cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-13776
2020-06-03T03:15:10.677
systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLET...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/systemd/systemd/issues/15985" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", "matchCriteriaId": "10761C00-6450-4377-8DFC-16AE46BE54BB", "versionEndExcluding": null, "versionEndIncluding": "245", "versionStartE...
[ "269" ]
269
https://github.com/systemd/systemd/issues/15985
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "systemd", "systemd" ]
**Version the issue has been seen with** > `245` ea500ac513cf51bcb79a5666f1519499d029428f and the current `master` d904afc730268d50502f764dfd55b8cf4906c46f **Used distribution** > Ubuntu 20.04 LTS **Expected behaviour you didn't see** > ```bash > loginctl show-user $(id -u) > ``` > > ```ini > U...
User names beginning with 0x being interpreted as user identifiers
https://api.github.com/repos/systemd/systemd/issues/15985/comments
11
2020-05-31T09:13:53Z
2020-06-04T03:40:05Z
https://github.com/systemd/systemd/issues/15985
627,924,396
15,985
1,252
CVE-2020-13597
2020-06-03T17:15:24.887
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", ...
[ { "source": "psirt@tigera.io", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/91507" }, { "source": "psirt@tigera.io", "tags": null, "url": "https://groups.google.com/forum/#%21topic/kubernetes-security-announ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectcalico:calico:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "95DB38FE-A03E-456B-874A-A58C31BE7592", "versionEndExcluding": null, "versionEndIncluding": "2.6.2", "versi...
[ "200" ]
200
https://github.com/kubernetes/kubernetes/issues/91507
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L) (6.0 Medium) A cluster configured to use an affected container networking implementation is susceptible to man-in-the-middle (MitM) attacks. By sending “rogue” router ad...
CVE-2020-10749: IPv4 only clusters susceptible to MitM attacks via IPv6 rogue router advertisements
https://api.github.com/repos/kubernetes/kubernetes/issues/91507/comments
7
2020-05-27T19:32:29Z
2022-09-14T11:48:50Z
https://github.com/kubernetes/kubernetes/issues/91507
625,973,443
91,507
1,253
CVE-2020-13790
2020-06-03T19:15:10.817
libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F91F79CC-B2C4-4D9E-99AA-5D6A49D41561", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "125" ]
125
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libjpeg-turbo", "libjpeg-turbo" ]
**Have you searched the existing issues (both open and closed) in the libjpeg-turbo issue tracker to ensure that this bug report is not a duplicate?** Yes **Does this bug report describe one of the [two known and unsolvable issues with the JPEG format](https://libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththe...
Heap-based buffer over-read in get_rgb_row() in rdppm.c
https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/433/comments
3
2020-05-25T18:37:38Z
2020-11-04T03:26:12Z
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
624,437,621
433
1,254
CVE-2020-13822
2020-06-04T15:15:13.510
The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/indutny/elliptic/issues/226" }, { "source": "cve@mitre.org", "tags": null, "url": "https://medium.com/%40herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:indutny:elliptic:6.5.2:*:*:*:*:node.js:*:*", "matchCriteriaId": "E5343FAF-0200-473D-922C-51CB46D28A7F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStar...
[ "190" ]
190
https://github.com/indutny/elliptic/issues/226
[ "Exploit", "Third Party Advisory" ]
github.com
[ "indutny", "elliptic" ]
Hello, Using elliptic 6.5.2 I've found that the ECDSA verification functionality validates signatures as 'true' when the encoding is incorrect i.e. it has been modified / altered against the standard, allowing a certain degree of malleability in the signatures. Based on the Google Wycheproof test vectors, the follow...
Lack of encoding checks allows a certain degree of signature malleability in ECDSA signatures
https://api.github.com/repos/indutny/elliptic/issues/226/comments
19
2020-06-01T09:49:31Z
2020-11-12T16:45:49Z
https://github.com/indutny/elliptic/issues/226
628,302,319
226
1,255
CVE-2020-7661
2020-06-04T18:15:15.013
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kevva/url-regex/issues/70" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-URLREGEX...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:url-regex_project:url-regex:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E568BB4-BE50-4B0C-8F38-2FF8DF24DC98", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "400" ]
400
https://github.com/kevva/url-regex/issues/70
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kevva", "url-regex" ]
# IMPORTANT UPDATE (8/15/20) [Per my comment below](https://github.com/kevva/url-regex/issues/70#issuecomment-674365368), I have released my own package, `url-regex-safe`, which resolves this issue, and all (solvable) existing issues and pull requests here in this GitHub repository. The new package has 100% test co...
[VULNERABILITY] Parsing a long String will result in 100% CPU usage and `String.test` will never finish
https://api.github.com/repos/kevva/url-regex/issues/70/comments
12
2020-04-26T22:13:22Z
2020-11-24T22:00:59Z
https://github.com/kevva/url-regex/issues/70
607,126,399
70
1,256
CVE-2020-13848
2020-06-04T20:15:12.050
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00030.html" }, { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00033.html" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libupnp_project:libupnp:*:*:*:*:*:*:*:*", "matchCriteriaId": "92BB7079-C245-481E-A592-D88889DC1D95", "versionEndExcluding": null, "versionEndIncluding": "1.12.1", "versionSta...
[ "476" ]
476
https://github.com/pupnp/pupnp/issues/177
[ "Third Party Advisory" ]
github.com
[ "pupnp", "pupnp" ]
There is a NULL pointer dereference in the function FindServiceControlURLPath in genlib/service_table/service_table.c. A segmentation fault occurs if the string controlURLPath is NULL. This crash can be triggered by sending a malformed SUBSCRIBE or UNSUBSCRIBE using any of the attached files. `cat <subscribe/unsu...
NULL pointer dereference in FindServiceControlURLPath
https://api.github.com/repos/pupnp/pupnp/issues/177/comments
4
2020-06-02T08:54:59Z
2020-06-05T15:04:55Z
https://github.com/pupnp/pupnp/issues/177
629,026,044
177
1,257
CVE-2020-12723
2020-06-05T15:15:10.800
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Pe...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C171B203-3DAA-43B7-A0BE-DDB0895EB744", "versionEndExcluding": "5.30.3", "versionEndIncluding": null, "versionStartExcluding": ...
[ "120" ]
120
https://github.com/Perl/perl5/issues/16947
[ "Third Party Advisory" ]
github.com
[ "Perl", "perl5" ]
Migrated from [rt.perl.org#134017](https://rt-archive.perl.org/perl5/Ticket/Display.html?id=134017) (status was 'open') Searchable as RT134017$
Segfault in S_study_chunk (regcomp.c:4870)
https://api.github.com/repos/Perl/perl5/issues/16947/comments
28
2019-04-10T13:09:22Z
2020-04-23T12:40:12Z
https://github.com/Perl/perl5/issues/16947
509,396,691
16,947
1,258
CVE-2020-12723
2020-06-05T15:15:10.800
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Pe...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C171B203-3DAA-43B7-A0BE-DDB0895EB744", "versionEndExcluding": "5.30.3", "versionEndIncluding": null, "versionStartExcluding": ...
[ "120" ]
120
https://github.com/Perl/perl5/issues/17743
[ "Third Party Advisory" ]
github.com
[ "Perl", "perl5" ]
This is a placeholder ticket for consideration of a theoretically possible bug. In #16947 we found that study_chunk reinvokes itself in two ways - by simple recursion, and by enframing. In some cases that involves restudying regexp ops multiple times, whereas in other cases the reinvocation is the only time the rele...
study_chunk recursion
https://api.github.com/repos/Perl/perl5/issues/17743/comments
1
2020-04-23T13:10:14Z
2020-09-15T15:28:27Z
https://github.com/Perl/perl5/issues/17743
605,518,922
17,743
1,259
CVE-2020-8555
2020-06-05T17:15:11.640
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/01/4" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://w...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "1BB84B14-8D71-4BEA-90FC-DB76F9A0F781", "versionEndExcluding": "1.15.11", "versionEndIncluding": null, "versionStar...
[ "918" ]
918
https://github.com/kubernetes/kubernetes/issues/91542
[ "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: [CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) There exists a Server Side Request Forgery (SSRF) vulnerability in kube-controller-manager that allows certain authorized users to leak up to 500 bytes of arbitrary info...
CVE-2020-8555: Half-Blind SSRF in kube-controller-manager
https://api.github.com/repos/kubernetes/kubernetes/issues/91542/comments
4
2020-05-28T16:13:34Z
2021-12-02T22:54:48Z
https://github.com/kubernetes/kubernetes/issues/91542
626,636,248
91,542
1,260
CVE-2020-13881
2020-06-06T19:15:09.610
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/08/1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pam_tacplus_project:pam_tacplus:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CBB04E0-1798-4128-B107-EC27FE0CEAAB", "versionEndExcluding": null, "versionEndIncluding": "1.5.1", "ver...
[ "532" ]
532
https://github.com/kravietz/pam_tacplus/issues/149
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kravietz", "pam_tacplus" ]
In the example, we can see that server secret key is printed in plain text in journalctl logs. If an attacker is using man-in-the-middle attack and somehow gets these logs, he/she can decrypt and see all packets. User passwords will also be exposed by that.
Printing server secret key in plain text in journalctl
https://api.github.com/repos/kravietz/pam_tacplus/issues/149/comments
12
2020-06-02T16:40:38Z
2020-06-08T12:28:31Z
https://github.com/kravietz/pam_tacplus/issues/149
629,350,947
149
1,261
CVE-2020-13889
2020-06-06T20:15:11.200
showAlert() in the administration panel in Bludit 3.12.0 allows XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/bludit/bludit/issues/1205
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
Hello I think I found a vulnerability. This vulnerability consists in a function called showAlert() in the administration panel of bludit,that when accessed in DOM, allows users define the text to be popped up in the message box. But this function dont have any sanatization and the user can inject any javascript and...
Possible XSS and HTML injection on admin page.
https://api.github.com/repos/bludit/bludit/issues/1205/comments
1
2020-06-05T01:31:12Z
2020-06-07T10:05:27Z
https://github.com/bludit/bludit/issues/1205
631,247,131
1,205
1,262
CVE-2020-13895
2020-06-07T01:15:10.550
Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FGasper/p5-Crypt-Perl/commit/f960ce75502acf7404187231a706672f8369acb2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:p5-crypt-perl_project:p5-crypt-perl:*:*:*:*:*:perl:*:*", "matchCriteriaId": "1EEE3CFF-1E10-4097-9BBC-02DF00813008", "versionEndExcluding": "0.32", "versionEndIncluding": null, ...
[ "347" ]
347
https://github.com/FGasper/p5-Crypt-Perl/issues/14
[ "Third Party Advisory" ]
github.com
[ "FGasper", "p5-Crypt-Perl" ]
Hello, I'm using Crypt::Perl::ECDSA 0.31: ``` cpan -D Crypt::Perl::ECDSA Database was generated on Thu, 04 Jun 2020 08:41:03 GMT Crypt::Perl::ECDSA ------------------------------------------------------------------------- CPAN: Module::CoreList loaded ok (v5.20181129_28) (no description) F/FE/FELIPE/Crypt-P...
Crypt::Perl::ECDSA fails to verify ECDSA signatures when r and s are small and when s = 1
https://api.github.com/repos/FGasper/p5-Crypt-Perl/issues/14/comments
4
2020-06-04T10:07:35Z
2020-06-07T07:42:13Z
https://github.com/FGasper/p5-Crypt-Perl/issues/14
630,689,834
14
1,263
CVE-2020-13978
2020-06-09T14:15:10.140
Monstra CMS 3.0.4 allows an attacker, who already has administrative access to modify .chunk.php files on the Edit Chunk screen, to execute arbitrary OS commands via the Theme Module by visiting the admin/index.php?id=themes&action=edit_chunk URI. NOTE: there is no indication that the Edit Chunk feature was intended to...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2226D9F-8476-4F0F-9DE3-21A8FE290533", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "78" ]
78
https://github.com/monstra-cms/monstra/issues/464
[ "Exploit", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
**Describe the bug** An attacker could insert any executable code through php via Theme Module to execution command in the server **To Reproduce** - Log into the panel. - Go to "/admin/index.php?id=themes&action=edit_chunk" - Click edit - Insert payload ``` <?php exec('cat /etc/passwd 2>&1', $output); ?> ...
Remote Code Execution via Theme module
https://api.github.com/repos/monstra-cms/monstra/issues/464/comments
1
2020-05-22T18:06:25Z
2024-09-14T08:18:06Z
https://github.com/monstra-cms/monstra/issues/464
623,393,091
464
1,264
CVE-2020-13980
2020-06-09T14:15:10.217
OpenCart 3.0.3.3 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section because of a lack of entity encoding. NOTE: this issue exists because of an incomplete fix for CVE-2020-10596. The vendor states "this is not a massive issue as you are still required to b...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/opencart/opencart/issues/7974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opencart:opencart:3.0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F0CB49BB-ED76-4815-9DA0-12B76DDAE975", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/opencart/opencart/issues/7974
[ "Exploit", "Third Party Advisory" ]
github.com
[ "opencart", "opencart" ]
Spam
Store XSS Vulnerability in Opencart 3.0.3.3 - Upload Images
https://api.github.com/repos/opencart/opencart/issues/7974/comments
5
2020-05-31T16:35:45Z
2021-08-03T11:05:07Z
https://github.com/opencart/opencart/issues/7974
627,998,047
7,974
1,265
CVE-2020-7670
2020-06-10T16:15:10.540
agoo prior to 2.14.0 allows request smuggling attacks where agoo is used as a backend and a frontend proxy also being vulnerable. HTTP pipelining issues and request smuggling attacks might be possible due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": null, "url": "https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130" }, { "source": "report@snyk.io", "tags": null, "url": "https://github.com/ohler55/agoo/issues/88" }, { "source": "report@snyk.io", "tags": [ ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ohler:agoo:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "6A41F130-9592-48D6-9B78-86D688B56D5A", "versionEndExcluding": null, "versionEndIncluding": "2.12.3", "versionStartExcludin...
[ "444" ]
444
https://github.com/ohler55/agoo/issues/88
null
github.com
[ "ohler55", "agoo" ]
Testbed used to verify the vulnerability: https://github.com/ohler55/agoo#rack The following requests can be send via command line (tested on ubuntu) to reproduce the behaviour ## Double Content Length Headers printf 'GET /hello HTTP/1.1\r\n'\ 'Content-Length: 47\r\n'\ 'Content-Length: 0\r\n'\ 'Host: 127.0.0...
Protect against smuggling attacks
https://api.github.com/repos/ohler55/agoo/issues/88/comments
3
2020-05-16T00:01:28Z
2020-11-12T16:09:05Z
https://github.com/ohler55/agoo/issues/88
619,332,166
88
1,266
CVE-2020-7671
2020-06-10T16:15:10.587
goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": null, "url": "https://github.com/postrank-labs/goliath/issues/351%2C" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136" }, { "source": "af854a3a-2127-422b-91a...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:goliath_project:goliath:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "079332CF-A488-425D-A4C7-3804B6EBE665", "versionEndExcluding": null, "versionEndIncluding": "1.0.6", "versionS...
[ "444" ]
444
https://github.com/postrank-labs/goliath/issues/351%2C
null
github.com
[ "postrank-labs", "goliath" ]
Posting it here for community patches after talking with the maintainers privately. Issue: Goliath doesn't prevent Request Smuggling attacks 1. Goliath allows requests with multiple content-lengths. When sent a request such as the below, the first content-length header is ignored and the second content-lengt...
HTTP Request Smuggling Hardening
https://api.github.com/repos/postrank-labs/goliath/issues/351/comments
0
2020-06-02T19:56:15Z
2020-11-23T14:21:05Z
https://github.com/postrank-labs/goliath/issues/351
629,473,498
351
1,267
CVE-2020-14012
2020-06-10T18:15:10.890
scp/categories.php in osTicket 1.14.2 allows XSS via a Knowledgebase Category Name or Category Description. The attacker must be an Agent.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/osTicket/osTicket/issues/5514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enhancesoft:osticket:1.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "81B1474A-11DC-489E-9A4A-F57F4110D087", "versionEndExcluding": null, "versionEndIncluding": null, "versionStart...
[ "79" ]
79
https://github.com/osTicket/osTicket/issues/5514
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "osTicket", "osTicket" ]
Description: A authenticated malicious user can take advantage of a Reflected XSS vulnerability in the "Knowledgebase" feature. This was can be bypassed by using HTML event handlers, such as "ontoggle". OS: firefox Steps to Reproduce: 1. Log into the panel OsTicket 2. Go to "/osticket/scp/kb.php" 3. Go to "/ostic...
Cross Site Scripting Vulnerability on "Knowledgebase" feature in OsTicket
https://api.github.com/repos/osTicket/osTicket/issues/5514/comments
3
2020-05-21T10:01:21Z
2020-06-16T21:52:33Z
https://github.com/osTicket/osTicket/issues/5514
622,390,539
5,514
1,268
CVE-2020-2023
2020-06-10T18:15:11.280
Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/agent/issues/791" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch" ], "url": "https://github.com/kata-containers/agent/pull/792" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31", "versionEndExcluding": null, "versionEndIncluding": "1.9", "versionStartEx...
[ "250" ]
250
https://github.com/kata-containers/agent/issues/791
[ "Third Party Advisory" ]
github.com
[ "kata-containers", "agent" ]
Explicitly deny any access to the nvdimm root partition by adding the nvdimm device to the device cgroup.
Explicitly deny any access to the nvdimm root partition
https://api.github.com/repos/kata-containers/agent/issues/791/comments
0
2020-06-03T15:33:02Z
2020-06-03T20:30:09Z
https://github.com/kata-containers/agent/issues/791
630,096,691
791
1,269
CVE-2020-2023
2020-06-10T18:15:11.280
Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/agent/issues/791" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Patch" ], "url": "https://github.com/kata-containers/agent/pull/792" },...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31", "versionEndExcluding": null, "versionEndIncluding": "1.9", "versionStartEx...
[ "250" ]
250
https://github.com/kata-containers/runtime/issues/2488
[ "Patch", "Third Party Advisory" ]
github.com
[ "kata-containers", "runtime" ]
CLH recently introduced a new stable branch `stable/v0.5.x` [here](https://github.com/cloud-hypervisor/cloud-hypervisor/tree/stable/v0.5.x), and it is advised to use this branch. This branch includes updates that allow the root file system to be mounted as read-only.
clh: update CLH to stable/v0.5.x
https://api.github.com/repos/kata-containers/runtime/issues/2488/comments
0
2020-02-20T16:13:48Z
2020-05-29T15:38:09Z
https://github.com/kata-containers/runtime/issues/2488
568,410,720
2,488
1,270
CVE-2020-2026
2020-06-10T18:15:11.360
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects: Kata Containers 1.11 vers...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/runtime/issues/2712" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kata-containers/ru...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:katacontainers:runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AB886E3-03F3-43FA-AE4F-092FA6246A31", "versionEndExcluding": null, "versionEndIncluding": "1.9", "versionStartEx...
[ "59" ]
59
https://github.com/kata-containers/runtime/issues/2712
[ "Third Party Advisory" ]
github.com
[ "kata-containers", "runtime" ]
We need to make sure containers cannot modify host path unless it is explicitly shared to it. Right now we expose an additional top level shared directory to the guest and allow it to be modified. This is less ideal and can be enhanced by following method: 1. create two directories for each sandbox: -. /run/kata-co...
host shared directory should be readonly
https://api.github.com/repos/kata-containers/runtime/issues/2712/comments
0
2020-05-29T15:40:02Z
2020-06-03T02:18:21Z
https://github.com/kata-containers/runtime/issues/2712
627,358,605
2,712
1,271
CVE-2020-4043
2020-06-10T20:15:14.483
phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versi...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4" }, { "source": "security-advisories@github.com", "tags": [ "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmussel_project:phpmussel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EC9BA66-3EEA-45DA-9609-227B31D00DE5", "versionEndExcluding": "1.6.0", "versionEndIncluding": null, "version...
[ "502" ]
502
https://github.com/phpMussel/phpMussel/issues/167
[ "Patch", "Third Party Advisory" ]
github.com
[ "phpMussel", "phpMussel" ]
An unserialization vulnerability was recently discovered which affects the phar wrapper. Due to that phpMussel implements the phar wrapper for reading archives, this vulnerability also currently affects all currently supported versions of phpMussel to the extent of its ability to read archives. I would __*strongly*_...
Phar unserialization vulnerability.
https://api.github.com/repos/phpMussel/phpMussel/issues/167/comments
3
2018-08-23T19:12:13Z
2024-05-10T03:17:40Z
https://github.com/phpMussel/phpMussel/issues/167
353,515,512
167
1,272
CVE-2020-12725
2020-06-11T19:15:10.000
Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting a...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.redash.io" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/getredash/redash/commits/master" }, { "source": "cve@mitre.org"...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2E6EF81-37F5-42AC-A33F-3A8A7D1971C4", "versionEndExcluding": null, "versionEndIncluding": "8.0.0", "versionStartExcluding...
[ "918" ]
918
https://github.com/getredash/redash/issues/4869
[ "Exploit", "Vendor Advisory" ]
github.com
[ "getredash", "redash" ]
# Summary Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source version. Possibly, other connectors are affected however the JSON data source provides a lot of flexibility in terms of being able to craft HTTP requests eg., by adding headers, se...
CVE-2020-12725 - Authenticated Server-Side Request Forgery (SSRF) in the JSON data source / internal addresses restriction bypass
https://api.github.com/repos/getredash/redash/issues/4869/comments
4
2020-05-07T10:53:13Z
2020-06-15T10:25:00Z
https://github.com/getredash/redash/issues/4869
613,961,475
4,869
1,273
CVE-2020-10732
2020-06-12T14:15:11.277
A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", ...
[ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ],...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F9567FB-F394-443B-9A95-1DA060A9CCA6", "versionEndExcluding": "3.16.85", "versionEndIncluding": null, "versionStartEx...
[ "908" ]
908
https://github.com/google/kmsan/issues/76
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "google", "kmsan" ]
While fuzzing latest KMSAN-build with HEALER(syscall fuzzer, not published yet), uninit-value is found in kmsan_handle_dma. It seems KMSAN found bugs in itself. Caused by this call sequence [syscalls.txt](https://github.com/google/kmsan/files/4496358/syscalls.txt). With this crash [msg.txt](https://github.com/goog...
BUG: KMSAN: uninit-value in kmsan_handle_dma
https://api.github.com/repos/google/kmsan/issues/76/comments
8
2020-04-18T09:13:03Z
2020-09-17T09:24:49Z
https://github.com/google/kmsan/issues/76
602,416,429
76
1,274
CVE-2020-14061
2020-06-14T20:15:10.027
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnect...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2698" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2698
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `aqapi.jar` library, included in Weblogic (for Oracle AQ/JMS support). See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14061 Reporter(s): F...
Block one more gadget type (weblogic/oracle-aqjms, CVE-2020-14061)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2698/comments
0
2020-04-25T02:27:29Z
2020-07-16T17:22:34Z
https://github.com/FasterXML/jackson-databind/issues/2698
606,669,819
2,698
1,275
CVE-2020-14062
2020-06-14T20:15:10.167
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (aka xalan2).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2704" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2704
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `com.sun.xml.parsers:jaxp-ri` (in shaded copy of Xalan2). See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14062 Reporter(s): XuYuanzhen fro...
Block one more gadget type (jaxp-ri, CVE-2020-14062)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2704/comments
0
2020-04-30T00:43:03Z
2020-07-16T17:22:25Z
https://github.com/FasterXML/jackson-databind/issues/2704
609,469,620
2,704
1,276
CVE-2020-14060
2020-06-14T21:15:09.817
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2688" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.or...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2688
[ "Patch", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.apache.drill.exec:drill-jdbc-all`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14060 Reporter(s): Topsec(tcc) from Alphalab...
Block one more gadget type (apache-drill, CVE-2020-14060)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2688/comments
0
2020-04-16T15:11:49Z
2020-08-24T22:25:58Z
https://github.com/FasterXML/jackson-databind/issues/2688
601,148,139
2,688
1,277
CVE-2017-18869
2020-06-15T15:15:09.317
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611614" }, {...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chownr_project:chownr:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BA4EAB96-893F-489C-B2A1-C677624250D6", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "version...
[ "367" ]
367
https://github.com/isaacs/chownr/issues/14
[ "Third Party Advisory" ]
github.com
[ "isaacs", "chownr" ]
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985#10
This package appears to have a TOCTOU bug
https://api.github.com/repos/isaacs/chownr/issues/14/comments
23
2017-07-02T07:22:36Z
2019-01-04T19:26:02Z
https://github.com/isaacs/chownr/issues/14
239,994,436
14
1,278
CVE-2020-14153
2020-06-15T17:15:10.637
In IJG JPEG (aka libjpeg) from version 8 through 9c, jdhuff.c has an out-of-bounds array read for certain table pointers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://www.ijg.org/files/jpegsrc.v9d.tar.gz" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/727908" }, { "source": "cve@mit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ijg:libjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8B6F197-0A40-4DA0-A5CF-BFEC3763A2F7", "versionEndExcluding": null, "versionEndIncluding": "9c", "versionStartExcluding": nu...
[ "125" ]
125
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libjpeg-turbo", "libjpeg-turbo" ]
https://nvd.nist.gov/vuln/detail/CVE-2020-14153 https://security-tracker.debian.org/tracker/CVE-2020-14153 My best guess is that this is fixed in the following change in jpeg 9d: ``` /* Precalculate which table to use for each block */ entropy->dc_cur_tbls[blkn] = entropy->dc_derived_tbls[compptr->...
Is CVE-2020-14153 present in libjpeg-turbo?
https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/445/comments
2
2020-07-27T14:47:40Z
2020-07-27T17:56:12Z
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/445
666,353,637
445
1,279
CVE-2020-14148
2020-06-15T18:15:15.067
The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/274" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/277" }, { "source": "cve@m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:barton:ngircd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A04351C-B842-4BD8-97EC-30534FA95055", "versionEndExcluding": null, "versionEndIncluding": "25.0", "versionStartExcluding"...
[ "125" ]
125
https://github.com/ngircd/ngircd/issues/274
[ "Third Party Advisory" ]
github.com
[ "ngircd", "ngircd" ]
I have been fuzzing ngircd using AFL a bit, based on inputs that are used in the testsuite. AFL has found input that can be used to crash a server that has been built with `--with-iconv`. My current hypothesis is that the crash happens because the `iconv_t` context that is passed into `iconv` is invalid (i.e. has not b...
iconv-related crash (AFL)
https://api.github.com/repos/ngircd/ngircd/issues/274/comments
2
2020-05-10T16:39:55Z
2023-01-02T14:31:25Z
https://github.com/ngircd/ngircd/issues/274
615,429,224
274
1,280
CVE-2020-14148
2020-06-15T18:15:15.067
The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/274" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ngircd/ngircd/issues/277" }, { "source": "cve@m...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:barton:ngircd:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A04351C-B842-4BD8-97EC-30534FA95055", "versionEndExcluding": null, "versionEndIncluding": "25.0", "versionStartExcluding"...
[ "125" ]
125
https://github.com/ngircd/ngircd/issues/277
[ "Third Party Advisory" ]
github.com
[ "ngircd", "ngircd" ]
I have found an out-of-bounds error by fuzzing ngircd using AFL and libdislocate (a custom memory allocator). `Conn_Write` is called with `Idx=-1` which leads to a crash when accessing `My_Connections[Idx].sock`. The binary is built from `rel-26-rc1` with patches to fix #275 and #276 and `__AFL_INIT()` patched into...
Conn_Write: out-of-bounds index access (AFL + libdislocate)
https://api.github.com/repos/ngircd/ngircd/issues/277/comments
2
2020-05-12T18:35:15Z
2023-01-02T14:31:37Z
https://github.com/ngircd/ngircd/issues/277
616,871,665
277
1,281
CVE-2020-14149
2020-06-15T18:15:15.147
In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": null, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/726308" }, { "source": "cve@...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:troglobit:uftpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCA9C907-3944-4BA8-957C-7292B017966C", "versionEndExcluding": "2.12", "versionEndIncluding": null, "versionStartExcludin...
[ "476" ]
476
https://github.com/troglobit/uftpd/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "troglobit", "uftpd" ]
Hi! I found a bug that crashes the forked child pre-authenticated. The details are as follows: ## Triggering the Bug ```shell root@5829efcb25f7:/opt/uftpd# uftpd -v 2.11 root@5829efcb25f7:/opt/uftpd# uftpd -n /tmp root@5829efcb25f7:/opt# nc 127.0.0.1 21 220 uftpd (2.11) ready. CWD /../../../../....
Null Pointer Dereference / Crash
https://api.github.com/repos/troglobit/uftpd/issues/30/comments
1
2020-05-21T14:54:52Z
2020-05-22T06:44:25Z
https://github.com/troglobit/uftpd/issues/30
622,557,607
30
1,282
CVE-2020-14156
2020-06-15T18:15:15.207
user_channel/passwd_mgr.cpp in OpenBMC phosphor-host-ipmid before 2020-04-03 does not ensure that /etc/ipmi-pass has strong file permissions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/openbmc/openbmc/issues/3670" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openbmc/phosphor-host-ipmid/commit/b2...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbmc-project:openbmc:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE58FF9E-003C-46AB-9FCE-2A21807009C7", "versionEndExcluding": "2020-04-03", "versionEndIncluding": null, "versio...
[ "276" ]
276
https://github.com/openbmc/openbmc/issues/3670
[ "Third Party Advisory" ]
github.com
[ "openbmc", "openbmc" ]
OpenBMC Security Advisory Title: CVE-2020-14156. Network IPMI before 2020-04-03 does not ensure the `/etc/ipmi_pass` file has strong file permissions. The `/etc/ipmi_pass` file was created with world-readable permission. Any user with SSH or SCP access to the BMC can read and decode the credentials and escalate...
Security Advisory for CVE-2020-14156 - Network IPMI file permissions
https://api.github.com/repos/openbmc/openbmc/issues/3670/comments
2
2020-06-15T14:49:16Z
2020-08-17T13:31:48Z
https://github.com/openbmc/openbmc/issues/3670
638,914,866
3,670
1,283
CVE-2020-14163
2020-06-15T21:15:10.553
An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/commit/c2b662170245a16f46ce02eae68815c325d99821" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionSta...
[ "125" ]
125
https://github.com/jerryscript-project/jerryscript/issues/3804
[ "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 7a20150ae747742c178e7d61bb4b3c71476925e2 ###### Build platform Ubuntu 18.04.4 LTS (Linux 4.15.0-91-generic x86_64) and ProductName: Mac OS X ProductVersion: 10.15.4 BuildVersion: 19E287 ###### Build steps ```sh python tools/build.py --profile=es2015-subset --lto=off --com...
Memory corruption in ecma_gc_set_object_visited (jerry-core/ecma/base/ecma-gc.c:85)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3804/comments
0
2020-05-27T18:29:22Z
2020-05-28T05:55:17Z
https://github.com/jerryscript-project/jerryscript/issues/3804
625,930,295
3,804
1,284
CVE-2020-14195
2020-06-16T16:15:11.107
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FasterXML/jackson-databind/issues/2765" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B92AF50-0155-471E-B5C4-1CFD95F4B7D0", "versionEndExcluding": "2.9.10.5", "versionEndIncluding": null, "versi...
[ "502" ]
502
https://github.com/FasterXML/jackson-databind/issues/2765
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FasterXML", "jackson-databind" ]
Another gadget type(s) reported regarding class(es) of `org.jsecurity:jsecurity`. library. See https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 for description of the general problem. Mitre id: CVE-2020-14195 Reporter(s): Al1ex@knownsec Fix will likely be i...
Block one more gadget type (org.jsecurity, CVE-2020-14195)
https://api.github.com/repos/FasterXML/jackson-databind/issues/2765/comments
0
2020-06-13T23:22:50Z
2020-07-16T17:22:08Z
https://github.com/FasterXML/jackson-databind/issues/2765
638,251,364
2,765
1,285
CVE-2020-10268
2020-06-16T18:15:17.027
Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs to be performed. Be noted that this only can be accomplished either by a Kuka technician or by Kuka issued calibration hardware that interfaces with the manipu...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:kuka:kr_c4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "377A0187-FEE3-48BB-A225-30B13FBC3EF9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "749" ]
749
https://github.com/aliasrobotics/RVD/issues/2550
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml { "id": 2550, "title": "RVD#2550: Terminate Critical Services in KUKA controller KR C4", "type": "Vulnerability", "description": "Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs ...
RVD#2550: Terminate Critical Services in KUKA controller KR C4
https://api.github.com/repos/aliasrobotics/RVD/issues/2550/comments
0
2020-06-16T17:22:11Z
2020-06-19T07:29:29Z
https://github.com/aliasrobotics/RVD/issues/2550
639,842,815
2,550
1,286
CVE-2020-14295
2020-06-17T14:15:10.617
A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTI...
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cacti:cacti:1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "697145F3-CB18-45CF-9671-148B10B2F3F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "89" ]
89
https://github.com/Cacti/cacti/issues/3622
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Cacti", "cacti" ]
# sqli as admin v1.2.12 There is an sql injection on the latest version (in the /cacti/color.php page on the parameter filter. ## To Reproduce Steps to reproduce the behavior: call `/cacti/color.php?action=export&header=false&filter=')<SQLI HERE>--+-` ![image](https://user-images.githubusercontent.com/2317...
SQL Injection vulnerability due to input validation failure when editing colors (CVE-2020-14295)
https://api.github.com/repos/Cacti/cacti/issues/3622/comments
13
2020-06-17T07:02:46Z
2020-10-11T00:06:05Z
https://github.com/Cacti/cacti/issues/3622
640,193,667
3,622
1,287
CVE-2018-21247
2020-06-17T16:15:11.367
An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "A03A7282-D445-4E26-98A0-6A1597838D35", "versionEndExcluding": null, "versionEndIncluding": "0.9.12", "versio...
[ "909" ]
909
https://github.com/LibVNC/libvncserver/issues/253
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibVNC", "libvncserver" ]
ConnectToRFBRepeater https://github.com/LibVNC/libvncserver/blob/79516a6aa3e875c8d9f4c83667076aa070fe5d6e/libvncclient/rfbproto.c#L401 function leaks memory, because `tmphost` buffer is filled by using `snprintf` function, but after buffer is being sent back to client using `WriteToRFBServer(client, tmphost, sizeof(tmp...
SECURITY: memory leak in libvncclient in ConnectToRFBRepeater function
https://api.github.com/repos/LibVNC/libvncserver/issues/253/comments
0
2018-09-11T15:29:14Z
2018-09-29T18:55:31Z
https://github.com/LibVNC/libvncserver/issues/253
359,100,627
253
1,288
CVE-2020-14408
2020-06-17T20:15:10.117
An issue was discovered in Agentejo Cockpit 0.10.2. Insufficient sanitization of the to parameter in the /auth/login route allows for injection of arbitrary JavaScript code into a web page's content, creating a Reflected XSS attack vector.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/agentejo/cockpit/issues/1310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://githu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:agentejo:cockpit:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "F4251B1B-6FD9-4351-BD19-1EC433B1BE8E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/agentejo/cockpit/issues/1310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "agentejo", "cockpit" ]
Insufficient sanitization of `to` parameter in `/auth/login` route allows for injection of arbitrary JavaScript code into webpage content creating a reflected XSS attack vector. See below POC : ``` https://cms.hosted.com/auth/login?to=/92874%27;alert(%27reflected%20xss!\ncookie:%20%27%2bdocument.cookie)//280 ```
Reflected XSS in login panel
https://api.github.com/repos/agentejo/cockpit/issues/1310/comments
0
2020-06-17T11:03:12Z
2020-06-17T12:01:46Z
https://github.com/agentejo/cockpit/issues/1310
640,351,730
1,310
1,289
CVE-2020-12883
2020-06-18T19:15:09.893
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12925
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m...
Out of range memory access in MbedOS CoAP library parser
https://api.github.com/repos/ARMmbed/mbed-os/issues/12925/comments
3
2020-05-05T20:59:22Z
2020-07-02T09:31:16Z
https://github.com/ARMmbed/mbed-os/issues/12925
612,891,401
12,925
1,290
CVE-2020-12883
2020-06-18T19:15:09.893
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12926
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m...
Out of range memory access in MbedOS CoAP library parser - option number
https://api.github.com/repos/ARMmbed/mbed-os/issues/12926/comments
2
2020-05-05T21:02:26Z
2020-11-04T17:41:49Z
https://github.com/ARMmbed/mbed-os/issues/12926
612,893,067
12,926
1,291
CVE-2020-12883
2020-06-18T19:15:09.893
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12925" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12927
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m...
Out of range memory access in MbedOS CoAP library parser - option value length
https://api.github.com/repos/ARMmbed/mbed-os/issues/12927/comments
2
2020-05-05T21:04:21Z
2020-07-02T09:28:36Z
https://github.com/ARMmbed/mbed-os/issues/12927
612,894,091
12,927
1,292
CVE-2020-12884
2020-06-18T19:15:09.973
A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options that may occur multiple consecutive times in a single packet. While processing the options, pack...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12928" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12928
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m...
Out of range memory access in MbedOS CoAP library parser - sn_coap_parser_options_parse_multiple_options
https://api.github.com/repos/ARMmbed/mbed-os/issues/12928/comments
2
2020-05-05T21:05:47Z
2020-07-02T09:34:51Z
https://github.com/ARMmbed/mbed-os/issues/12928
612,894,830
12,928
1,293
CVE-2020-12885
2020-06-18T19:15:10.050
An infinite loop was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse_multiple_options() parses CoAP options in a while loop. This loop's exit condition is computed using the previously allocated heap memory...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12929" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "835" ]
835
https://github.com/ARMmbed/mbed-os/issues/12929
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m...
Infinite loop in MbedOS CoAP library parser
https://api.github.com/repos/ARMmbed/mbed-os/issues/12929/comments
4
2020-05-05T21:08:59Z
2020-05-28T15:21:43Z
https://github.com/ARMmbed/mbed-os/issues/12929
612,896,526
12,929
1,294
CVE-2020-12886
2020-06-18T19:15:11.567
A buffer over-read was discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses the CoAP packet header starting from the message token. The length of the token in the received message is provided in the fir...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-coap/pull/116" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ARMmbed/mbed-os/issues/12948" }, { "source": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "B314FCEF-12B7-4510-AC5E-12D3574E3E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "125" ]
125
https://github.com/ARMmbed/mbed-os/issues/12948
[ "Third Party Advisory" ]
github.com
[ "ARMmbed", "mbed-os" ]
### Description of defect **References:** https://github.com/ARMmbed/mbed-os/tree/mbed-os-5.15.3/features/frameworks/mbed-coap https://github.com/ARMmbed/mbed-coap/tree/v5.1.5 **File:** [sn_coap_parser.c](https://github.com/ARMmbed/mbed-os/blob/b6370b4c37f3d4665ed1cdcb1afea85396bba1b3/features/frameworks/m...
Out of range memory access in MbedOS CoAP library parser - token length not validated
https://api.github.com/repos/ARMmbed/mbed-os/issues/12948/comments
1
2020-05-08T18:10:34Z
2020-07-02T09:31:10Z
https://github.com/ARMmbed/mbed-os/issues/12948
614,898,715
12,948
1,295
CVE-2020-14462
2020-06-19T12:15:11.193
CALDERA 2.7.0 allows XSS via the Operation Name box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mitre/caldera/issues/1755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitre:caldera:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "61EF0CDC-CB5F-416D-BC17-7DA2ACF784CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludin...
[ "79" ]
79
https://github.com/mitre/caldera/issues/1755
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mitre", "caldera" ]
Hello, I was playing with your framework when i came across a XSS in the Operation Name box: payload: <script>alert()</script> ![image](https://user-images.githubusercontent.com/23189983/84663443-7af4d700-af1d-11ea-962c-7b1e33c35d65.png) I have no idea if you guys are interested in that type of vulnerability ...
[Security] Cross Site Scripting in the operation name value
https://api.github.com/repos/mitre/caldera/issues/1755/comments
3
2020-06-15T13:33:47Z
2020-07-18T20:54:04Z
https://github.com/mitre/caldera/issues/1755
638,858,369
1,755
1,298
CVE-2020-14470
2020-06-19T16:15:10.983
In Octopus Deploy 2018.8.0 through 2019.x before 2019.12.2, an authenticated user with could trigger a deployment that leaks the Helm Chart repository password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/issues/6438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/OctopusDeploy/Issues/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*", "matchCriteriaId": "42BAC346-1A6F-48B0-A0C1-8D420011E67C", "versionEndExcluding": "2019.12.2", "versionEndIncluding": null, "versionS...
[ "532" ]
532
https://github.com/OctopusDeploy/Issues/issues/6438
[ "Third Party Advisory" ]
github.com
[ "OctopusDeploy", "Issues" ]
# Prerequisites - [x] We are ready to publicly disclose this vulnerability or exploit according to our [responsible disclosure process](https://octopushq.atlassian.net/wiki/spaces/IN/pages/2430143/Security+Disclosure+Policy). - [x] I have raised a CVE according to our [CVE process](https://octopushq.atlassian.net/w...
Helm chart download can leak feed password
https://api.github.com/repos/OctopusDeploy/Issues/issues/6438/comments
5
2020-06-19T04:37:00Z
2020-06-24T05:23:29Z
https://github.com/OctopusDeploy/Issues/issues/6438
641,698,080
6,438
1,299
CVE-2020-14927
2020-06-19T17:15:18.303
Navigate CMS 2.9 allows XSS via the Alias or Real URL field of the "Web Sites > Create > Aliases > Add" screen.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Adviso...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigate_cms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B84FCB0-AA74-4258-B186-491AB6AC304D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "79" ]
79
https://github.com/NavigateCMS/Navigate-CMS/issues/19
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**Expected behaviour** An authenticated malicious user can take advantage of a Reflected XSS vulnerability in the **name=**"**Aliases**" feature. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the ...
Cross Site Script Vulnerability NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/19/comments
1
2020-06-19T04:43:11Z
2020-06-19T07:52:27Z
https://github.com/NavigateCMS/Navigate-CMS/issues/19
641,699,890
19
1,300
CVE-2020-14931
2020-06-19T22:15:13.163
A stack-based buffer overflow in DMitry (Deepmagic Information Gathering Tool) 1.3a might allow remote WHOIS servers to execute arbitrary code via a long line in a response that is mishandled by nic_format_buff.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jaygreig86/dmitry/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github....
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dmitry_project:dmitry:1.3a:*:*:*:*:*:*:*", "matchCriteriaId": "1678D5E3-D98D-4EDB-8611-9A1BECFE0325", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartE...
[ "787" ]
787
https://github.com/jaygreig86/dmitry/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jaygreig86", "dmitry" ]
Continuing my analysis, this software is also vulnerable to stack overflows triggered by responses from WHOIS servers, which is dangerous since these connections are unencrypted TCP. This is distinctly different from CVE-2017-7938 because the attack vector is a remote adversary (not local), either controlling the WH...
Remote Stack Overflow (possible RCE)
https://api.github.com/repos/jaygreig86/dmitry/issues/4/comments
1
2020-06-19T16:45:09Z
2020-07-02T14:54:22Z
https://github.com/jaygreig86/dmitry/issues/4
642,103,179
4
1,301
CVE-2020-14942
2020-06-21T15:15:10.903
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tendenci/tendenci/issues/867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tendenci/tendenci/issues/867...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tendenci:tendenci:12.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "B71B64BD-B2E6-48DD-829E-BAF28E712648", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartEx...
[ "502" ]
502
https://github.com/tendenci/tendenci/issues/867
[ "Third Party Advisory" ]
github.com
[ "tendenci", "tendenci" ]
`tendenci\apps\helpdesk\views\staff.py` There is no limit to the input of the pickle called, there will be problems ``` def ticket_list(request): context = {} ...... if request.GET.get('saved_query', None): from_saved_query = True try: saved_query = SavedSear...
Unrestricted deserialization
https://api.github.com/repos/tendenci/tendenci/issues/867/comments
5
2020-06-19T05:57:47Z
2020-12-04T19:17:54Z
https://github.com/tendenci/tendenci/issues/867
641,725,716
867
1,302
CVE-2020-14966
2020-06-22T12:15:10.087
An issue was discovered in the jsrsasign package through 8.0.18 for Node.js. It allows a malleability in ECDSA signatures by not checking overflows in the length of a sequence and '0' characters appended or prepended to an integer. The modified signatures are verified as valid. This could have a security-relevant impac...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/437" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "435B4E0A-10B0-41B8-B6DA-454D375C127D", "versionEndExcluding": null, "versionEndIncluding": "8.0.18", "...
[ "347" ]
347
https://github.com/kjur/jsrsasign/issues/437
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
Hello, I've found that jsrsasign 8.0.16 allows a certain degree of malleability in ECDSA signatures by not checking overflows in the length of sequence and 0s appended or prepended to an integer. Using the secp256r1 curve it its possible to verify this issue using the following test vectors of Google Wycheproof...
Lack of encoding checking in jsrsasign allows a certain degree of malleability in ECDSA signatures
https://api.github.com/repos/kjur/jsrsasign/issues/437/comments
2
2020-06-06T18:11:17Z
2020-08-24T23:05:44Z
https://github.com/kjur/jsrsasign/issues/437
632,639,446
437
1,303
CVE-2020-14967
2020-06-22T12:15:10.150
An issue was discovered in the jsrsasign package before 8.0.18 for Node.js. Its RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification by prepending '\0' bytes to ciphertexts (it decrypts modified ciphertexts without error). An attacker might prepend these bytes with the goal of triggering mem...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/439" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "6DDC5099-39B1-4D97-BF5E-9E6458481AAC", "versionEndExcluding": "8.0.18", "versionEndIncluding": null, "...
[ "119" ]
119
https://github.com/kjur/jsrsasign/issues/439
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
The jsrsasign 8.0.16 RSA PKCS1 v1.5 decryption implementation does not detect prepended 0's bytes to the ciphertext and accepts modified ciphertexts without error. You can verify this using the following test vectors from Google Wycheproof: ``` { "algorithm" : "RSAES-PKCS1-v1_5", "generatorVersion" : "0.8r...
The RSA PKCS1 v1.5 decryption implementation does not detect ciphertext modification (prepended 0's bytes to the ciphertext)
https://api.github.com/repos/kjur/jsrsasign/issues/439/comments
3
2020-06-06T18:19:15Z
2020-08-18T10:34:28Z
https://github.com/kjur/jsrsasign/issues/439
632,645,335
439
1,304
CVE-2020-14968
2020-06-22T12:15:10.227
An issue was discovered in the jsrsasign package before 8.0.17 for Node.js. Its RSASSA-PSS (RSA-PSS) implementation does not detect signature manipulation/modification by prepending '\0' bytes to a signature (it accepts these modified signatures as valid). An attacker can abuse this behavior in an application by creati...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/438" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://g...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "2C7116EE-0321-40CF-94E7-EF494E9DF12C", "versionEndExcluding": "8.0.17", "versionEndIncluding": null, "...
[ "119" ]
119
https://github.com/kjur/jsrsasign/issues/438
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
The jsrsasign 8.0.16 RSASSA-PSS (RSA-PSS) implementation does not detect prepending 0s to the signature and accepts modifies signatures with prepended 0's as valid. You can verify this using the following test vectors from Google Wycheproof: ``` { "algorithm" : "RSASSA-PSS", "generatorVersion" : "0.8r12", ...
The RSA-PSS implementation does not detect signature modification (prepending "0" bytes) to the signature
https://api.github.com/repos/kjur/jsrsasign/issues/438/comments
3
2020-06-06T18:15:25Z
2020-08-18T10:36:20Z
https://github.com/kjur/jsrsasign/issues/438
632,642,479
438
1,305
CVE-2020-4068
2020-06-22T16:15:11.870
In APNSwift 1.0.0, calling APNSwiftSigner.sign(digest:) is likely to result in a heap buffer overflow. This has been fixed in 1.0.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/kylebrowning/APNSwift/commit/97fa7f69dcdd89168fff84e0ba8f999881ee3d3f" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.c...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apnswift_project:apnswift:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "15C15C89-986E-4A2C-AB33-92A3C5417759", "versionEndExcluding": null, "versionEndIncluding": null, "versionS...
[ "122" ]
122
https://github.com/kylebrowning/APNSwift/issues/31
[ "Issue Tracking" ]
github.com
[ "kylebrowning", "APNSwift" ]
**Describe the bug** This looks like quite a serious bug, the test suite is failing address sanitizer: ``` Test Suite 'All tests' started at 2019-07-22 11:43:35.772 am Test Suite 'apnswiftPackageTests.xctest' started at 2019-07-22 11:43:35.773 am Test Suite 'APNSwiftConfigurationTests' started at 2019-07-22 11:4...
memory unsafety -- address sanitizer failure
https://api.github.com/repos/swift-server-community/APNSwift/issues/31/comments
0
2019-07-22T13:01:29Z
2019-07-23T17:27:08Z
https://github.com/swift-server-community/APNSwift/issues/31
471,082,442
31
1,306
CVE-2020-14983
2020-06-22T20:15:11.380
The server in Chocolate Doom 3.0.0 and Crispy Doom 5.8.0 doesn't validate the user-controlled num_players value, leading to a buffer overflow. A malicious user can overwrite the server's stack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chocolate-doom:chocolate_doom:3.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "8A0A032A-7DAA-4ECA-AEA1-6A53174ED24C", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
[ "120" ]
120
https://github.com/chocolate-doom/chocolate-doom/issues/1293
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "chocolate-doom", "chocolate-doom" ]
### Background Version of Chocolate Doom: - Chocolate Doom 3.0.0 (from the website) - Chocolate Doom git revision 5bf73c4864fedb6b97b27bf302435a1168ba8f4c - confirmed also in: Crispy Doom 5.8.0 Operating System and version: Ubuntu 18.04 x86-64 Compilation: `CFLAGS="-fsanitize=address -ggdb -O0" LDFLAGS="...
Missing server-side num_players validation leading to buffer overflow
https://api.github.com/repos/chocolate-doom/chocolate-doom/issues/1293/comments
13
2020-06-22T16:20:12Z
2020-07-01T15:42:53Z
https://github.com/chocolate-doom/chocolate-doom/issues/1293
643,203,302
1,293
1,307
CVE-2020-10269
2020-06-24T05:15:12.647
One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). This information is al...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
[ "798" ]
798
https://github.com/aliasrobotics/RVD/issues/2566
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2566 title: 'RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point' type: vulnerability description: One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials t...
RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point
https://api.github.com/repos/aliasrobotics/RVD/issues/2566/comments
0
2020-06-24T04:59:00Z
2020-07-10T06:38:08Z
https://github.com/aliasrobotics/RVD/issues/2566
644,318,586
2,566
1,308
CVE-2020-10270
2020-06-24T05:15:12.753
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This information is also ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
[ "798" ]
798
https://github.com/aliasrobotics/RVD/issues/2557
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2557 title: 'RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard' type: vulnerability description: Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to s...
RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard
https://api.github.com/repos/aliasrobotics/RVD/issues/2557/comments
0
2020-06-24T04:43:23Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2557
644,313,367
2,557
1,309
CVE-2020-10271
2020-06-24T05:15:12.847
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
[ "668" ]
668
https://github.com/aliasrobotics/RVD/issues/2555
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2555 title: 'RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones' type: vulnerability description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computati...
RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones
https://api.github.com/repos/aliasrobotics/RVD/issues/2555/comments
0
2020-06-24T04:34:30Z
2020-07-10T06:38:04Z
https://github.com/aliasrobotics/RVD/issues/2555
644,310,466
2,555
1,310
CVE-2020-10272
2020-06-24T05:15:12.943
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE"...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
[ "306" ]
306
https://github.com/aliasrobotics/RVD/issues/2554
[ "Exploit", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2554 title: 'RVD#2554: MiR ROS computational graph presents no authentication mechanisms' type: vulnerability description: MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows atta...
RVD#2554: MiR ROS computational graph presents no authentication mechanisms
https://api.github.com/repos/aliasrobotics/RVD/issues/2554/comments
0
2020-06-24T04:14:56Z
2020-07-10T06:38:04Z
https://github.com/aliasrobotics/RVD/issues/2554
644,304,134
2,554
1,311
CVE-2020-10273
2020-06-24T05:15:13.020
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed i...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
[ "312" ]
312
https://github.com/aliasrobotics/RVD/issues/2560
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2560 title: 'RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers' type: vulnerability description: MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. ...
RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers
https://api.github.com/repos/aliasrobotics/RVD/issues/2560/comments
0
2020-06-24T04:50:27Z
2020-07-10T06:38:06Z
https://github.com/aliasrobotics/RVD/issues/2560
644,315,644
2,560
1,312
CVE-2020-10274
2020-06-24T05:15:13.113
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL"...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
[ "330" ]
330
https://github.com/aliasrobotics/RVD/issues/2556
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2556 title: 'RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps)' type: vulnerability description: The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dash...
RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps)
https://api.github.com/repos/aliasrobotics/RVD/issues/2556/comments
0
2020-06-24T04:37:32Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2556
644,311,434
2,556
1,313
CVE-2020-10275
2020-06-24T05:15:13.193
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to co...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
[ "326" ]
326
https://github.com/aliasrobotics/RVD/issues/2565
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2565 title: 'RVD#2565: Weak token generation for the REST API.' type: vulnerability description: The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly wi...
RVD#2565: Weak token generation for the REST API.
https://api.github.com/repos/aliasrobotics/RVD/issues/2565/comments
0
2020-06-24T04:56:18Z
2020-07-10T06:38:08Z
https://github.com/aliasrobotics/RVD/issues/2565
644,317,700
2,565
1,314
CVE-2020-10276
2020-06-24T05:15:13.270
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not af...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2558" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
[ "798" ]
798
https://github.com/aliasrobotics/RVD/issues/2558
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2558 title: 'RVD#2558: Default credentials on SICK PLC allows disabling safety features' type: vulnerability description: The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabli...
RVD#2558: Default credentials on SICK PLC allows disabling safety features
https://api.github.com/repos/aliasrobotics/RVD/issues/2558/comments
0
2020-06-24T04:45:55Z
2020-07-10T06:38:05Z
https://github.com/aliasrobotics/RVD/issues/2558
644,314,162
2,558
1,315
CVE-2020-10277
2020-06-24T05:15:13.347
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
[ "656" ]
656
https://github.com/aliasrobotics/RVD/issues/2562
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2562 title: 'RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation' type: vulnerability description: There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as th...
RVD#2562: Booting from a live image leads to exfiltration of sensible information and privilege escalation
https://api.github.com/repos/aliasrobotics/RVD/issues/2562/comments
0
2020-06-24T04:52:57Z
2020-07-10T06:38:07Z
https://github.com/aliasrobotics/RVD/issues/2562
644,316,520
2,562
1,316
CVE-2020-10278
2020-06-24T05:15:13.443
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBDEDA2D-26AB-4F23-B672-D0C89A7BEFB9", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", "ver...
[ "287" ]
287
https://github.com/aliasrobotics/RVD/issues/2561
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2561 title: 'RVD#2561: Unprotected BIOS allows user to boot from live OS image.' type: vulnerability description: The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator t...
RVD#2561: Unprotected BIOS allows user to boot from live OS image.
https://api.github.com/repos/aliasrobotics/RVD/issues/2561/comments
0
2020-06-24T04:51:45Z
2020-07-10T06:38:06Z
https://github.com/aliasrobotics/RVD/issues/2561
644,316,102
2,561
1,317
CVE-2020-10280
2020-06-24T06:15:11.620
The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/2568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1ED80A-1AE1-4868-AD13-F37079F69B60", "versionEndExcluding": null, "versionEndIncluding": "2.8.1.1", ...
[ "404" ]
404
https://github.com/aliasrobotics/RVD/issues/2568
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 2568 title: 'RVD#2568: Apache server is vulnerable to a DoS' type: vulnerability description: The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard. cwe: CWE-239 cve: CVE-2020-10280 k...
RVD#2568: Apache server is vulnerable to a DoS
https://api.github.com/repos/aliasrobotics/RVD/issues/2568/comments
0
2020-06-24T05:44:10Z
2020-07-10T06:38:09Z
https://github.com/aliasrobotics/RVD/issues/2568
644,335,617
2,568
1,319
CVE-2020-15006
2020-06-24T11:15:11.980
Bludit 3.12.0 allows stored XSS via JavaScript code in an SVG document to bl-kernel/ajax/logo-upload.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Par...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "79" ]
79
https://github.com/bludit/bludit/issues/1212
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe your problem https://github.com/bludit/bludit/blob/master/bl-kernel/ajax/logo-upload.php Logo upload only determines the suffix, but not the content, which causes XSS and the user can inject any javascript and html code in the page payload ![image](https://user-images.githubusercontent.com/8120951...
Store XSS
https://api.github.com/repos/bludit/bludit/issues/1212/comments
10
2020-06-19T07:23:19Z
2022-02-22T16:10:21Z
https://github.com/bludit/bludit/issues/1212
641,764,976
1,212
1,320
CVE-2020-15014
2020-06-24T13:15:11.660
pramodmahato BlogCMS through 2019-12-31 has admin/changepass.php CSRF.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pramodmahato/BlogCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gith...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pramod:blogcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "94FCCF28-520A-48AF-B142-004F8FCC952A", "versionEndExcluding": null, "versionEndIncluding": "2019-12-31", "versionStartExc...
[ "352" ]
352
https://github.com/pramodmahato/BlogCMS/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pramodmahato", "BlogCMS" ]
First,let's look at /BlogCMS-master/admin/changepass.php file.This file does not filter the "referer": ``` <?php include("config.php"); session_start(); if(isset($_SESSION['ID'])) { $email=$_SESSION['ID']; } else { $site= "<script type='text/javascript'>window.location='...
There is a csrf vulnerability in changepass.php file
https://api.github.com/repos/pramodmahato/BlogCMS/issues/1/comments
0
2020-06-24T06:42:26Z
2020-08-25T14:20:29Z
https://github.com/pramodmahato/BlogCMS/issues/1
644,361,707
1
1,321
CVE-2020-15018
2020-06-24T13:15:11.740
playSMS through 1.4.3 is vulnerable to session fixation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/antonraharja/playSMS/issues/605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:playsms:playsms:*:*:*:*:*:*:*:*", "matchCriteriaId": "48CD3510-5247-4DC3-8462-A632A8CA1E5C", "versionEndExcluding": null, "versionEndIncluding": "1.4.3", "versionStartExcludi...
[ "384" ]
384
https://github.com/antonraharja/playSMS/issues/605
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "antonraharja", "playSMS" ]
PlaySMS is vulnerable to Session fixation ( all versions, including the latest ). Due to the lack of randomization of the sessionID and reuse of sessionID (prior login, after login). An attacker can set the user's session and can take control of the user's account. Steps to reproduce: 1. Login to PlaySMS ( Note ...
Session Fixation
https://api.github.com/repos/playsms/playsms/issues/605/comments
1
2020-03-20T06:59:49Z
2020-05-01T17:26:38Z
https://github.com/playsms/playsms/issues/605
584,879,228
605
1,322
CVE-2020-15026
2020-06-24T19:15:10.287
Bludit 3.12.0 allows admins to use a /plugin-backup-download?file=../ directory traversal approach for arbitrary file download via backup/plugin.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ]...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcludi...
[ "22" ]
22
https://github.com/bludit/bludit/issues/1214
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### **problem** hi, The problem is in the backup plugin, the $file parameter is not filtered, resulting in arbitrary file downloads ### **recurrent** ![image](https://user-images.githubusercontent.com/21289548/85357036-16500280-b543-11ea-9c7b-10d78fbf6e57.png) ### **repair** [https://github.com/bludit/bludit/blob/...
Arbitrary file download vulnerability
https://api.github.com/repos/bludit/bludit/issues/1214/comments
1
2020-06-23T03:25:01Z
2020-06-23T17:59:50Z
https://github.com/bludit/bludit/issues/1214
643,500,132
1,214
1,323
CVE-2013-7489
2020-06-26T20:15:11.760
The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850105" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bbangert/beaker/issues/...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beakerbrowser:beaker:*:*:*:*:*:python:*:*", "matchCriteriaId": "F00F62FC-5ED4-4E5A-8180-B7FFA99C67BF", "versionEndExcluding": null, "versionEndIncluding": "1.11.0", "versionS...
[ "502" ]
502
https://github.com/bbangert/beaker/issues/191
[ "Third Party Advisory" ]
github.com
[ "bbangert", "beaker" ]
Hello, Beaker uses Pickle on Session and Cache. On Session at least it has support to secret/HMAC but on caching it doesn't which can lead to arbitrary code execution. https://github.com/bbangert/beaker/issues/35 Maybe it would be wise to expose data_serializer in Cache too and maybe even allow a secret defini...
Insecure data serialization method by default with pickle on Cache
https://api.github.com/repos/bbangert/beaker/issues/191/comments
14
2020-05-14T18:02:40Z
2022-07-11T16:26:00Z
https://github.com/bbangert/beaker/issues/191
618,431,819
191
1,324
CVE-2020-15365
2020-06-28T13:15:10.157
LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/iss...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:0.20:beta3:*:*:*:*:*:*", "matchCriteriaId": "91AB2B37-1EF7-4A77-86B8-122D7719D234", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclu...
[ "787" ]
787
https://github.com/LibRaw/LibRaw/issues/301
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
**Description** An out-of-bounds write vulnerability exists within the "LibRaw::parse_exif()" function (libraw\src\metadata\exif_gps.cpp) which can be triggered by changing the AtomName from "CMT1" to an unknown name and making the "tiff_nifds" field equals zero. **Steps to Reproduce** (poc archive password= ...
"LibRaw::parse_exif()" Out-of-bounds write vulnerability
https://api.github.com/repos/LibRaw/LibRaw/issues/301/comments
1
2020-06-15T14:19:19Z
2020-06-16T10:21:32Z
https://github.com/LibRaw/LibRaw/issues/301
638,892,456
301
1,325
CVE-2020-15362
2020-06-29T17:15:11.430
wifiscanner.js in thingsSDK WiFi Scanner 1.0.1 allows Code Injection because it can be used with options to overwrite the default executable/binary path and its arguments. An attacker can abuse this functionality to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/thingsSDK/wifiscanner/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://git...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thingssdk:wifiscanner:1.0.1:*:*:*:*:node.js:*:*", "matchCriteriaId": "5740B6F4-9D59-420E-AEDA-842560F2B9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versio...
[ "78" ]
78
https://github.com/thingsSDK/wifiscanner/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "thingsSDK", "wifiscanner" ]
This module can be used with options that can be used to overwrite default executable/binary path and arguments to the said executable/binary. An attacker can abuse this functionality to have the module execute a binary of their choice. The following code snippets in the wifiscanner.js is responsible for the issue. ...
Remote Code Execution Bug due to Improper Input Sanitization
https://api.github.com/repos/thingsSDK/wifiscanner/issues/1/comments
0
2020-06-11T03:20:43Z
2020-06-11T03:20:43Z
https://github.com/thingsSDK/wifiscanner/issues/1
636,686,417
1
1,326
CVE-2020-4067
2020-06-29T20:15:10.413
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*", "matchCriteriaId": "C96CC629-0987-4323-8C5D-37D26FFE603B", "versionEndExcluding": "4.5.1.3", "versionEndIncluding": null, "versionStar...
[ "665" ]
665
https://github.com/coturn/coturn/issues/583
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "coturn", "coturn" ]
Hi, I would like to report a (potentially exploitable) security issue in coturn, but I am not sure what the expected process is and if you desire to discuss this issue confidentially until it is resolved. Regarding the criticality/impact: I am not completely sure, what the impact is, but I can imagine that this can ...
Reporting a security issue: CVE-2020-4067
https://api.github.com/repos/coturn/coturn/issues/583/comments
3
2020-06-17T10:12:53Z
2020-06-29T19:31:22Z
https://github.com/coturn/coturn/issues/583
640,318,786
583
1,327
CVE-2020-15389
2020-06-29T21:15:14.150
jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1261" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "0142BF7B-EBFC-4EAD-87C8-7D0FFF7E9486", "versionEndExcluding": null, "versionEndIncluding": "2.3.1", "versionStartExcl...
[ "416" ]
416
https://github.com/uclouvain/openjpeg/issues/1261
[ "Patch", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
There is a heap use-after-free vulnerability in openjpeg/build/bin/libopenjp2.so.7. I would also like to request a CVE if that's okay or I can do it myself if you're busy, no worries. Here is the ASAN output: [out.txt](https://github.com/uclouvain/openjpeg/files/4842045/out.txt) Here is the command executed t...
Heap use-after-free
https://api.github.com/repos/uclouvain/openjpeg/issues/1261/comments
6
2020-06-28T10:06:42Z
2020-06-30T20:05:15Z
https://github.com/uclouvain/openjpeg/issues/1261
646,886,328
1,261
1,328
CVE-2020-15470
2020-07-01T11:15:10.880
ffjpeg through 2020-02-24 has a heap-based buffer overflow in jfif_decode in jfif.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6FB3E34-01AE-4929-99A3-4A246FC15008", "versionEndExcluding": null, "versionEndIncluding": "2020-02-24", "versionStartE...
[ "787" ]
787
https://github.com/rockcarry/ffjpeg/issues/26
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
ffjpeg "jfif_decode()" function heap-overflow vulnerability Description: There is a heap-overflow bug in jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c : line 516. An attacker can exploit this bug to cause a Denial of Service (DoS) by submitting a malicious jpeg image. The bug is caused by the fol...
ffjpeg "jfif_decode()" function heap-overflow vulnerability
https://api.github.com/repos/rockcarry/ffjpeg/issues/26/comments
3
2020-06-30T05:18:26Z
2020-12-02T00:21:37Z
https://github.com/rockcarry/ffjpeg/issues/26
647,869,169
26
1,329
CVE-2020-15500
2020-07-01T23:15:10.333
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162193/Tileserver-gl-3.0.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tileserver:tileservergl:*:*:*:*:*:*:*:*", "matchCriteriaId": "96936A8C-DA3A-45DD-8105-D3B7AA4D4AA1", "versionEndExcluding": null, "versionEndIncluding": "3.0.0", "versionStar...
[ "79" ]
79
https://github.com/maptiler/tileserver-gl/issues/461
[ "Exploit", "Third Party Advisory" ]
github.com
[ "maptiler", "tileserver-gl" ]
Hi, I stumbled upon a reflected XSS in the software. It stems from reflecting unsanitized user controller input directly to the HTTP response. I initially observed this in Tileserver GL 2.5, but from the looks of it it's still present in the current `master`. Vulnerable request example: ``` https://example.o...
Reflected XSS vulnerability in the application main page
https://api.github.com/repos/maptiler/tileserver-gl/issues/461/comments
0
2020-07-01T17:12:34Z
2020-07-02T07:50:50Z
https://github.com/maptiler/tileserver-gl/issues/461
649,140,488
461
1,331
CVE-2020-15502
2020-07-02T11:15:10.823
The DuckDuckGo application through 5.58.0 for Android, and through 7.47.1.0 for iOS, sends hostnames of visited web sites within HTTPS .ico requests to servers in the duckduckgo.com domain, which might make visit data available temporarily at a Potentially Unwanted Endpoint. NOTE: the vendor has stated "the favicon ser...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/duckduckgo/Android/blob/e2f2d54a6b4452277467db403a3546512401b493/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L83-L88" }, { "source": "cve@mitre.org", "tags": [...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:duckduckgo:duckduckgo:*:*:*:*:*:android:*:*", "matchCriteriaId": "EB112090-6A82-49D0-B4C3-498308F273C2", "versionEndExcluding": null, "versionEndIncluding": "5.58.0", "versio...
[ "200" ]
200
https://github.com/duckduckgo/Android/issues/527
[ "Third Party Advisory" ]
github.com
[ "duckduckgo", "Android" ]
https://github.com/duckduckgo/Android/blob/ed91c9e551d2a9e1559199f110bd94c076784c71/app/src/main/java/com/duckduckgo/app/global/UriExtension.kt#L60 This seems to be leaking all(?) the domains that users visit to your servers.
Domains visited get leaked to DDG servers
https://api.github.com/repos/duckduckgo/Android/issues/527/comments
96
2019-07-09T13:02:51Z
2022-05-16T16:34:00Z
https://github.com/duckduckgo/Android/issues/527
465,768,374
527
1,332
CVE-2019-20894
2020-07-02T16:15:11.357
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/containous/traefik/issues/5312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Thir...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3797D3C-EEE8-4FC6-9B4A-43DDF66C92AF", "versionEndExcluding": "2.0.1", "versionEndIncluding": null, "versionStartExcludi...
[ "295" ]
295
https://github.com/containous/traefik/issues/5312
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "containous", "traefik" ]
### Do you want to request a *feature* or report a *bug*? Bug ### Did you try using a 1.7.x configuration for the version 2.0? - [ ] Yes - [x] No ### What did you do? [Very good illustration](https://github.com/containous/traefik/issues/4260) of very related problem. I have 2 ingress routes with kubern...
Mutual TLS verification skipped for established connection
https://api.github.com/repos/traefik/traefik/issues/5312/comments
8
2019-09-06T13:32:38Z
2020-08-08T00:00:03Z
https://github.com/traefik/traefik/issues/5312
490,330,116
5,312
1,333
CVE-2020-15091
2020-07-02T17:15:12.547
TenderMint from version 0.33.0 and before version 0.33.6 allows block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it (**without changing chainID**). A malicious block proposer (even with a minimal amount of stake) can use t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", ...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issu...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tendermint:tendermint:*:*:*:*:*:*:*:*", "matchCriteriaId": "48BDDFA1-3EF9-4F28-9686-41B9A2898B79", "versionEndExcluding": "0.33.6", "versionEndIncluding": null, "versionStart...
[ "347" ]
347
https://github.com/tendermint/tendermint/issues/4926
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tendermint", "tendermint" ]
**Tendermint version**: Tendermint Core Semantic Version: 0.33.3 P2P Protocol Version: 7 Block Protocol Version: 10 ``` "node_info": { "protocol_version": { "p2p": "7", "block": "10", "app": "0" }, "id": "dbc39feecf277f59b4b16ae277e8545c54ac244a", "listen_addr": "tcp://0....
Consensus: "enterPrevote: ProposalBlock is invalid" - Error: "wrong signature"
https://api.github.com/repos/tendermint/tendermint/issues/4926/comments
17
2020-05-31T06:18:15Z
2020-07-03T09:59:16Z
https://github.com/tendermint/tendermint/issues/4926
627,901,870
4,926
1,334
CVE-2020-7690
2020-07-06T13:15:10.610
All affected versions <2.0.0 of package jspdf are vulnerable to Cross-site Scripting (XSS). It is possible to inject JavaScript code via the html method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/MrRio/jsPDF/issues/2795" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSPDF-5752...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:parall:jspdf:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "386200BA-6CC6-42AD-8D2B-DBE8DAEAF822", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/MrRio/jsPDF/issues/2795
[ "Exploit", "Third Party Advisory" ]
github.com
[ "MrRio", "jsPDF" ]
When using the html method, it is possible to inject code that is executed in the user context. E.g. like this: ```js const doc = new jsPDF(); window.html2canvas = html2canvas; const html = ` <p id='test'>a</p> <img src=x onerror=eval("document.getElementById('test').innerHTML=window.location") /> `; doc.html(h...
XSS vulnerability in html method
https://api.github.com/repos/parallax/jsPDF/issues/2795/comments
4
2020-07-02T15:07:14Z
2020-07-09T14:00:14Z
https://github.com/parallax/jsPDF/issues/2795
650,007,126
2,795
1,335
CVE-2020-15600
2020-07-07T22:15:10.317
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158455/CMSUno-1.6-Cross-Site-Request-Forgery.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cmsuno_project:cmsuno:*:*:*:*:*:*:*:*", "matchCriteriaId": "66BE864A-39B8-42BD-A115-0084D9A5F2DE", "versionEndExcluding": "1.6.1", "versionEndIncluding": null, "versionStartE...
[ "352" ]
352
https://github.com/boiteasite/cmsuno/issues/15
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "boiteasite", "cmsuno" ]
Affected software: Cmsuno CMS Type of vulnerability: CSRF (Cross-Site Request Forgery) Discovered by: Noth Author: Noth Version : v.1.6 Description: Cmsuno CMS is vulnerable to persistent Cross-Site Request Forgery attacks, which allow malicious users to inject HTML or scripts and forge user permissions...
CSRF Vulnerability v1.6
https://api.github.com/repos/boiteasite/cmsuno/issues/15/comments
7
2020-05-30T21:38:48Z
2021-08-04T17:56:47Z
https://github.com/boiteasite/cmsuno/issues/15
627,827,921
15
1,336
CVE-2020-7692
2020-07-09T14:15:11.107
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able t...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", ...
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url":...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:oauth_client_library_for_java:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DDA599C-C892-4548-9C70-87191A82F42F", "versionEndExcluding": "1.31.0", "versionEndIncluding": null, ...
[ "863" ]
863
https://github.com/googleapis/google-oauth-java-client/issues/469
[ "Third Party Advisory" ]
github.com
[ "googleapis", "google-oauth-java-client" ]
I've been looking for information about how to enable PKCE when using the AuthorizationCodeFlow but haven't found anything. Am I missing something or is PKCE not supported (out of the box) by this library?
PKCE support?
https://api.github.com/repos/googleapis/google-oauth-java-client/issues/469/comments
7
2020-05-26T17:52:41Z
2021-02-02T01:59:25Z
https://github.com/googleapis/google-oauth-java-client/issues/469
625,071,777
469
1,337
CVE-2020-7693
2020-07-09T14:15:11.197
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/andsnw/sockjs-dos-py" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sockjs/sockjs-node/commit...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sockjs_project:sockjs:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "3C576127-F274-4E41-ACA9-24E32CA01599", "versionEndExcluding": "0.3.20", "versionEndIncluding": null, "versio...
[ "755" ]
755
https://github.com/sockjs/sockjs-node/issues/252
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "sockjs", "sockjs-node" ]
On version 0.3.19 (and I believe in 0.4 also), when issuing upgrade request on wrong URL i.e. `/prefix/wrongpath`, `fake_response` calls `res.end()` in a `try..catch` block and then `res.end()` is being called for the second time in `handle_404` method - which throws...
ERR_STREAM_WRITE_AFTER_END when issuing upgrade request on non-existent URL
https://api.github.com/repos/sockjs/sockjs-node/issues/252/comments
12
2019-02-11T10:19:37Z
2020-03-06T20:41:42Z
https://github.com/sockjs/sockjs-node/issues/252
408,712,412
252
1,338
CVE-2020-11081
2020-07-10T19:15:11.553
osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIA...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Trac...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:osquery:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C2CBEA8-4F6B-429A-BBBC-4E7BA6BF5414", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStar...
[ "426" ]
426
https://github.com/osquery/osquery/issues/6426
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "osquery", "osquery" ]
Hell osquery team, As per facebook security team, they (Teddy) recommended to create issue here. Title Privilege Escalation Bug in Osquery 4.2.0 (windows) via Dll Hijacking Vuln Type Code Execution Product Area Open Source (e.g. HHVM) Description/Impact Complete Details [This should be the longest...
Privilege Escalation Bug in Osquery 4.2.0 (windows) via Dll Search Order Hijacking
https://api.github.com/repos/osquery/osquery/issues/6426/comments
15
2020-05-01T16:55:20Z
2023-01-25T19:21:50Z
https://github.com/osquery/osquery/issues/6426
610,853,126
6,426
1,339
CVE-2020-10285
2020-07-15T21:15:12.193
The authentication implementation on the xArm controller has very low entropy, making it vulnerable to a brute-force attack. There is no mechanism in place to mitigate or lockout automated attempts to gain access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versi...
[ "331" ]
331
https://github.com/aliasrobotics/RVD/issues/3322
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3322 title: 'RVD#3322: Weak authentication implementation make the system vulnerable to a brute-force attack over adjacent networks' type: vulnerability description: The authentication implementation on the xArm controller has very low entropy, making it vulnerable to a brute-force attack. There i...
RVD#3322: Weak authentication implementation make the system vulnerable to a brute-force attack over adjacent networks
https://api.github.com/repos/aliasrobotics/RVD/issues/3322/comments
0
2020-07-15T20:55:50Z
2020-07-15T20:57:07Z
https://github.com/aliasrobotics/RVD/issues/3322
657,649,760
3,322
1,340
CVE-2020-10286
2020-07-15T22:15:13.857
the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to prevent sudo su or sudo -i to be run gaining unrestricted access to sensible files, encryption, or issue orders that disrupt robot operation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact":...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ufactory:xarm_5_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A890A4C3-06E6-4A87-A2D5-D57BFD1CFE9D", "versionEndExcluding": null, "versionEndIncluding": "1.5.0", "versi...
[ "269" ]
269
https://github.com/aliasrobotics/RVD/issues/3323
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3323 title: 'RVD#3323: Mismanaged permission implementation leads to privilege escalation, exfiltration of sensitive information, and DoS' type: vulnerability description: "the main user account has restricted privileges but is in the sudoers group and there is not any mechanism in place to preven...
RVD#3323: Mismanaged permission implementation leads to privilege escalation, exfiltration of sensitive information, and DoS
https://api.github.com/repos/aliasrobotics/RVD/issues/3323/comments
0
2020-07-15T21:06:12Z
2020-07-15T21:09:16Z
https://github.com/aliasrobotics/RVD/issues/3323
657,656,985
3,323
1,341
CVE-2020-10287
2020-07-15T23:15:11.283
The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and conside...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:irb140_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D490DBD-AF3C-46EF-8CA0-6C113C7FF3A8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExclud...
[ "522" ]
522
https://github.com/aliasrobotics/RVD/issues/3326
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3326 title: 'RVD#3326: Hardcoded default credentials on IRC 5 OPC Server' type: exposure description: The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up ...
RVD#3326: Hardcoded default credentials on IRC 5 OPC Server
https://api.github.com/repos/aliasrobotics/RVD/issues/3326/comments
0
2020-07-15T21:59:00Z
2020-07-15T22:05:07Z
https://github.com/aliasrobotics/RVD/issues/3326
657,686,393
3,326
1,342
CVE-2020-10288
2020-07-15T23:15:11.393
IRC5 exposes an ftp server (port 21). Upon attempting to gain access you are challenged with a request of username and password, however you can input whatever you like. As long as the field isn't empty it will be accepted.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@aliasrobotics.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/issues/3327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/aliasrobotics/RVD/i...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:abb:robotware:5.09:*:*:*:*:*:*:*", "matchCriteriaId": "C9C363AC-475E-42E1-937B-D34A45AE9E32", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding...
[ "287" ]
287
https://github.com/aliasrobotics/RVD/issues/3327
[ "Third Party Advisory" ]
github.com
[ "aliasrobotics", "RVD" ]
```yaml id: 3327 title: 'RVD#3327: No authentication required for accesing ABB IRC5 FTP server' type: vulnerability description: IRC5 exposes an ftp server (port 21). Upon attempting to gain access you are challenged with a request of username and password, however you can input whatever you like. As long as the fi...
RVD#3327: No authentication required for accesing ABB IRC5 FTP server
https://api.github.com/repos/aliasrobotics/RVD/issues/3327/comments
0
2020-07-15T22:03:16Z
2020-07-15T22:05:07Z
https://github.com/aliasrobotics/RVD/issues/3327
657,688,647
3,327
1,343
CVE-2019-20909
2020-07-16T18:15:12.690
An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/commit/d7913b893bfa98fab27f05825dc4cab2d3a20c83" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "h...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "28E3A7DE-65A0-4A6B-BF63-00F627CF17CB", "versionEndExcluding": null, "versionEndIncluding": "0.9.3", "versionStartExcluding"...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/178
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs, and I tested on master branch and version **0.9.3**. There are **3 heap overflow**, **2 NULL pointer deference**, **1 denial of service**, **1 stack overflow** (this bug causes memory leak in master branch) in that. Compile with **ASAN** and use **dwgrewrite** to repro that. Hear are some detail...
Several bugs need to be fixed.
https://api.github.com/repos/LibreDWG/libredwg/issues/178/comments
19
2019-12-31T06:04:23Z
2025-01-06T10:24:48Z
https://github.com/LibreDWG/libredwg/issues/178
544,098,538
178
1,344
CVE-2020-7696
2020-07-17T10:15:12.467
This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DylanVann/react-native-fast-image/issues/690" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "u...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:react-native-fast-image_project:react-native-fast-image:*:*:*:*:*:*:*:*", "matchCriteriaId": "08F2A94F-6529-4117-B798-A6B5741CC615", "versionEndExcluding": null, "versionEndIncluding": n...
[ "200" ]
200
https://github.com/DylanVann/react-native-fast-image/issues/690
[ "Exploit", "Third Party Advisory" ]
github.com
[ "DylanVann", "react-native-fast-image" ]
**Describe the bug** When an image with `source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }}` is loaded, all other subsequent images will use the same headers. This can lead to images not showing, because the `host` header is wrong, and web servers will return 404 errors for the request....
[iOS] Headers for one request are sent for all subsequent requests, even if no headers specified
https://api.github.com/repos/DylanVann/react-native-fast-image/issues/690/comments
4
2020-06-05T09:52:30Z
2020-07-17T08:39:07Z
https://github.com/DylanVann/react-native-fast-image/issues/690
631,464,734
690
1,345
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding":...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/186
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hello, I got a NULL pointer deference bug in **0.10.1.2677 and even earlier** by run `dxf2dwg poc -o /dev/null` ``` ==12391==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f9f9b4f3284 bp 0x7ffcfa3b08a0 sp 0x7ffcfa3b0860 T0) ==12391==The signal is caused by a READ memory access. ==12391==Hi...
NULL pointer deference
https://api.github.com/repos/LibreDWG/libredwg/issues/186/comments
3
2020-01-14T12:30:37Z
2020-07-20T02:14:44Z
https://github.com/LibreDWG/libredwg/issues/186
549,536,132
186
1,346
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding":...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/189
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`.
Some NULL pointer bugs
https://api.github.com/repos/LibreDWG/libredwg/issues/189/comments
58
2020-01-16T11:36:57Z
2020-07-20T02:15:32Z
https://github.com/LibreDWG/libredwg/issues/189
550,751,408
189
1,347
CVE-2020-15807
2020-07-17T16:15:11.560
GNU LibreDWG before 0.11 allows NULL pointer dereferences via crafted input files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/186" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:*:*:*:*:*:*:*:*", "matchCriteriaId": "581DFE64-B504-4D86-AAAA-33836C432C53", "versionEndExcluding": "0.11", "versionEndIncluding": null, "versionStartExcluding":...
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
Hi, I got some bugs which you can reproduce `dxf2dwg $PoC -o /dev/null` .Thses bugs work on version `0.10.1.2685` and `earlier`.
Some heap_overflow bug
https://api.github.com/repos/LibreDWG/libredwg/issues/190/comments
5
2020-01-16T11:51:56Z
2020-07-20T02:16:17Z
https://github.com/LibreDWG/libredwg/issues/190
550,758,758
190
1,348
CVE-2020-15813
2020-07-17T19:15:12.547
Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not impl...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Graylog2/graylog2-server/issues/5906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Graylog2/graylog2-se...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:graylog:graylog:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9A21A46-6422-4E60-ADAA-9605AB691F95", "versionEndExcluding": "3.3.3", "versionEndIncluding": null, "versionStartExcludi...
[ "295" ]
295
https://github.com/Graylog2/graylog2-server/issues/5906
[ "Third Party Advisory" ]
github.com
[ "Graylog2", "graylog2-server" ]
<!--- Provide a general summary of the issue in the Title above --> ## Expected Behavior <!--- If you're describing a bug, tell us what should happen --> <!--- If you're suggesting a change/improvement, tell us how it should work --> Graylog should verify the LDAP server certificate chain up to a trusted root, an...
LDAP connector does not verify TLS certificates
https://api.github.com/repos/Graylog2/graylog2-server/issues/5906/comments
3
2019-04-24T14:39:48Z
2020-08-03T11:26:01Z
https://github.com/Graylog2/graylog2-server/issues/5906
436,737,118
5,906
1,349
CVE-2020-7680
2020-07-20T16:15:12.350
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaS...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", ...
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advi...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:docsifyjs:docsify:*:*:*:*:*:*:*:*", "matchCriteriaId": "D61038D6-B6F5-4297-A237-100706E35264", "versionEndExcluding": "4.11.4", "versionEndIncluding": null, "versionStartExcl...
[ "79" ]
79
https://github.com/docsifyjs/docsify/issues/1126
[ "Third Party Advisory" ]
github.com
[ "docsifyjs", "docsify" ]
<!-- Please don't delete this template or we'll close your issue --> <!-- Please use English language --> <!-- Before creating an issue please make sure you are using the latest version of Docsify. --> <!-- Please ask questions on StackOverflow: https://stackoverflow.com/questions/ask?tags=docsify --> <!-- Please a...
vulnerability report
https://api.github.com/repos/docsifyjs/docsify/issues/1126/comments
17
2020-04-19T19:19:47Z
2021-02-05T05:56:29Z
https://github.com/docsifyjs/docsify/issues/1126
602,798,447
1,126
1,350
CVE-2020-15121
2020-07-20T18:15:12.187
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PART...
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/radareorg/radare2/commit/04edfa82c1f3fa2bc3621ccdad2f93bdbf00e4f9" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2252909-1FFD-484D-AC5B-6227CD4FB1BA", "versionEndExcluding": "4.5.0", "versionEndIncluding": null, "versionStartExcludin...
[ "78" ]
78
https://github.com/radareorg/radare2/issues/16945
[ "Third Party Advisory" ]
github.com
[ "radareorg", "radare2" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | N/A | File format of the file you reverse (mandatory) | PE | Architecture/bits of the fi...
Command injection across r_sys_cmd*
https://api.github.com/repos/radareorg/radare2/issues/16945/comments
10
2020-05-24T12:20:29Z
2020-07-21T03:48:53Z
https://github.com/radareorg/radare2/issues/16945
623,853,564
16,945
1,351
CVE-2020-15866
2020-07-21T15:15:14.537
mruby through 2.1.2-rc has a heap-based buffer overflow in the mrb_yield_with_class function in vm.c because of incorrect VM stack handling. It can be triggered via the stack_copy function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL",...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mruby/mruby/issues/5042" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mruby:mruby:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E24840A-138B-4CE3-AF5D-FB9426BB10A1", "versionEndExcluding": null, "versionEndIncluding": "2.1.1", "versionStartExcluding":...
[ "787" ]
787
https://github.com/mruby/mruby/issues/5042
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mruby", "mruby" ]
A heap buffer overflow exists in `mrb_yield_with_class` function in `src/vm.c:767` triggered via `stack_copy`. The bug can be detected on Ubuntu-18.04 64-bit with ASAN-enabled mruby. It has been reproduced with mruby compiled with different compiler toolchains: `clang-9, clang-10, gcc-7.5`. The POC input and steps to r...
Heap buffer overflow in mruby interpreter
https://api.github.com/repos/mruby/mruby/issues/5042/comments
1
2020-07-20T21:23:46Z
2020-07-21T03:54:12Z
https://github.com/mruby/mruby/issues/5042
662,278,596
5,042
1,352
CVE-2020-15890
2020-07-21T22:15:12.197
LuaJit through 2.1.0-beta3 has an out-of-bounds read because __gc handler frame traversal is mishandled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", ...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LuaJIT/LuaJIT/issues/601" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*", "matchCriteriaId": "7369364F-A393-4616-B40E-8097CA70E957", "versionEndExcluding": null, "versionEndIncluding": "2.0.5", "versionStartExcluding...
[ "125" ]
125
https://github.com/LuaJIT/LuaJIT/issues/601
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LuaJIT", "LuaJIT" ]
Hi, we found a crash in LuaJit Version: 2.1. Git hash: `384d6d56f4a3841fdef607a511dda92a579af2ff` POC: ```lua a = newproxy ( true ) getmetatable ( a ) . __gc = function ( ) rep129 = load ( function ( ) collectgarbage ( ) ( ) end ) end for i = 1 , 10000000 do newproxy ( a ) end ``` Stack dump: ...
Segmentation fault in lj_err_run
https://api.github.com/repos/LuaJIT/LuaJIT/issues/601/comments
4
2020-07-10T23:37:23Z
2020-08-18T10:02:13Z
https://github.com/LuaJIT/LuaJIT/issues/601
655,086,702
601
1,353
CVE-2020-8559
2020-07-22T14:15:16.517
The Kubernetes kube-apiserver in versions v1.6-v1.15, and versions prior to v1.16.13, v1.17.9 and v1.18.6 are vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PART...
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/92914" }, { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Third Party Advisory" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "43222A9D-6D48-490F-8120-349DCE1C1218", "versionEndExcluding": null, "versionEndIncluding": "1.15.0", "versionStart...
[ "601" ]
601
https://github.com/kubernetes/kubernetes/issues/92914
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: Medium (6.4) [CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H) If an attacker is able to intercept certain requests to the Kubelet, they can send a redirect response that may be followed by a client using the credential...
CVE-2020-8559: Privilege escalation from compromised node to cluster
https://api.github.com/repos/kubernetes/kubernetes/issues/92914/comments
7
2020-07-08T17:03:16Z
2021-12-02T22:54:32Z
https://github.com/kubernetes/kubernetes/issues/92914
653,456,402
92,914
1,354
CVE-2020-8557
2020-07-23T17:15:12.513
The Kubernetes kubelet component in versions 1.1-1.16.12, 1.17.0-1.17.8 and 1.18.0-1.18.5 do not account for disk usage by a pod which writes to its own /etc/hosts file. The /etc/hosts file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral storage usage by a pod. If ...
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", ...
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/93032" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "12849C27-DD8A-4D84-92FD-3AB32B43742B", "versionEndExcluding": "1.16.13", "versionEndIncluding": null, "versionStar...
[ "400" ]
400
https://github.com/kubernetes/kubernetes/issues/93032
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: Medium (5.5)  [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/CR:H/IR:H/AR:M) The `/etc/hosts` file mounted in a pod by kubelet is not included by the kubelet eviction manager when calculating ephemeral ...
CVE-2020-8557: Node disk DOS by writing to container /etc/hosts
https://api.github.com/repos/kubernetes/kubernetes/issues/93032/comments
4
2020-07-13T18:39:08Z
2024-08-29T11:57:32Z
https://github.com/kubernetes/kubernetes/issues/93032
656,058,152
93,032
1,355