 |
CVE-2020-14983 | 2020-06-22T20:15:11.380 | The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": ... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chocolate-doom:chocolate_doom:3.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "8A0A032A-7DAA-4ECA-AEA1-6A53174ED24C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"vers... | [
"120"
] | 120 | https://github.com/chocolate-doom/chocolate-doom/issues/1293 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"chocolate-doom",
"chocolate-doom"
] | ### Background
Version of Chocolate Doom:
- Chocolate Doom 3.0.0 (from the website)
- Chocolate Doom git revision 5bf73c4864fedb6b97b27bf302435a1168ba8f4c
- confirmed also in: Crispy Doom 5.8.0
Operating System and version: Ubuntu 18.04 x86-64
Compilation: `CFLAGS="-fsanitize=address -ggdb -O0" LDFLAGS="... | Missing server-side num_players validation leading to buffer overflow | https://api.github.com/repos/chocolate-doom/chocolate-doom/issues/1293/comments | 13 | 2020-06-22T16:20:12Z | 2020-07-01T15:42:53Z | https://github.com/chocolate-doom/chocolate-doom/issues/1293 | 643,203,302 | 1,293 | 1,307 |
CVE-2020-10269 | 2020-06-24T05:15:12.647 | One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). This information is al... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2566"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
"ver... | [
"798"
] | 798 | https://github.com/aliasrobotics/RVD/issues/2566 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2566
title: 'RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point'
type: vulnerability
description: One of the wireless interfaces within MiR100, MiR200 and possibly (according
to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access
Point) mode. Credentials t... | RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point | https://api.github.com/repos/aliasrobotics/RVD/issues/2566/comments | 0 | 2020-06-24T04:59:00Z | 2020-07-10T06:38:08Z | https://github.com/aliasrobotics/RVD/issues/2566 | 644,318,586 | 2,566 | 1,308 |
CVE-2020-10270 | 2020-06-24T05:15:12.753 | Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This information is also ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2557"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
"ver... | [
"798"
] | 798 | https://github.com/aliasrobotics/RVD/issues/2557 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2557
title: 'RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard'
type: vulnerability
description: Out of the wired and wireless interfaces within MiR100, MiR200 and other
vehicles from the MiR fleet, it's possible to access the Control Dashboard on a
hardcoded IP address. Credentials to s... | RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard | https://api.github.com/repos/aliasrobotics/RVD/issues/2557/comments | 0 | 2020-06-24T04:43:23Z | 2020-07-10T06:38:05Z | https://github.com/aliasrobotics/RVD/issues/2557 | 644,313,367 | 2,557 | 1,309 |
CVE-2020-10271 | 2020-06-24T05:15:12.847 | MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2555"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
"ver... | [
"668"
] | 668 | https://github.com/aliasrobotics/RVD/issues/2555 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2555
title: 'RVD#2555: MiR ROS computational graph is exposed to all network interfaces,
including poorly secured wireless networks and open wired ones'
type: vulnerability
description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS)
default packages exposing the computati... | RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones | https://api.github.com/repos/aliasrobotics/RVD/issues/2555/comments | 0 | 2020-06-24T04:34:30Z | 2020-07-10T06:38:04Z | https://github.com/aliasrobotics/RVD/issues/2555 | 644,310,466 | 2,555 | 1,310 |
CVE-2020-10272 | 2020-06-24T05:15:12.943 | MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2554"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
"ver... | [
"306"
] | 306 | https://github.com/aliasrobotics/RVD/issues/2554 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2554
title: 'RVD#2554: MiR ROS computational graph presents no authentication mechanisms'
type: vulnerability
description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS)
default packages exposing the computational graph without any sort of authentication.
This allows atta... | RVD#2554: MiR ROS computational graph presents no authentication mechanisms | https://api.github.com/repos/aliasrobotics/RVD/issues/2554/comments | 0 | 2020-06-24T04:14:56Z | 2020-07-10T06:38:04Z | https://github.com/aliasrobotics/RVD/issues/2554 | 644,304,134 | 2,554 | 1,311 |
CVE-2020-10273 | 2020-06-24T05:15:13.020 | MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed i... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2560"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
"ver... | [
"312"
] | 312 | https://github.com/aliasrobotics/RVD/issues/2560 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2560
title: 'RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR)
controllers'
type: vulnerability
description: MiR controllers across firmware versions 2.8.1.1 and before do not encrypt
or protect in any way the intellectual property artifacts installed in the robots.
... | RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers | https://api.github.com/repos/aliasrobotics/RVD/issues/2560/comments | 0 | 2020-06-24T04:50:27Z | 2020-07-10T06:38:06Z | https://github.com/aliasrobotics/RVD/issues/2560 | 644,315,644 | 2,560 | 1,312 |
CVE-2020-10274 | 2020-06-24T05:15:13.113 | The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL"... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2556"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
... | [
"330"
] | 330 | https://github.com/aliasrobotics/RVD/issues/2556 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2556
title: 'RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers
(e.g. indoor maps)'
type: vulnerability
description: The access tokens for the REST API are directly derived (sha256 and base64
encoding) from the publicly available default credentials from the Control Dash... | RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps) | https://api.github.com/repos/aliasrobotics/RVD/issues/2556/comments | 0 | 2020-06-24T04:37:32Z | 2020-07-10T06:38:05Z | https://github.com/aliasrobotics/RVD/issues/2556 | 644,311,434 | 2,556 | 1,313 |
CVE-2020-10275 | 2020-06-24T05:15:13.193 | The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to co... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2565"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
... | [
"326"
] | 326 | https://github.com/aliasrobotics/RVD/issues/2565 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2565
title: 'RVD#2565: Weak token generation for the REST API.'
type: vulnerability
description: The access tokens for the REST API are directly derived from the publicly
available default credentials for the web interface. Given a USERNAME and a PASSWORD,
the token string is generated directly wi... | RVD#2565: Weak token generation for the REST API. | https://api.github.com/repos/aliasrobotics/RVD/issues/2565/comments | 0 | 2020-06-24T04:56:18Z | 2020-07-10T06:38:08Z | https://github.com/aliasrobotics/RVD/issues/2565 | 644,317,700 | 2,565 | 1,314 |
CVE-2020-10276 | 2020-06-24T05:15:13.270 | The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not af... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2558"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
... | [
"798"
] | 798 | https://github.com/aliasrobotics/RVD/issues/2558 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2558
title: 'RVD#2558: Default credentials on SICK PLC allows disabling safety features'
type: vulnerability
description: The password for the safety PLC is the default and thus easy to find
(in manuals, etc.). This allows a manipulated program to be uploaded to the safety
PLC, effectively disabli... | RVD#2558: Default credentials on SICK PLC allows disabling safety features | https://api.github.com/repos/aliasrobotics/RVD/issues/2558/comments | 0 | 2020-06-24T04:45:55Z | 2020-07-10T06:38:05Z | https://github.com/aliasrobotics/RVD/issues/2558 | 644,314,162 | 2,558 | 1,315 |
CVE-2020-10277 | 2020-06-24T05:15:13.347 | There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
... | [
"656"
] | 656 | https://github.com/aliasrobotics/RVD/issues/2562 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2562
title: 'RVD#2562: Booting from a live image leads to exfiltration of sensible information
and privilege escalation'
type: vulnerability
description: There is no mechanism in place to prevent a bad operator to boot from
a live OS image, this can lead to extraction of sensible files (such as th... | RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation | https://api.github.com/repos/aliasrobotics/RVD/issues/2562/comments | 0 | 2020-06-24T04:52:57Z | 2020-07-10T06:38:07Z | https://github.com/aliasrobotics/RVD/issues/2562 | 644,316,520 | 2,562 | 1,316 |
CVE-2020-10278 | 2020-06-24T05:15:13.443 | The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
"ver... | [
"287"
] | 287 | https://github.com/aliasrobotics/RVD/issues/2561 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2561
title: 'RVD#2561: Unprotected BIOS allows user to boot from live OS image.'
type: vulnerability
description: The BIOS onboard MiR's Computer is not protected by password, therefore,
it allows a Bad Operator to modify settings such as boot order. This can be leveraged
by a Malicious operator t... | RVD#2561: Unprotected BIOS allows user to boot from live OS image. | https://api.github.com/repos/aliasrobotics/RVD/issues/2561/comments | 0 | 2020-06-24T04:51:45Z | 2020-07-10T06:38:06Z | https://github.com/aliasrobotics/RVD/issues/2561 | 644,316,102 | 2,561 | 1,317 |
CVE-2020-10280 | 2020-06-24T06:15:11.620 | The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/2568"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60",
"versionEndExcluding": null,
"versionEndIncluding": "2.8.1.1",
... | [
"404"
] | 404 | https://github.com/aliasrobotics/RVD/issues/2568 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 2568
title: 'RVD#2568: Apache server is vulnerable to a DoS'
type: vulnerability
description: The Apache server on port 80 that host the web interface is vulnerable
to a DoS by spamming incomplete HTTP headers, effectively blocking the access to
the dashboard.
cwe: CWE-239
cve: CVE-2020-10280
k... | RVD#2568: Apache server is vulnerable to a DoS | https://api.github.com/repos/aliasrobotics/RVD/issues/2568/comments | 0 | 2020-06-24T05:44:10Z | 2020-07-10T06:38:09Z | https://github.com/aliasrobotics/RVD/issues/2568 | 644,335,617 | 2,568 | 1,319 |
CVE-2020-15006 | 2020-06-24T11:15:11.980 | Bludit 3.12.0 allows stored XSS via JavaScript code in an SVG document to bl-kernel/ajax/logo-upload.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/1212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Par... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"79"
] | 79 | https://github.com/bludit/bludit/issues/1212 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | ### Describe your problem
https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php
Logo upload only determines the suffix, but not the content, which causes XSS
and the user can inject any javascript and html code in the page
payload
;
session_start();
if(isset($_SESSION['ID']))
{
$email=$_SESSION['ID'];
}
else
{
$site= "<script type='text/javascript'>window.location='... | There is a csrf vulnerability in changepass.php file | https://api.github.com/repos/pramodmahato/BlogCMS/issues/1/comments | 0 | 2020-06-24T06:42:26Z | 2020-08-25T14:20:29Z | https://github.com/pramodmahato/BlogCMS/issues/1 | 644,361,707 | 1 | 1,321 |
CVE-2020-15018 | 2020-06-24T13:15:11.740 | playSMS through 1.4.3 is vulnerable to session fixation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/antonraharja/playSMS/issues/605"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:playsms:playsms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48CD3510-5247-4DC3-8462-A632A8CA1E5C",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.3",
"versionStartExcludi... | [
"384"
] | 384 | https://github.com/antonraharja/playSMS/issues/605 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"antonraharja",
"playSMS"
] | PlaySMS is vulnerable to Session fixation ( all versions, including the latest ). Due to the lack of randomization of the sessionID and reuse of sessionID (prior login, after login). An attacker can set the user's session and can take control of the user's account.
Steps to reproduce:
1. Login to PlaySMS ( Note ... | Session Fixation | https://api.github.com/repos/playsms/playsms/issues/605/comments | 1 | 2020-03-20T06:59:49Z | 2020-05-01T17:26:38Z | https://github.com/playsms/playsms/issues/605 | 584,879,228 | 605 | 1,322 |
CVE-2020-15026 | 2020-06-24T19:15:10.287 | Bludit 3.12.0 allows admins to use a /plugin-backup-download?file=../ directory traversal approach for arbitrary file download via backup/plugin.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/1214"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | [
"22"
] | 22 | https://github.com/bludit/bludit/issues/1214 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | ### **problem**
hi, The problem is in the backup plugin, the $file parameter is not filtered, resulting in arbitrary file downloads
### **recurrent**

### **repair**
[https://github.com/bludit/bludit/blob/... | Arbitrary file download vulnerability | https://api.github.com/repos/bludit/bludit/issues/1214/comments | 1 | 2020-06-23T03:25:01Z | 2020-06-23T17:59:50Z | https://github.com/bludit/bludit/issues/1214 | 643,500,132 | 1,214 | 1,323 |
CVE-2013-7489 | 2020-06-26T20:15:11.760 | The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2,
"confidentialityImpact... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850105"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bbangert/beaker/issues/... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:beakerbrowser:beaker:*:*:*:*:*:python:*:*",
"matchCriteriaId": "F00F62FC-5ED4-4E5A-8180-B7FFA99C67BF",
"versionEndExcluding": null,
"versionEndIncluding": "1.11.0",
"versionS... | [
"502"
] | 502 | https://github.com/bbangert/beaker/issues/191 | [
"Third Party Advisory"
] | github.com | [
"bbangert",
"beaker"
] | Hello,
Beaker uses Pickle on Session and Cache. On Session at least it has support to secret/HMAC but on caching it doesn't which can lead to arbitrary code execution.
https://github.com/bbangert/beaker/issues/35
Maybe it would be wise to expose data_serializer in Cache too and maybe even allow a secret defini... | Insecure data serialization method by default with pickle on Cache | https://api.github.com/repos/bbangert/beaker/issues/191/comments | 14 | 2020-05-14T18:02:40Z | 2022-07-11T16:26:00Z | https://github.com/bbangert/beaker/issues/191 | 618,431,819 | 191 | 1,324 |
CVE-2020-15365 | 2020-06-28T13:15:10.157 | LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LibRaw/LibRaw/iss... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libraw:libraw:0.20:beta3:*:*:*:*:*:*",
"matchCriteriaId": "91AB2B37-1EF7-4A77-86B8-122D7719D234",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclu... | [
"787"
] | 787 | https://github.com/LibRaw/LibRaw/issues/301 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibRaw",
"LibRaw"
] | **Description**
An out-of-bounds write vulnerability exists within the "LibRaw::parse_exif()" function (libraw\src\metadata\exif_gps.cpp) which can be triggered by changing the AtomName from "CMT1" to an unknown name and making the "tiff_nifds" field equals zero.
**Steps to Reproduce**
(poc archive password= ... | "LibRaw::parse_exif()" Out-of-bounds write vulnerability | https://api.github.com/repos/LibRaw/LibRaw/issues/301/comments | 1 | 2020-06-15T14:19:19Z | 2020-06-16T10:21:32Z | https://github.com/LibRaw/LibRaw/issues/301 | 638,892,456 | 301 | 1,325 |
CVE-2020-15362 | 2020-06-29T17:15:11.430 | wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/thingsSDK/wifiscanner/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://git... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thingssdk:wifiscanner:1.0.1:*:*:*:*:node.js:*:*",
"matchCriteriaId": "5740B6F4-9D59-420E-AEDA-842560F2B9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versio... | [
"78"
] | 78 | https://github.com/thingsSDK/wifiscanner/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"thingsSDK",
"wifiscanner"
] | This module can be used with options that can be used to overwrite default executable/binary path and arguments to the said executable/binary. An attacker can abuse this functionality to have the module execute a binary of their choice.
The following code snippets in the wifiscanner.js is responsible for the issue.
... | Remote Code Execution Bug due to Improper Input Sanitization | https://api.github.com/repos/thingsSDK/wifiscanner/issues/1/comments | 0 | 2020-06-11T03:20:43Z | 2020-06-11T03:20:43Z | https://github.com/thingsSDK/wifiscanner/issues/1 | 636,686,417 | 1 | 1,326 |
CVE-2020-4067 | 2020-06-29T20:15:10.413 | In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"u... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C96CC629-0987-4323-8C5D-37D26FFE603B",
"versionEndExcluding": "4.5.1.3",
"versionEndIncluding": null,
"versionStar... | [
"665"
] | 665 | https://github.com/coturn/coturn/issues/583 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"coturn",
"coturn"
] | Hi, I would like to report a (potentially exploitable) security issue in coturn, but I am not sure what the expected process is and if you desire to discuss this issue confidentially until it is resolved.
Regarding the criticality/impact: I am not completely sure, what the impact is, but I can imagine that this can ... | Reporting a security issue: CVE-2020-4067 | https://api.github.com/repos/coturn/coturn/issues/583/comments | 3 | 2020-06-17T10:12:53Z | 2020-06-29T19:31:22Z | https://github.com/coturn/coturn/issues/583 | 640,318,786 | 583 | 1,327 |
CVE-2020-15389 | 2020-06-29T21:15:14.150 | jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/uclouvain/openjpeg/issues/1261"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0142BF7B-EBFC-4EAD-87C8-7D0FFF7E9486",
"versionEndExcluding": null,
"versionEndIncluding": "2.3.1",
"versionStartExcl... | [
"416"
] | 416 | https://github.com/uclouvain/openjpeg/issues/1261 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"uclouvain",
"openjpeg"
] | There is a heap use-after-free vulnerability in openjpeg/build/bin/libopenjp2.so.7.
I would also like to request a CVE if that's okay or I can do it myself if you're busy, no worries.
Here is the ASAN output:
[out.txt](https://github.com/uclouvain/openjpeg/files/4842045/out.txt)
Here is the command executed t... | Heap use-after-free | https://api.github.com/repos/uclouvain/openjpeg/issues/1261/comments | 6 | 2020-06-28T10:06:42Z | 2020-06-30T20:05:15Z | https://github.com/uclouvain/openjpeg/issues/1261 | 646,886,328 | 1,261 | 1,328 |
CVE-2020-15470 | 2020-07-01T11:15:10.880 | ffjpeg through 2020-02-24 has a heap-based buffer overflow in jfif_decode in jfif.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008",
"versionEndExcluding": null,
"versionEndIncluding": "2020-02-24",
"versionStartE... | [
"787"
] | 787 | https://github.com/rockcarry/ffjpeg/issues/26 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | ffjpeg "jfif_decode()" function heap-overflow vulnerability
Description:
There is a heap-overflow bug in jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c : line 516.
An attacker can exploit this bug to cause a Denial of Service (DoS) by submitting a malicious jpeg image.
The bug is caused by the fol... | ffjpeg "jfif_decode()" function heap-overflow vulnerability | https://api.github.com/repos/rockcarry/ffjpeg/issues/26/comments | 3 | 2020-06-30T05:18:26Z | 2020-12-02T00:21:37Z | https://github.com/rockcarry/ffjpeg/issues/26 | 647,869,169 | 26 | 1,329 |
CVE-2020-15500 | 2020-07-01T23:15:10.333 | An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tileserver:tileservergl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96936A8C-DA3A-45DD-8105-D3B7AA4D4AA1",
"versionEndExcluding": null,
"versionEndIncluding": "3.0.0",
"versionStar... | [
"79"
] | 79 | https://github.com/maptiler/tileserver-gl/issues/461 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"maptiler",
"tileserver-gl"
] | Hi, I stumbled upon a reflected XSS in the software.
It stems from reflecting unsanitized user controller input directly to the HTTP response.
I initially observed this in Tileserver GL 2.5, but from the looks of it it's still present in the current `master`.
Vulnerable request example:
```
https://example.o... | Reflected XSS vulnerability in the application main page | https://api.github.com/repos/maptiler/tileserver-gl/issues/461/comments | 0 | 2020-07-01T17:12:34Z | 2020-07-02T07:50:50Z | https://github.com/maptiler/tileserver-gl/issues/461 | 649,140,488 | 461 | 1,331 |
CVE-2020-15502 | 2020-07-02T11:15:10.823 | The DuckDuckGo application through 5.58.0 for Android, and through 7.47.1.0 for iOS, sends hostnames of visited web sites within HTTPS .ico requests to servers in the duckduckgo.com domain, which might make visit data available temporarily at a Potentially Unwanted Endpoint. NOTE: the vendor has stated "the favicon ser... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/duckduckgo/Android/blob/e2f2d54a6b4452277467db403a3546512401b493/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L83-L88"
},
{
"source": "cve@mitre.org",
"tags": [... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:duckduckgo:duckduckgo:*:*:*:*:*:android:*:*",
"matchCriteriaId": "EB112090-6A82-49D0-B4C3-498308F273C2",
"versionEndExcluding": null,
"versionEndIncluding": "5.58.0",
"versio... | [
"200"
] | 200 | https://github.com/duckduckgo/Android/issues/527 | [
"Third Party Advisory"
] | github.com | [
"duckduckgo",
"Android"
] | https://github.com/duckduckgo/Android/blob/ed91c9e551d2a9e1559199f110bd94c076784c71/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L60
This seems to be leaking all(?) the domains that users visit to your servers. | Domains visited get leaked to DDG servers | https://api.github.com/repos/duckduckgo/Android/issues/527/comments | 96 | 2019-07-09T13:02:51Z | 2022-05-16T16:34:00Z | https://github.com/duckduckgo/Android/issues/527 | 465,768,374 | 527 | 1,332 |
CVE-2019-20894 | 2020-07-02T16:15:11.357 | Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/containous/traefik/issues/5312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Thir... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3797D3C-EEE8-4FC6-9B4A-43DDF66C92AF",
"versionEndExcluding": "2.0.1",
"versionEndIncluding": null,
"versionStartExcludi... | [
"295"
] | 295 | https://github.com/containous/traefik/issues/5312 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"containous",
"traefik"
] | ### Do you want to request a *feature* or report a *bug*?
Bug
### Did you try using a 1.7.x configuration for the version 2.0?
- [ ] Yes
- [x] No
### What did you do?
[Very good illustration](https://github.com/containous/traefik/issues/4260) of very related problem.
I have 2 ingress routes with kubern... | Mutual TLS verification skipped for established connection | https://api.github.com/repos/traefik/traefik/issues/5312/comments | 8 | 2019-09-06T13:32:38Z | 2020-08-08T00:00:03Z | https://github.com/traefik/traefik/issues/5312 | 490,330,116 | 5,312 | 1,333 |
CVE-2020-15091 | 2020-07-02T17:15:12.547 | TenderMint from version 0.33.0 and before version 0.33.6 allows block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it (**without changing chainID**). A malicious block proposer (even with a minimal amount of stake) can use t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4,
"confidentialityImpact": "NONE",
... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issu... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tendermint:tendermint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48BDDFA1-3EF9-4F28-9686-41B9A2898B79",
"versionEndExcluding": "0.33.6",
"versionEndIncluding": null,
"versionStart... | [
"347"
] | 347 | https://github.com/tendermint/tendermint/issues/4926 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tendermint",
"tendermint"
] | **Tendermint version**:
Tendermint Core Semantic Version: 0.33.3
P2P Protocol Version: 7
Block Protocol Version: 10
```
"node_info": {
"protocol_version": {
"p2p": "7",
"block": "10",
"app": "0"
},
"id": "dbc39feecf277f59b4b16ae277e8545c54ac244a",
"listen_addr": "tcp://0.... | Consensus: "enterPrevote: ProposalBlock is invalid" - Error: "wrong signature" | https://api.github.com/repos/tendermint/tendermint/issues/4926/comments | 17 | 2020-05-31T06:18:15Z | 2020-07-03T09:59:16Z | https://github.com/tendermint/tendermint/issues/4926 | 627,901,870 | 4,926 | 1,334 |
CVE-2020-7690 | 2020-07-06T13:15:10.610 | All affected versions <2.0.0 of package jspdf are vulnerable to Cross-site Scripting (XSS). It is possible to inject JavaScript code via the html method. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/MrRio/jsPDF/issues/2795"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-JSPDF-5752... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "386200BA-6CC6-42AD-8D2B-DBE8DAEAF822",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/MrRio/jsPDF/issues/2795 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"MrRio",
"jsPDF"
] | When using the html method, it is possible to inject code that is executed in the user context. E.g. like this:
```js
const doc = new jsPDF();
window.html2canvas = html2canvas;
const html = `
<p id='test'>a</p>
<img src=x onerror=eval("document.getElementById('test').innerHTML=window.location") />
`;
doc.html(h... | XSS vulnerability in html method | https://api.github.com/repos/parallax/jsPDF/issues/2795/comments | 4 | 2020-07-02T15:07:14Z | 2020-07-09T14:00:14Z | https://github.com/parallax/jsPDF/issues/2795 | 650,007,126 | 2,795 | 1,335 |
CVE-2020-15600 | 2020-07-07T22:15:10.317 | An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmsuno_project:cmsuno:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66BE864A-39B8-42BD-A115-0084D9A5F2DE",
"versionEndExcluding": "1.6.1",
"versionEndIncluding": null,
"versionStartE... | [
"352"
] | 352 | https://github.com/boiteasite/cmsuno/issues/15 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"boiteasite",
"cmsuno"
] | Affected software: Cmsuno CMS
Type of vulnerability: CSRF (Cross-Site Request Forgery)
Discovered by: Noth
Author: Noth
Version : v.1.6
Description: Cmsuno CMS is vulnerable to persistent Cross-Site Request Forgery attacks, which allow malicious users to inject HTML or scripts and forge user permissions... | CSRF Vulnerability v1.6 | https://api.github.com/repos/boiteasite/cmsuno/issues/15/comments | 7 | 2020-05-30T21:38:48Z | 2021-08-04T17:56:47Z | https://github.com/boiteasite/cmsuno/issues/15 | 627,827,921 | 15 | 1,336 |
CVE-2020-7692 | 2020-07-09T14:15:11.107 | PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able t... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url":... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:oauth_client_library_for_java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DDA599C-C892-4548-9C70-87191A82F42F",
"versionEndExcluding": "1.31.0",
"versionEndIncluding": null,
... | [
"863"
] | 863 | https://github.com/googleapis/google-oauth-java-client/issues/469 | [
"Third Party Advisory"
] | github.com | [
"googleapis",
"google-oauth-java-client"
] | I've been looking for information about how to enable PKCE when using the AuthorizationCodeFlow but haven't found anything.
Am I missing something or is PKCE not supported (out of the box) by this library? | PKCE support? | https://api.github.com/repos/googleapis/google-oauth-java-client/issues/469/comments | 7 | 2020-05-26T17:52:41Z | 2021-02-02T01:59:25Z | https://github.com/googleapis/google-oauth-java-client/issues/469 | 625,071,777 | 469 | 1,337 |
CVE-2020-7693 | 2020-07-09T14:15:11.197 | Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/andsnw/sockjs-dos-py"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sockjs/sockjs-node/commit... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sockjs_project:sockjs:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "3C576127-F274-4E41-ACA9-24E32CA01599",
"versionEndExcluding": "0.3.20",
"versionEndIncluding": null,
"versio... | [
"755"
] | 755 | https://github.com/sockjs/sockjs-node/issues/252 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"sockjs",
"sockjs-node"
] | On version 0.3.19 (and I believe in 0.4 also), when issuing upgrade request on wrong URL i.e. `/prefix/wrongpath`, `fake_response` calls `res.end()` in a `try..catch` block and then `res.end()` is being called for the second time in `handle_404` method - which throws... | ERR_STREAM_WRITE_AFTER_END when issuing upgrade request on non-existent URL | https://api.github.com/repos/sockjs/sockjs-node/issues/252/comments | 12 | 2019-02-11T10:19:37Z | 2020-03-06T20:41:42Z | https://github.com/sockjs/sockjs-node/issues/252 | 408,712,412 | 252 | 1,338 |
CVE-2020-11081 | 2020-07-10T19:15:11.553 | osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIA... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Trac... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxfoundation:osquery:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C2CBEA8-4F6B-429A-BBBC-4E7BA6BF5414",
"versionEndExcluding": "4.4.0",
"versionEndIncluding": null,
"versionStar... | [
"426"
] | 426 | https://github.com/osquery/osquery/issues/6426 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"osquery",
"osquery"
] | Hell osquery team,
As per facebook security team, they (Teddy) recommended to create issue here.
Title
Privilege Escalation Bug in Osquery 4.2.0 (windows) via Dll Hijacking
Vuln Type
Code Execution
Product Area
Open Source (e.g. HHVM)
Description/Impact
Complete Details
[This should be the longest... | Privilege Escalation Bug in Osquery 4.2.0 (windows) via Dll Search Order Hijacking | https://api.github.com/repos/osquery/osquery/issues/6426/comments | 15 | 2020-05-01T16:55:20Z | 2023-01-25T19:21:50Z | https://github.com/osquery/osquery/issues/6426 | 610,853,126 | 6,426 | 1,339 |
CVE-2020-10285 | 2020-07-15T21:15:12.193 | The authentication implementation on the xArm controller has very low entropy, making it vulnerable to a brute-force attack. There is no mechanism in place to mitigate or lockout automated attempts to gain access. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/3322"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.0",
"versi... | [
"331"
] | 331 | https://github.com/aliasrobotics/RVD/issues/3322 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 3322
title: 'RVD#3322: Weak authentication implementation make the system vulnerable to
a brute-force attack over adjacent networks'
type: vulnerability
description: The authentication implementation on the xArm controller has very low
entropy, making it vulnerable to a brute-force attack. There i... | RVD#3322: Weak authentication implementation make the system vulnerable to a brute-force attack over adjacent networks | https://api.github.com/repos/aliasrobotics/RVD/issues/3322/comments | 0 | 2020-07-15T20:55:50Z | 2020-07-15T20:57:07Z | https://github.com/aliasrobotics/RVD/issues/3322 | 657,649,760 | 3,322 | 1,340 |
CVE-2020-10286 | 2020-07-15T22:15:13.857 | the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to prevent sudo su or sudo -i to be run gaining unrestricted access to sensible files, encryption, or issue orders that disrupt robot operation. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact":... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/3323"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.0",
"versi... | [
"269"
] | 269 | https://github.com/aliasrobotics/RVD/issues/3323 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 3323
title: 'RVD#3323: Mismanaged permission implementation leads to privilege escalation,
exfiltration of sensitive information, and DoS'
type: vulnerability
description: "the main user account has restricted privileges but is in the sudoers
group and there is not any mechanism in place to preven... | RVD#3323: Mismanaged permission implementation leads to privilege escalation, exfiltration of sensitive information, and DoS | https://api.github.com/repos/aliasrobotics/RVD/issues/3323/comments | 0 | 2020-07-15T21:06:12Z | 2020-07-15T21:09:16Z | https://github.com/aliasrobotics/RVD/issues/3323 | 657,656,985 | 3,323 | 1,341 |
CVE-2020-10287 | 2020-07-15T23:15:11.283 | The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and conside... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/3326"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:abb:irb140_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D490DBD-AF3C-46EF-8CA0-6C113C7FF3A8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExclud... | [
"522"
] | 522 | https://github.com/aliasrobotics/RVD/issues/3326 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 3326
title: 'RVD#3326: Hardcoded default credentials on IRC 5 OPC Server'
type: exposure
description: The IRC5 family with UAS service enabled comes by default with credentials
that can be found on publicly available manuals. ABB considers this a well documented
functionality that helps customer set up ... | RVD#3326: Hardcoded default credentials on IRC 5 OPC Server | https://api.github.com/repos/aliasrobotics/RVD/issues/3326/comments | 0 | 2020-07-15T21:59:00Z | 2020-07-15T22:05:07Z | https://github.com/aliasrobotics/RVD/issues/3326 | 657,686,393 | 3,326 | 1,342 |
CVE-2020-10288 | 2020-07-15T23:15:11.393 | IRC5 exposes an ftp server (port 21). Upon attempting to gain access you are challenged with a request of username and password, however you can input whatever you like. As long as the field isn't empty it will be accepted. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@aliasrobotics.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/issues/3327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/aliasrobotics/RVD/i... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:abb:robotware:5.09:*:*:*:*:*:*:*",
"matchCriteriaId": "C9C363AC-475E-42E1-937B-D34A45AE9E32",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | [
"287"
] | 287 | https://github.com/aliasrobotics/RVD/issues/3327 | [
"Third Party Advisory"
] | github.com | [
"aliasrobotics",
"RVD"
] | ```yaml
id: 3327
title: 'RVD#3327: No authentication required for accesing ABB IRC5 FTP server'
type: vulnerability
description: IRC5 exposes an ftp server (port 21). Upon attempting to gain access
you are challenged with a request of username and password, however you can input
whatever you like. As long as the fi... | RVD#3327: No authentication required for accesing ABB IRC5 FTP server | https://api.github.com/repos/aliasrobotics/RVD/issues/3327/comments | 0 | 2020-07-15T22:03:16Z | 2020-07-15T22:05:07Z | https://github.com/aliasrobotics/RVD/issues/3327 | 657,688,647 | 3,327 | 1,343 |
CVE-2019-20909 | 2020-07-16T18:15:12.690 | An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/commit/d7913b893bfa98fab27f05825dc4cab2d3a20c83"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "h... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28E3A7DE-65A0-4A6B-BF63-00F627CF17CB",
"versionEndExcluding": null,
"versionEndIncluding": "0.9.3",
"versionStartExcluding"... | [
"476"
] | 476 | https://github.com/LibreDWG/libredwg/issues/178 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi,
I got some bugs, and I tested on master branch and version **0.9.3**. There are **3 heap overflow**, **2 NULL pointer deference**, **1 denial of service**, **1 stack overflow** (this bug causes memory leak in master branch) in that.
Compile with **ASAN** and use **dwgrewrite** to repro that.
Hear are some detail... | Several bugs need to be fixed. | https://api.github.com/repos/LibreDWG/libredwg/issues/178/comments | 19 | 2019-12-31T06:04:23Z | 2025-01-06T10:24:48Z | https://github.com/LibreDWG/libredwg/issues/178 | 544,098,538 | 178 | 1,344 |
CVE-2020-7696 | 2020-07-17T10:15:12.467 | This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DylanVann/react-native-fast-image/issues/690"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"u... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:react-native-fast-image_project:react-native-fast-image:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08F2A94F-6529-4117-B798-A6B5741CC615",
"versionEndExcluding": null,
"versionEndIncluding": n... | [
"200"
] | 200 | https://github.com/DylanVann/react-native-fast-image/issues/690 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"DylanVann",
"react-native-fast-image"
] | **Describe the bug**
When an image with `source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }}` is loaded, all other subsequent images will use the same headers.
This can lead to images not showing, because the `host` header is wrong, and web servers will return 404 errors for the request.... | [iOS] Headers for one request are sent for all subsequent requests, even if no headers specified | https://api.github.com/repos/DylanVann/react-native-fast-image/issues/690/comments | 4 | 2020-06-05T09:52:30Z | 2020-07-17T08:39:07Z | https://github.com/DylanVann/react-native-fast-image/issues/690 | 631,464,734 | 690 | 1,345 |
CVE-2020-15807 | 2020-07-17T16:15:11.560 | GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/186"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53",
"versionEndExcluding": "0.11",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"476"
] | 476 | https://github.com/LibreDWG/libredwg/issues/186 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hello, I got a NULL pointer deference bug in **0.10.1.2677 and even earlier** by run `dxf2dwg poc -o /dev/null`
```
==12391==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f9f9b4f3284 bp 0x7ffcfa3b08a0 sp 0x7ffcfa3b0860 T0)
==12391==The signal is caused by a READ memory access.
==12391==Hi... | NULL pointer deference | https://api.github.com/repos/LibreDWG/libredwg/issues/186/comments | 3 | 2020-01-14T12:30:37Z | 2020-07-20T02:14:44Z | https://github.com/LibreDWG/libredwg/issues/186 | 549,536,132 | 186 | 1,346 |
CVE-2020-15807 | 2020-07-17T16:15:11.560 | GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/186"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53",
"versionEndExcluding": "0.11",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"476"
] | 476 | https://github.com/LibreDWG/libredwg/issues/189 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`. | Some NULL pointer bugs | https://api.github.com/repos/LibreDWG/libredwg/issues/189/comments | 58 | 2020-01-16T11:36:57Z | 2020-07-20T02:15:32Z | https://github.com/LibreDWG/libredwg/issues/189 | 550,751,408 | 189 | 1,347 |
CVE-2020-15807 | 2020-07-17T16:15:11.560 | GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/186"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53",
"versionEndExcluding": "0.11",
"versionEndIncluding": null,
"versionStartExcluding":... | [
"476"
] | 476 | https://github.com/LibreDWG/libredwg/issues/190 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`. | Some heap_overflow bug | https://api.github.com/repos/LibreDWG/libredwg/issues/190/comments | 5 | 2020-01-16T11:51:56Z | 2020-07-20T02:16:17Z | https://github.com/LibreDWG/libredwg/issues/190 | 550,758,758 | 190 | 1,348 |
CVE-2020-15813 | 2020-07-17T19:15:12.547 | Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not impl... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Graylog2/graylog2-server/issues/5906"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Graylog2/graylog2-se... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A21A46-6422-4E60-ADAA-9605AB691F95",
"versionEndExcluding": "3.3.3",
"versionEndIncluding": null,
"versionStartExcludi... | [
"295"
] | 295 | https://github.com/Graylog2/graylog2-server/issues/5906 | [
"Third Party Advisory"
] | github.com | [
"Graylog2",
"graylog2-server"
] | <!--- Provide a general summary of the issue in the Title above -->
## Expected Behavior
<!--- If you're describing a bug, tell us what should happen -->
<!--- If you're suggesting a change/improvement, tell us how it should work -->
Graylog should verify the LDAP server certificate chain up to a trusted root, an... | LDAP connector does not verify TLS certificates | https://api.github.com/repos/Graylog2/graylog2-server/issues/5906/comments | 3 | 2019-04-24T14:39:48Z | 2020-08-03T11:26:01Z | https://github.com/Graylog2/graylog2-server/issues/5906 | 436,737,118 | 5,906 | 1,349 |
CVE-2020-7680 | 2020-07-20T16:15:12.350 | docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaS... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
... | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advi... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:docsifyjs:docsify:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D61038D6-B6F5-4297-A237-100706E35264",
"versionEndExcluding": "4.11.4",
"versionEndIncluding": null,
"versionStartExcl... | [
"79"
] | 79 | https://github.com/docsifyjs/docsify/issues/1126 | [
"Third Party Advisory"
] | github.com | [
"docsifyjs",
"docsify"
] | <!-- Please don't delete this template or we'll close your issue -->
<!-- Please use English language -->
<!-- Before creating an issue please make sure you are using the latest version of Docsify. -->
<!-- Please ask questions on StackOverflow: https://stackoverflow.com/questions/ask?tags=docsify -->
<!-- Please a... | vulnerability report | https://api.github.com/repos/docsifyjs/docsify/issues/1126/comments | 17 | 2020-04-19T19:19:47Z | 2021-02-05T05:56:29Z | https://github.com/docsifyjs/docsify/issues/1126 | 602,798,447 | 1,126 | 1,350 |
CVE-2020-15121 | 2020-07-20T18:15:12.187 | In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2252909-1FFD-484D-AC5B-6227CD4FB1BA",
"versionEndExcluding": "4.5.0",
"versionEndIncluding": null,
"versionStartExcludin... | [
"78"
] | 78 | https://github.com/radareorg/radare2/issues/16945 | [
"Third Party Advisory"
] | github.com | [
"radareorg",
"radare2"
] | ### Work environment
| Questions | Answers
|------------------------------------------------------|--------------------
| OS/arch/bits (mandatory) | N/A
| File format of the file you reverse (mandatory) | PE
| Architecture/bits of the fi... | Command injection across r_sys_cmd* | https://api.github.com/repos/radareorg/radare2/issues/16945/comments | 10 | 2020-05-24T12:20:29Z | 2020-07-21T03:48:53Z | https://github.com/radareorg/radare2/issues/16945 | 623,853,564 | 16,945 | 1,351 |
CVE-2020-15866 | 2020-07-21T15:15:14.537 | mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/mruby/mruby/issues/5042"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E24840A-138B-4CE3-AF5D-FB9426BB10A1",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.1",
"versionStartExcluding":... | [
"787"
] | 787 | https://github.com/mruby/mruby/issues/5042 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"mruby",
"mruby"
] | A heap buffer overflow exists in `mrb_yield_with_class` function in `src/vm.c:767` triggered via `stack_copy`. The bug can be detected on Ubuntu-18.04 64-bit with ASAN-enabled mruby. It has been reproduced with mruby compiled with different compiler toolchains: `clang-9, clang-10, gcc-7.5`. The POC input and steps to r... | Heap buffer overflow in mruby interpreter | https://api.github.com/repos/mruby/mruby/issues/5042/comments | 1 | 2020-07-20T21:23:46Z | 2020-07-21T03:54:12Z | https://github.com/mruby/mruby/issues/5042 | 662,278,596 | 5,042 | 1,352 |
CVE-2020-15890 | 2020-07-21T22:15:12.197 | LuaJit through 2.1.0-beta3 has an out-of-bounds read because __gc handler frame traversal is mishandled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LuaJIT/LuaJIT/issues/601"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7369364F-A393-4616-B40E-8097CA70E957",
"versionEndExcluding": null,
"versionEndIncluding": "2.0.5",
"versionStartExcluding... | [
"125"
] | 125 | https://github.com/LuaJIT/LuaJIT/issues/601 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LuaJIT",
"LuaJIT"
] | Hi, we found a crash in LuaJit
Version: 2.1. Git hash: `384d6d56f4a3841fdef607a511dda92a579af2ff`
POC:
```lua
a = newproxy ( true )
getmetatable ( a ) . __gc = function ( )
rep129 = load ( function ( ) collectgarbage ( ) ( ) end )
end
for i = 1 , 10000000 do newproxy ( a ) end
```
Stack dump:
... | Segmentation fault in lj_err_run | https://api.github.com/repos/LuaJIT/LuaJIT/issues/601/comments | 4 | 2020-07-10T23:37:23Z | 2020-08-18T10:02:13Z | https://github.com/LuaJIT/LuaJIT/issues/601 | 655,086,702 | 601 | 1,353 |
CVE-2020-8559 | 2020-07-22T14:15:16.517 | The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6,
"confidentialityImpact": "PART... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/92914"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43222A9D-6D48-490F-8120-349DCE1C1218",
"versionEndExcluding": null,
"versionEndIncluding": "1.15.0",
"versionStart... | [
"601"
] | 601 | https://github.com/kubernetes/kubernetes/issues/92914 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: Medium (6.4) [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)
If an attacker is able to intercept certain requests to the Kubelet, they can send a redirect response that may be followed by a client using the credential... | CVE-2020-8559: Privilege escalation from compromised node to cluster | https://api.github.com/repos/kubernetes/kubernetes/issues/92914/comments | 7 | 2020-07-08T17:03:16Z | 2021-12-02T22:54:32Z | https://github.com/kubernetes/kubernetes/issues/92914 | 653,456,402 | 92,914 | 1,354 |
CVE-2020-8557 | 2020-07-23T17:15:12.513 | The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If ... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
... | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/93032"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12849C27-DD8A-4D84-92FD-3AB32B43742B",
"versionEndExcluding": "1.16.13",
"versionEndIncluding": null,
"versionStar... | [
"400"
] | 400 | https://github.com/kubernetes/kubernetes/issues/93032 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: Medium (5.5) [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M)
The `/etc/hosts` file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral ... | CVE-2020-8557: Node disk DOS by writing to container /etc/hosts | https://api.github.com/repos/kubernetes/kubernetes/issues/93032/comments | 4 | 2020-07-13T18:39:08Z | 2024-08-29T11:57:32Z | https://github.com/kubernetes/kubernetes/issues/93032 | 656,058,152 | 93,032 | 1,355 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.